Results 61 to 70 of about 212,014 (305)

Computer Intrusion: Detecting Masquerades

open access: yesStatistical Science, 2001
zbMATH Open Web Interface contents unavailable due to conflicting licenses.
Schonlau, Matthias   +5 more
openaire   +3 more sources

The role of histone modifications in transcription regulation upon DNA damage

open access: yesFEBS Letters, EarlyView.
This review discusses the critical role of histone modifications in regulating gene expression during the DNA damage response (DDR). By modulating chromatin structure and recruiting repair factors, these post‐translational modifications fine‐tune transcriptional programmes to maintain genomic stability.
Angelina Job Kolady, Siyao Wang
wiley   +1 more source

Intrusion detection mechanism and experimental study based on WiFi signal

open access: yesDianzi Jishu Yingyong, 2019
Indoor safety concerns the safety of people′s life and property. Through indoor intrusion detection, it is possible to achieve early warning and avoid loss. Different from the common intrusion detection methods, the CSI(Channel status information) of the
Zeng Zheng   +4 more
doaj   +1 more source

Mechanisms of parasite‐mediated disruption of brain vessels

open access: yesFEBS Letters, EarlyView.
Parasites can affect the blood vessels of the brain, often causing serious neurological problems. This review explains how different parasites interact with and disrupt these vessels, what this means for brain health, and why these processes matter. Understanding these mechanisms may help us develop better ways to prevent or treat brain infections in ...
Leonor Loira   +3 more
wiley   +1 more source

Dynamic Defense Strategy for Platform Based on Event-driven and Timing Migration [PDF]

open access: yesJisuanji gongcheng, 2019
In order to solve the network security defense problem after the intrusion detection system misses detection,using the Moving Target Defense(MTD) technology of the platform layer,this paper designs a new dynamic defense strategy for platforms.Combined ...
CHEN Tongrui, MA Runnian, WANG Gang, WU Weijia
doaj   +1 more source

The newfound relationship between extrachromosomal DNAs and excised signal circles

open access: yesFEBS Letters, EarlyView.
Extrachromosomal DNAs (ecDNAs) contribute to the progression of many human cancers. In addition, circular DNA by‐products of V(D)J recombination, excised signal circles (ESCs), have roles in cancer progression but have largely been overlooked. In this Review, we explore the roles of ecDNAs and ESCs in cancer development, and highlight why these ...
Dylan Casey, Zeqian Gao, Joan Boyes
wiley   +1 more source

Network intrusion detection system using supervised learning paradigm

open access: yesScientific African, 2020
Internet has positively changed social, political and economic structures and in many ways obviating geographical boundaries. The enormous contributions of Internet to business transactions coupled with its ease of use has resulted in increased number of
J. Olamantanmi Mebawondu   +3 more
doaj   +1 more source

Characterizing the salivary RNA landscape to identify potential diagnostic, prognostic, and follow‐up biomarkers for breast cancer

open access: yesMolecular Oncology, EarlyView.
This study explores salivary RNA for breast cancer (BC) diagnosis, prognosis, and follow‐up. High‐throughput RNA sequencing identified distinct salivary RNA signatures, including novel transcripts, that differentiate BC from healthy controls, characterize histological and molecular subtypes, and indicate lymph node involvement.
Nicholas Rajan   +9 more
wiley   +1 more source

Tree-based Intelligent Intrusion Detection System in Internet of Vehicles

open access: yes, 2019
The use of autonomous vehicles (AVs) is a promising technology in Intelligent Transportation Systems (ITSs) to improve safety and driving efficiency. Vehicle-to-everything (V2X) technology enables communication among vehicles and other infrastructures ...
Hamieh, Ismail   +3 more
core   +1 more source

Evaluation of intrusion detection systems

open access: yesJournal of Research of the National Institute of Standards and Technology, 2003
This paper presents a comprehensive method for evaluating intrusion detection systems (IDSs). It integrates and extends ROC (receiver operating characteristic) and cost analysis methods to provide an expected cost metric. Results are given for determining the optimal operation of an IDS based on this expected cost metric.
Ulvila, Jacob W., Gaffney, John E.
openaire   +2 more sources

Home - About - Disclaimer - Privacy