Results 81 to 90 of about 404,854 (339)

Sensor networks security based on sensitive robots agents. A conceptual model

open access: yes, 2012
Multi-agent systems are currently applied to solve complex problems. The security of networks is an eloquent example of a complex and difficult problem. A new model-concept Hybrid Sensitive Robot Metaheuristic for Intrusion Detection is introduced in the
B. Kim   +11 more
core   +1 more source

Cellular liquid biopsy provides unique chances for disease monitoring, preclinical model generation and therapy adjustment in rare salivary gland cancer patients

open access: yesMolecular Oncology, EarlyView.
We quantified and cultured circulating tumor cells (CTCs) of 62 patients with various cancer types and generated CTC‐derived tumoroid models from two salivary gland cancer patients. Cellular liquid biopsy‐derived information enabled molecular genetic assessment of systemic disease heterogeneity and functional testing for therapy selection in both ...
Nataša Stojanović Gužvić   +31 more
wiley   +1 more source

An Intrusion Detection Architecture for Clustered Wireless Ad Hoc Networks [PDF]

open access: yes, 2010
Intrusion detection in wireless ad hoc networks is a challenging task because these networks change their topologies dynamically, lack concentration points where aggregated traffic can be analyzed, utilize infrastructure protocols that are susceptible to manipulation, and rely on noisy, intermittent wireless communications.
arxiv   +1 more source

Unsupervised Anomaly Detection with Unlabeled Data Using Clustering [PDF]

open access: yes, 2005
Intrusions pose a serious security risk in a network environment. New intrusion types, of which detection systems are unaware, are the most difficult to detect.
Abdullah, Abdul Hanan   +2 more
core  

Targeting rapid TKI‐induced AXL upregulation overcomes adaptive ERK reactivation and exerts antileukemic effects in FLT3/ITD acute myeloid leukemia

open access: yesMolecular Oncology, EarlyView.
Adaptive ERK reactivation hinders FLT3 tyrosine kinase inhibitor (TKI) treatment in FLT3/ITD acute myeloid leukemia. Here, we report that FLT3 TKI treatment rapidly induces AXL expression and upregulation that is temporally associated with the adaptive ERK reactivation.
Tessa S. Seale   +9 more
wiley   +1 more source

Combined spatially resolved metabolomics and spatial transcriptomics reveal the mechanism of RACK1‐mediated fatty acid synthesis

open access: yesMolecular Oncology, EarlyView.
The authors analyzed the spatial distributions of gene and metabolite profiles in cervical cancer through spatial transcriptomic and spatially resolved metabolomic techniques. Pivotal genes and metabolites within these cases were then identified and validated.
Lixiu Xu   +3 more
wiley   +1 more source

Provenance-based Intrusion Detection: Opportunities and Challenges [PDF]

open access: yesarXiv, 2018
Intrusion detection is an arms race; attackers evade intrusion detection systems by developing new attack vectors to sidestep known defense mechanisms. Provenance provides a detailed, structured history of the interactions of digital objects within a system.
arxiv  

Integrative systems‐level analysis reveals a contextual crosstalk between hypoxia and global metabolism in human breast tumors

open access: yesMolecular Oncology, EarlyView.
Breast tumor samples scored for metabolic deregulation (M1 to M3) were given a hypoxia score (HS). The highest HS occurred in patients with strongest metabolic deregulation (M3), supporting tumor aggressiveness. HS correlated with the highest number of metabolic pathways in M1. This suggests hypoxia to be an early event in metabolic deregulation.
Raefa Abou Khouzam   +2 more
wiley   +1 more source

Intrusion Detection A Text Mining Based Approach [PDF]

open access: yesarXiv, 2016
Intrusion Detection is one of major threats for organization. The approach of intrusion detection using text processing has been one of research interests which is gaining significant importance from researchers. In text mining based approach for intrusion detection, system calls serve as source for mining and predicting possibility of intrusion or ...
arxiv  

An Implementation of Intrusion Detection System Using Genetic Algorithm

open access: yes, 2012
Nowadays it is very important to maintain a high level security to ensure safe and trusted communication of information between various organizations. But secured data communication over internet and any other network is always under threat of intrusions
Bikas, Md. Abu Naser   +2 more
core   +2 more sources

Home - About - Disclaimer - Privacy