Results 121 to 130 of about 404,854 (339)
A Distributed Intrusion Detection System Using Cooperating Agents [PDF]
The current intrusion detection systems have a number of problems that limit their configurability, scalability and efficiency. There have been some propositions about distributed architectures based on multiple independent agents working collectively for intrusion detection.
arxiv
A framework for constructing features and models for intrusion detection systems [PDF]
Wenke Lee, Salvatore J. Stolfo
openalex +1 more source
MET variants in the N‐lobe of the kinase domain, found in hereditary papillary renal cell carcinoma, require ligand stimulation to promote cell transformation, in contrast to other RTK variants. This suggests that HGF expression in the microenvironment is important for tumor growth in such patients. Their sensitivity to MET inhibitors opens the way for
Célia Guérin+14 more
wiley +1 more source
The complex mode of action of the topoisomerase II inhibitor etoposide in triggering apoptosis involves several mechanisms: overexpression of the mitochondrial protein VDAC1, leading to its oligomerization and formation of a large channel that mediates the release of pro‐apoptotic protein; and overexpression of the apoptosis regulators p53, Bax, and ...
Aditya Karunanithi Nivedita+1 more
wiley +1 more source
Abstract Background and purpose For postoperative breast cancer patients, deformable image registration (DIR) is challenged due to the large deformations and non‐correspondence caused by tumor resection and clip insertion. To deal with it, three metrics (fiducial‐, region‐, and intensity‐based) were jointly used in DIR algorithm for improved accuracy ...
Xin Xie+6 more
wiley +1 more source
Current Studies On Intrusion Detection System, Genetic Algorithm And Fuzzy Logic [PDF]
Nowadays Intrusion Detection System (IDS) which is increasingly a key element of system security is used to identify the malicious activities in a computer system or network. There are different approaches being employed in intrusion detection systems, but unluckily each of the technique so far is not entirely ideal.
arxiv
A Multiple Model Cost-Sensitive Approach for Intrusion Detection [PDF]
Wei Fan+3 more
openalex +1 more source
Using mass cytometry, we analyzed serial blood samples from patients with relapsed epithelial ovarian cancer (EOC) treated with oleclumab–durvalumab combination immunotherapy in the NSGO‐OV‐UMB1/ENGOT‐OV30 trial. Our analysis identified potential predictive, monitoring, and response biomarkers detectable through liquid biopsy. These findings facilitate
Luka Tandaric+11 more
wiley +1 more source
Abstract Background Ultrasonography (US) and 99mTechnetium‐sestamibi scintigraphy (99mTc‐MIBI) are currently first‐line imaging modalities to localize parathyroid adenomas with sensitivities of 80% and 84%, respectively. Therefore, finding other modalities to further improve the diagnostic accuracy for preoperative localization is critically needed ...
Fangyi Liu+7 more
wiley +1 more source