Results 101 to 110 of about 156,609 (316)
Systematic profiling of cancer‐fibroblast interactions reveals drug combinations in ovarian cancer
Fibroblasts, cells in the tumor environment, support ovarian cancer cell growth and alter morphology and drug response. We used fibroblast and cancer cell co‐culture models to test 528 drugs and discovered new drugs for combination treatment. We showed that adding Vorinostat or Birinapant to standard chemotherapy may improve drug response, suggesting ...
Greta Gudoityte+10 more
wiley +1 more source
Non‐thermal plasma treatment of melanoma cells induced epithelial‐mesenchymal transition (EMT) in a dose‐dependent fashion. This report highlights the critical need to further investigate potential adverse effects of non‐thermal plasma for cancer therapy and to optimize treatment parameters for clinical translation. Despite the promising results of non‐
Eline Biscop+10 more
wiley +1 more source
Loss of primary cilia in endothelial cells promotes EndMT and vascular abnormalities in the ovarian tumor microenvironment through EphA2 activation. Using human samples, in vitro models, and endothelial‐specific Kif3a‐knockout mice, we show that primary cilia loss drives the acquisition of cancer‐associated fibroblast‐like phenotypes, thereby ...
Jin Gu Cho+11 more
wiley +1 more source
IDSGAN: Generative Adversarial Networks for Attack Generation against Intrusion Detection
As an important tool in security, the intrusion detection system bears the responsibility of the defense to network attacks performed by malicious traffic.
Lin, Zilong, Shi, Yong, Xue, Zhi
core
This study identifies nuclear YB‐1 S102 phosphorylation as a marker associated with KRAS and FBXW7 mutations in colorectal cancer. Mutated KRAS correlates specifically with nuclear, not cytoplasmic, S102 YB‐1. These findings provide the first ex vivo evidence of this link in CRC and suggest future studies should assess the prognostic and therapeutic ...
Konstanze Lettau+9 more
wiley +1 more source
Classification Trees as a Technique for Creating Anomaly-Based Intrusion Detection Systems [PDF]
Intrusion detection is a critical component of security information systems. The intrusion detection process attempts to detect malicious attacks by examining various data collected during processes on the protected system.
Jecheva, Veselina, Nikolova, Evgeniya
core
A nucleotide‐independent, pan‐RAS‐targeted DARPin elicits anti‐tumor activity in a multimodal manner
We report a Designed Ankyrin Repeat Protein that binds and inhibits RAS proteins, which serve as central cell signaling hubs and are essential for the progression of many cancers. Its unique feature is that it does not discriminate between different RAS isoforms or mutations and is capable of binding to RAS in both its active (GTP‐bound) and inactive ...
Jonas N. Kapp+13 more
wiley +1 more source
Multi-objective optimization algorithms for intrusion detection in IoT networks: A systematic review
The significance of intrusion detection systems in networks has grown because of the digital revolution and increased operations. The intrusion detection method classifies the network traffic as threat or normal based on the data features.
Shubhkirti Sharma+2 more
doaj +1 more source
Analysis And Evaluation Snort, Bro, and Suricata as Intrusion Detection System Based on Linux Server [PDF]
Security and confidentiality of data on computer networks is currently a problem that continues to grow. Installation of firewalls, antivirus, IDS (Intrusion Detection System) / IPS (Intrusion Prevention System) and various other security applications
, Fatah Yasin Al Irsyadi, S.T., M.T+2 more
core
A framework for constructing features and models for intrusion detection systems [PDF]
Wenke Lee, Salvatore J. Stolfo
openalex +1 more source