Results 81 to 90 of about 404,854 (339)
Sensor networks security based on sensitive robots agents. A conceptual model
Multi-agent systems are currently applied to solve complex problems. The security of networks is an eloquent example of a complex and difficult problem. A new model-concept Hybrid Sensitive Robot Metaheuristic for Intrusion Detection is introduced in the
B. Kim+11 more
core +1 more source
We quantified and cultured circulating tumor cells (CTCs) of 62 patients with various cancer types and generated CTC‐derived tumoroid models from two salivary gland cancer patients. Cellular liquid biopsy‐derived information enabled molecular genetic assessment of systemic disease heterogeneity and functional testing for therapy selection in both ...
Nataša Stojanović Gužvić+31 more
wiley +1 more source
An Intrusion Detection Architecture for Clustered Wireless Ad Hoc Networks [PDF]
Intrusion detection in wireless ad hoc networks is a challenging task because these networks change their topologies dynamically, lack concentration points where aggregated traffic can be analyzed, utilize infrastructure protocols that are susceptible to manipulation, and rely on noisy, intermittent wireless communications.
arxiv +1 more source
Unsupervised Anomaly Detection with Unlabeled Data Using Clustering [PDF]
Intrusions pose a serious security risk in a network environment. New intrusion types, of which detection systems are unaware, are the most difficult to detect.
Abdullah, Abdul Hanan+2 more
core
Adaptive ERK reactivation hinders FLT3 tyrosine kinase inhibitor (TKI) treatment in FLT3/ITD acute myeloid leukemia. Here, we report that FLT3 TKI treatment rapidly induces AXL expression and upregulation that is temporally associated with the adaptive ERK reactivation.
Tessa S. Seale+9 more
wiley +1 more source
The authors analyzed the spatial distributions of gene and metabolite profiles in cervical cancer through spatial transcriptomic and spatially resolved metabolomic techniques. Pivotal genes and metabolites within these cases were then identified and validated.
Lixiu Xu+3 more
wiley +1 more source
Provenance-based Intrusion Detection: Opportunities and Challenges [PDF]
Intrusion detection is an arms race; attackers evade intrusion detection systems by developing new attack vectors to sidestep known defense mechanisms. Provenance provides a detailed, structured history of the interactions of digital objects within a system.
arxiv
Breast tumor samples scored for metabolic deregulation (M1 to M3) were given a hypoxia score (HS). The highest HS occurred in patients with strongest metabolic deregulation (M3), supporting tumor aggressiveness. HS correlated with the highest number of metabolic pathways in M1. This suggests hypoxia to be an early event in metabolic deregulation.
Raefa Abou Khouzam+2 more
wiley +1 more source
Intrusion Detection A Text Mining Based Approach [PDF]
Intrusion Detection is one of major threats for organization. The approach of intrusion detection using text processing has been one of research interests which is gaining significant importance from researchers. In text mining based approach for intrusion detection, system calls serve as source for mining and predicting possibility of intrusion or ...
arxiv
An Implementation of Intrusion Detection System Using Genetic Algorithm
Nowadays it is very important to maintain a high level security to ensure safe and trusted communication of information between various organizations. But secured data communication over internet and any other network is always under threat of intrusions
Bikas, Md. Abu Naser+2 more
core +2 more sources