Results 101 to 110 of about 1,142,874 (336)
Bayesian Based Intrusion Detection System
AbstractIn this paper an intrusion detection system is developed using Bayesian probability. The system developed is a naive Bayesian classifier that is used to identify possible intrusions. The system is trained a priori using a subset of the KDD dataset. The trained classifier is then tested using a larger subset of KDD dataset.
Hesham Altwaijry, Saeed Algarny
openaire +3 more sources
mir‐196a promotes Esophagus Adenocarcinoma aggressiveness. On one hand, mir‐196a targets the valosin‐containing protein (VCP) mRNA, causing the accumulation of c‐MYC protein that leads to high amounts of TERT. On the other hand, mir‐196a targets the inhibitor of NFκB (NFKBIA).
Jesús García‐Castillo +8 more
wiley +1 more source
Applying an Ontology to a Patrol Intrusion Detection System for Wireless Sensor Networks
With the increasing application of wireless sensor networks (WSN), the security requirements for wireless sensor network communications have become critical. However, the detection mechanisms of such systems impact the effectiveness of the entire network.
Chia-Fen Hsieh +2 more
doaj +1 more source
Non‐thermal plasma treatment of melanoma cells induced epithelial‐mesenchymal transition (EMT) in a dose‐dependent fashion. This report highlights the critical need to further investigate potential adverse effects of non‐thermal plasma for cancer therapy and to optimize treatment parameters for clinical translation. Despite the promising results of non‐
Eline Biscop +10 more
wiley +1 more source
A nucleotide‐independent, pan‐RAS‐targeted DARPin elicits anti‐tumor activity in a multimodal manner
We report a Designed Ankyrin Repeat Protein that binds and inhibits RAS proteins, which serve as central cell signaling hubs and are essential for the progression of many cancers. Its unique feature is that it does not discriminate between different RAS isoforms or mutations and is capable of binding to RAS in both its active (GTP‐bound) and inactive ...
Jonas N. Kapp +13 more
wiley +1 more source
Intrusion Detection By Data Mining Algorithms: A Review
– With the increasing use of network-based services and sensitive information on networks, maintaining information security is essential. Intrusion Detection System is a security tool used to detect unauthorized activities of a computer system or network.
Marjan Kuchaki Rafsanjani +1 more
doaj
Intrusion detection techniques of variable-frequency vector control system
As induction motors are the control core in variable-frequency speed-regulating systems, their efficient operation in industrial production processes needs to be ensured.
CAO Ce +3 more
doaj +1 more source
Intrusion Detection System: Overview
Network Intrusion Detection (NID) is the process of identifying network activity that can lead to the compromise of a security policy. In this paper, we will look at four intrusion detection approaches, which include ANN or Artificial Neural Network, SOM, Fuzzy Logic and SVM.
Alanazi, H. +3 more
openaire +2 more sources
Unraveling LINE‐1 retrotransposition in head and neck squamous cell carcinoma
The novel RetroTest method allows the detection of L1 activation in clinical samples with low DNA input, providing global L1 activity and the identification of the L1 source element. We applied RetroTest to a real‐world cohort of HNSCC patients where we reported an early L1 activation, with more than 60% of T1 patients showing L1 activity.
Jenifer Brea‐Iglesias +12 more
wiley +1 more source
Overexpression of CHRDL2 in colon cancer cells makes them more stem‐like and resistant to chemo‐ and radiotherapy. CHRDL2‐high cells have upregulation of the WNT pathway, genes involved in the DNA damage response (DDR) pathway and epithelial‐to‐mesenchymal transition (EMT). This leads to quicker repair of damaged DNA and more cell migration.
Eloise Clarkson, Annabelle Lewis
wiley +1 more source

