Results 41 to 50 of about 208,052 (306)

The anti‐CRISPR protein AcrIE8.1 inhibits the type I‐E CRISPR‐Cas system by directly binding to the Cascade subunit Cas11

open access: yesFEBS Letters, EarlyView.
In this study, we present the structure of AcrIE8.1, a previously uncharacterized anti‐CRISPR protein that inhibits the type I‐E CRISPR‐Cas system. Through a combination of structural and biochemical analyses, we demonstrate that AcrIE8.1 directly binds to the Cas11 subunit of the Cascade complex to inhibit the CRISPR‐Cas system.
Young Woo Kang, Hyun Ho Park
wiley   +1 more source

An intrusion detection algorithm for sensor network based on normalized cut spectral clustering.

open access: yesPLoS ONE, 2019
Sensor network intrusion detection has attracted extensive attention. However, previous intrusion detection methods face the highly imbalanced attack class distribution problem, and they may not achieve a satisfactory performance.
Gaoming Yang   +4 more
doaj   +1 more source

Intrusion Detection Algorithm Based on Random Forest and Artificial Immunity [PDF]

open access: yesJisuanji gongcheng, 2020
Traditional intrusion detection methods have low detection rates for Probe,U2R,R2L and other types of network intrusion attacks,leading to misdetection and missed detection of intrusion behavior.Therefore,this paper proposes an intrusion detection ...
ZHANG Ling, ZHANG Jianwei, SANG Yongxuan, WANG Bo, HOU Zexiang
doaj   +1 more source

Targeting EZH2 reverses thyroid cell dedifferentiation and enhances iodide uptake in anaplastic thyroid cancer

open access: yesFEBS Letters, EarlyView.
Anaplastic thyroid cancer (ATC) lacks iodide uptake ability due to MAPK activation increasing the expression of the histone methyltransferase EZH2, which represses thyroid differentiation genes (TDGs) such as the sodium iodide symporter (NIS). Dual inhibition of MAPK (U0126) and EZH2 (EPZ6438/Tazemetostat) reverses this mechanism, thus restoring TDG ...
Diego Claro de Mello   +6 more
wiley   +1 more source

Protection of an intrusion detection engine with watermarking in ad hoc networks [PDF]

open access: yes, 2010
Mobile ad hoc networks have received great attention in recent years, mainly due to the evolution of wireless networking and mobile computing hardware.
Douligeris, C.   +2 more
core  

Flow-based intrusion detection [PDF]

open access: yes12th IFIP/IEEE International Symposium on Integrated Network Management (IM 2011) and Workshops, 2011
The spread of 1-10 Gbps technology has in recent years paved the way to a flourishing landscape of new, high-bandwidth Internet services.At the same time, we have also observed increasingly frequent and widely diversified attacks. To this threat, the research community has answered with a growing interest in intrusion detection, aiming to timely detect
Sperotto, Anna, Pras, Aiko
openaire   +2 more sources

By dawn or dusk—how circadian timing rewrites bacterial infection outcomes

open access: yesFEBS Letters, EarlyView.
The circadian clock shapes immune function, yet its influence on infection outcomes is only beginning to be understood. This review highlights how circadian timing alters host responses to the bacterial pathogens Salmonella enterica, Listeria monocytogenes, and Streptococcus pneumoniae revealing that the effectiveness of immune defense depends not only
Devons Mo   +2 more
wiley   +1 more source

Intrusion Detection Systems [PDF]

open access: yes, 2014
Volume 2 Issue 9 (September ...
Eltom, A. A. (Ahmed)   +1 more
core  

Intrusion Detection Using Mouse Dynamics

open access: yes, 2018
Compared to other behavioural biometrics, mouse dynamics is a less explored area. General purpose data sets containing unrestricted mouse usage data are usually not available.
Antal, Margit, Egyed-Zsigmond, Elod
core   +2 more sources

Benchmark Tests for the Model-Checking-Based IDS Algorithms

open access: yesIEEE Access, 2019
A fundamental concern for the security community is to identify the comprehensive comparable performance of various intrusion detection algorithms which are based on the Model Checking (MC) techniques. To address this open issue, we conduct the benchmark
Miaolei Deng   +4 more
doaj   +1 more source

Home - About - Disclaimer - Privacy