Results 71 to 80 of about 177,571 (274)
Stochastic Tools for Network Intrusion Detection
With the rapid development of Internet and the sharp increase of network crime, network security has become very important and received a lot of attention. We model security issues as stochastic systems.
Chen Lu, J Zheng, L Yu, Paul Baecher
core +1 more source
Potential therapeutic targeting of BKCa channels in glioblastoma treatment
This review summarizes current insights into the role of BKCa and mitoBKCa channels in glioblastoma biology, their potential classification as oncochannels, and the emerging pharmacological strategies targeting these channels, emphasizing the translational challenges in developing BKCa‐directed therapies for glioblastoma treatment.
Kamila Maliszewska‐Olejniczak +4 more
wiley +1 more source
The Fuzzy Intrusion Recognition Engine (FIRE) is a network intrusion detection system that uses fuzzy systems to assess malicious activity against computer networks. The system uses an agent-based approach to separate monitoring tasks. Individual agents perform their own fuzzification of input data sources.
J.E. Dickerson +3 more
openaire +2 more sources
Exploiting metabolic adaptations to overcome dabrafenib treatment resistance in melanoma cells
We show that dabrafenib‐resistant melanoma cells undergo mitochondrial remodeling, leading to elevated respiration and ROS production balanced by stronger antioxidant defenses. This altered redox state promotes survival despite mitochondrial damage but renders resistant cells highly vulnerable to ROS‐inducing compounds such as PEITC, highlighting redox
Silvia Eller +17 more
wiley +1 more source
Plecstatin inhibits hepatocellular carcinoma tumorigenesis and invasion through cytolinker plectin
The ruthenium‐based metallodrug plecstatin exerts its anticancer effect in hepatocellular carcinoma (HCC) primarily through selective targeting of plectin. By disrupting plectin‐mediated cytoskeletal organization, plecstatin inhibits anchorage‐dependent growth, cell polarization, and tumor cell dissemination.
Zuzana Outla +10 more
wiley +1 more source
When Intrusion Detection Meets Blockchain Technology: A Review
With the purpose of identifying cyber threats and possible incidents, intrusion detection systems (IDSs) are widely deployed in various computer networks.
Weizhi Meng +4 more
doaj +1 more source
Intrusion Detection Systems Using Adaptive Regression Splines [PDF]
Past few years have witnessed a growing recognition of intelligent techniques for the construction of efficient and reliable intrusion detection systems.
Abraham, Ajith +3 more
core +4 more sources
Therapeutic strategies for MMAE‐resistant bladder cancer through DPP4 inhibition
We established monomethyl auristatin E (MMAE)‐resistant bladder cancer (BC) cell lines by exposure to progressively increasing concentrations of MMAE in vitro. RNA sequencing showed DPP4 expression was increased in MMAE‐resistant BC cells. Both si‐DPP4 and the DPP4 inhibitor sitagliptin suppressed the viability of MMAE‐resistant BC cells.
Gang Li +10 more
wiley +1 more source
Nanosecond infrared laser (NIRL) low‐volume sampling combined with shotgun lipidomics uncovers distinct lipidome alterations in oropharyngeal squamous cell carcinoma (OPSCC) of the palatine tonsil. Several lipid species consistently differentiate tumor from healthy tissue, highlighting their potential as diagnostic markers.
Leonard Kerkhoff +11 more
wiley +1 more source
Research on Key Technology of Network Intrusion Detection System Based on Improved GA-BPNN Algorithm
In recent years, with the rapid development of information and network technology, computer and network infrastructure has become a popular target of hacker attacks.
H.F. Hu, W.N. He
doaj +1 more source

