Results 91 to 100 of about 1,142,874 (336)

Soft-computing-based false alarm reduction for hierarchical data of intrusion detection system

open access: yesInternational Journal of Distributed Sensor Networks, 2019
A false alarm rate of online anomaly-based intrusion detection system is a crucial concern. It is challenging to implement in the real-world scenarios when these anomalies occur sporadically.
Parminder Singh   +4 more
doaj   +1 more source

Targeting EZH2 reverses thyroid cell dedifferentiation and enhances iodide uptake in anaplastic thyroid cancer

open access: yesFEBS Letters, EarlyView.
Anaplastic thyroid cancer (ATC) lacks iodide uptake ability due to MAPK activation increasing the expression of the histone methyltransferase EZH2, which represses thyroid differentiation genes (TDGs) such as the sodium iodide symporter (NIS). Dual inhibition of MAPK (U0126) and EZH2 (EPZ6438/Tazemetostat) reverses this mechanism, thus restoring TDG ...
Diego Claro de Mello   +6 more
wiley   +1 more source

Smart Intrusion Detection with Expert Systems

open access: yes, 2018
Nowadays security concerns of computing devices are growing significantly. This is due to ever increasing number of devices connected to the network. In this context, optimising the performance of intrusion detection systems (IDS) is a key research issue to meet demanding requirements on security of complex and large scale networks.
Amato F.   +3 more
openaire   +4 more sources

Multidimensional OMICs reveal ARID1A orchestrated control of DNA damage, splicing, and cell cycle in normal‐like and malignant urothelial cells

open access: yesMolecular Oncology, EarlyView.
Loss of the frequently mutated chromatin remodeler ARID1A, a subunit of the SWI/SNF cBAF complex, results in less open chromatin, alternative splicing, and the failure to stop cells from progressing through the cell cycle after DNA damage in bladder (cancer) cells. Created in BioRender. Epigenetic regulators, such as the SWI/SNF complex, with important
Rebecca M. Schlösser   +11 more
wiley   +1 more source

Oversampling and undersampling for intrusion detection system in the supervisory control and data acquisition IEC 60870‐5‐104

open access: yesIET Cyber-Physical Systems
Supervisory control and data acquisition systems are critical in Industry 4.0 for controlling and monitoring industrial processes. However, these systems are vulnerable to various attacks, and therefore, intelligent and robust intrusion detection systems
M. Agus Syamsul Arifin   +6 more
doaj   +1 more source

Multi‐omic characterization of consensus molecular subtype 1 (CMS1) colorectal cancer with dampened immune response improves precision medicine

open access: yesMolecular Oncology, EarlyView.
This study highlights the importance of multi‐omic analyses in characterizing colorectal cancers. Indeed, our analysis revealed a rare CMS1 exhibiting dampened immune activation, including reduced PD‐1 expression, moderate CD8+ T‐cell infiltration, and suppressed JAK/STAT pathway.
Livia Concetti   +10 more
wiley   +1 more source

Detecting homologous recombination deficiency for breast cancer through integrative analysis of genomic data

open access: yesMolecular Oncology, EarlyView.
This study develops a semi‐supervised classifier integrating multi‐genomic data (1404 training/5893 validation samples) to improve homologous recombination deficiency (HRD) detection in breast cancer. Our method demonstrates prognostic value and predicts chemotherapy/PARP inhibitor sensitivity in HRD+ tumours.
Rong Zhu   +12 more
wiley   +1 more source

Reinforced Intrusion Detection Using Pursuit Reinforcement Competitive Learning

open access: yesEmitter: International Journal of Engineering Technology, 2014
Today, information technology is growing rapidly,all information can be obtainedmuch easier. It raises some new problems; one of them is unauthorized access to the system.
Indah Yulia Prafitaning Tiyas   +3 more
doaj   +3 more sources

Poisoning Attacks on Federated Learning-based IoT Intrusion Detection System

open access: yesProceedings 2020 Workshop on Decentralized IoT Systems and Security, 2020
—Federated Learning (FL) is an appealing method for applying machine learning to large scale systems due to the privacy and efficiency advantages that its training mechanism provides. One important field for FL deployment is emerging IoT applications.
T. D. Nguyen   +3 more
semanticscholar   +1 more source

Data‐driven discovery of gene expression markers distinguishing pediatric acute lymphoblastic leukemia subtypes

open access: yesMolecular Oncology, EarlyView.
This study investigates gene expression differences between two major pediatric acute lymphoblastic leukemia (ALL) subtypes, B‐cell precursor ALL, and T‐cell ALL, using a data‐driven approach consisting of biostatistics and machine learning methods. Following analysis of a discovery dataset, we find a set of 14 expression markers differentiating the ...
Mona Nourbakhsh   +8 more
wiley   +1 more source

Home - About - Disclaimer - Privacy