Results 101 to 110 of about 156,609 (316)

Systematic profiling of cancer‐fibroblast interactions reveals drug combinations in ovarian cancer

open access: yesMolecular Oncology, EarlyView.
Fibroblasts, cells in the tumor environment, support ovarian cancer cell growth and alter morphology and drug response. We used fibroblast and cancer cell co‐culture models to test 528 drugs and discovered new drugs for combination treatment. We showed that adding Vorinostat or Birinapant to standard chemotherapy may improve drug response, suggesting ...
Greta Gudoityte   +10 more
wiley   +1 more source

Dose‐dependent induction of epithelial‐mesenchymal transition in 3D melanoma models by non‐thermal plasma treatment

open access: yesMolecular Oncology, EarlyView.
Non‐thermal plasma treatment of melanoma cells induced epithelial‐mesenchymal transition (EMT) in a dose‐dependent fashion. This report highlights the critical need to further investigate potential adverse effects of non‐thermal plasma for cancer therapy and to optimize treatment parameters for clinical translation. Despite the promising results of non‐
Eline Biscop   +10 more
wiley   +1 more source

Loss of primary cilia promotes EphA2‐mediated endothelial‐to‐mesenchymal transition in the ovarian tumor microenvironment

open access: yesMolecular Oncology, EarlyView.
Loss of primary cilia in endothelial cells promotes EndMT and vascular abnormalities in the ovarian tumor microenvironment through EphA2 activation. Using human samples, in vitro models, and endothelial‐specific Kif3a‐knockout mice, we show that primary cilia loss drives the acquisition of cancer‐associated fibroblast‐like phenotypes, thereby ...
Jin Gu Cho   +11 more
wiley   +1 more source

IDSGAN: Generative Adversarial Networks for Attack Generation against Intrusion Detection

open access: yes, 2019
As an important tool in security, the intrusion detection system bears the responsibility of the defense to network attacks performed by malicious traffic.
Lin, Zilong, Shi, Yong, Xue, Zhi
core  

The subcellular distribution of phosphorylated Y‐box‐binding protein‐1 at S102 in colorectal cancer patients, stratified by KRAS mutational status and clinicopathological features

open access: yesMolecular Oncology, EarlyView.
This study identifies nuclear YB‐1 S102 phosphorylation as a marker associated with KRAS and FBXW7 mutations in colorectal cancer. Mutated KRAS correlates specifically with nuclear, not cytoplasmic, S102 YB‐1. These findings provide the first ex vivo evidence of this link in CRC and suggest future studies should assess the prognostic and therapeutic ...
Konstanze Lettau   +9 more
wiley   +1 more source

Classification Trees as a Technique for Creating Anomaly-Based Intrusion Detection Systems [PDF]

open access: yes, 2009
Intrusion detection is a critical component of security information systems. The intrusion detection process attempts to detect malicious attacks by examining various data collected during processes on the protected system.
Jecheva, Veselina, Nikolova, Evgeniya
core  

A nucleotide‐independent, pan‐RAS‐targeted DARPin elicits anti‐tumor activity in a multimodal manner

open access: yesMolecular Oncology, EarlyView.
We report a Designed Ankyrin Repeat Protein that binds and inhibits RAS proteins, which serve as central cell signaling hubs and are essential for the progression of many cancers. Its unique feature is that it does not discriminate between different RAS isoforms or mutations and is capable of binding to RAS in both its active (GTP‐bound) and inactive ...
Jonas N. Kapp   +13 more
wiley   +1 more source

Multi-objective optimization algorithms for intrusion detection in IoT networks: A systematic review

open access: yesInternet of Things and Cyber-Physical Systems
The significance of intrusion detection systems in networks has grown because of the digital revolution and increased operations. The intrusion detection method classifies the network traffic as threat or normal based on the data features.
Shubhkirti Sharma   +2 more
doaj   +1 more source

Analysis And Evaluation Snort, Bro, and Suricata as Intrusion Detection System Based on Linux Server [PDF]

open access: yes, 2014
Security and confidentiality of data on computer networks is currently a problem that continues to grow. Installation of firewalls, antivirus, IDS (Intrusion Detection System) / IPS (Intrusion Prevention System) and various other security applications
, Fatah Yasin Al Irsyadi, S.T., M.T   +2 more
core  

Home - About - Disclaimer - Privacy