Results 91 to 100 of about 162,879 (307)

Methylation biomarkers can distinguish pleural mesothelioma from healthy pleura and other pleural pathologies

open access: yesMolecular Oncology, EarlyView.
We developed and validated a DNA methylation–based biomarker panel to distinguish pleural mesothelioma from other pleural conditions. Using the IMPRESS technology, we translated this panel into a clinically applicable assay. The resulting two classifier models demonstrated excellent performance, achieving high AUC values and strong diagnostic accuracy.
Janah Vandenhoeck   +12 more
wiley   +1 more source

Strength through diversity: how cancers thrive when clones cooperate

open access: yesMolecular Oncology, EarlyView.
Intratumor heterogeneity can offer direct benefits to the tumor through cooperation between different clones. In this review, Kuiken et al. discuss existing evidence for clonal cooperativity to identify overarching principles, and highlight how novel technological developments could address remaining open questions.
Marije C. Kuiken   +3 more
wiley   +1 more source

Intrusion Detection By Data Mining Algorithms: A Review

open access: yesJournal of New Results in Science, 2013
– With the increasing use of network-based services and sensitive information on networks, maintaining information security is essential. Intrusion Detection System is a security tool used to detect unauthorized activities of a computer system or network.
Marjan Kuchaki Rafsanjani   +1 more
doaj  

A Study on Data Mining Based Intrusion Detection System [PDF]

open access: yes, 2014
In recent years security has remained unsecured for computers as well as data network systems. Intrusion detecting system used to safeguard the data confidentiality, integrity and system availability from various types of attacks.
Anthony Raj, A.
core  

Perspectives in educating molecular pathologists on liquid biopsy: Toward integrative, equitable, and decentralized precision oncology

open access: yesMolecular Oncology, EarlyView.
Liquid biopsy enables minimally invasive, real‐time molecular profiling through analysis of circulating biomarkers in biological fluids. This Perspective highlights the importance of training pathologists through integrative educational programs, such as the European Masters in Molecular Pathology, to ensure effective and equitable implementation of ...
Marius Ilié   +13 more
wiley   +1 more source

Intrusion detection techniques of variable-frequency vector control system

open access: yes工程科学学报, 2019
As induction motors are the control core in variable-frequency speed-regulating systems, their efficient operation in industrial production processes needs to be ensured.
CAO Ce   +3 more
doaj   +1 more source

IDSGAN: Generative Adversarial Networks for Attack Generation against Intrusion Detection

open access: yes, 2019
As an important tool in security, the intrusion detection system bears the responsibility of the defense to network attacks performed by malicious traffic.
Lin, Zilong, Shi, Yong, Xue, Zhi
core  

Transcriptional network analysis of PTEN‐protein‐deficient prostate tumors reveals robust stromal reprogramming and signs of senescent paracrine communication

open access: yesMolecular Oncology, EarlyView.
Combining PTEN protein assessment and transcriptomic profiling of prostate tumors, we uncovered a network enriched in senescence and extracellular matrix (ECM) programs associated with PTEN loss and conserved in a mouse model. We show that PTEN‐deficient cells trigger paracrine remodeling of the surrounding stroma and this information could help ...
Ivana Rondon‐Lorefice   +16 more
wiley   +1 more source

Potential therapeutic targeting of BKCa channels in glioblastoma treatment

open access: yesMolecular Oncology, EarlyView.
This review summarizes current insights into the role of BKCa and mitoBKCa channels in glioblastoma biology, their potential classification as oncochannels, and the emerging pharmacological strategies targeting these channels, emphasizing the translational challenges in developing BKCa‐directed therapies for glioblastoma treatment.
Kamila Maliszewska‐Olejniczak   +4 more
wiley   +1 more source

Classification Trees as a Technique for Creating Anomaly-Based Intrusion Detection Systems [PDF]

open access: yes, 2009
Intrusion detection is a critical component of security information systems. The intrusion detection process attempts to detect malicious attacks by examining various data collected during processes on the protected system.
Jecheva, Veselina, Nikolova, Evgeniya
core  

Home - About - Disclaimer - Privacy