Results 131 to 140 of about 53,015 (296)
Signature-based intrusion detection using NFR filter coding
Nauman Mazhar
openalex +2 more sources
Dynamic modeling of Internet traffic for intrusion detection [PDF]
E. Jonckheere +2 more
openalex +1 more source
Ro 31‐8220 suppresses bladder cancer progression via enhancing autophagy in vitro and in vivo
The pan‐protein kinase C inhibitor Ro‐31‐8220 demonstrates potent anti‐bladder cancer effects both in vitro and in vivo by suppressing migration/invasion, inducing apoptosis and crucially activating autophagy, where blocking autophagy with chloroquine reduces its cell‐killing efficacy, suggesting its promise as a novel therapeutic candidate requiring ...
Shengjun Fu +12 more
wiley +1 more source
ADeLe: An Attack Description Language for Knowledge-Based Intrusion Detection
Cédric Michel, Ludovic Mé
openalex +1 more source
Patch‐clamp recordings revealed that tamoxifen inhibits voltage‐gated sodium channels, especially under acidic conditions, both common in metastatic cancer cells. These effects may explain certain antitumor properties of tamoxifen, highlighting a novel mechanism of action beyond its known endocrine effects.
Karl Josef Föhr +5 more
wiley +1 more source
Existing intrusion detection models generally only analyze the static characteristics of network intrusion actions,resulting in low detection rate and high false positive rate,and cannot effectively detect low-frequency attacks.Therefore,a novel ...
Binghao YAN, Guodong HAN
doaj
High LRIG1 expression predicts lymph node metastasis in patients with uterine cervical cancer
Lymph node status is crucial in determining treatment for women with early‐stage cervical cancer. We demonstrate that high LRIG1 protein expression in primary tumors can predict lymph node metastases. Our findings support further investigation of LRIG1 as a biomarker to improve staging accuracy and guide treatment decisions in cervical cancer patients.
Pernilla Israelsson +5 more
wiley +1 more source
A personalized federated hypernetworks based aggregation approach for intrusion detection systems. [PDF]
Abhijit CS +3 more
europepmc +1 more source

