Results 101 to 110 of about 162,879 (307)
Exploiting metabolic adaptations to overcome dabrafenib treatment resistance in melanoma cells
We show that dabrafenib‐resistant melanoma cells undergo mitochondrial remodeling, leading to elevated respiration and ROS production balanced by stronger antioxidant defenses. This altered redox state promotes survival despite mitochondrial damage but renders resistant cells highly vulnerable to ROS‐inducing compounds such as PEITC, highlighting redox
Silvia Eller +17 more
wiley +1 more source
Network intrusion detection with Naïve Bayes Classification and Self Organizing Maps [PDF]
University of Technology, Sydney. Faculty of Engineering and Information Technology.In this digital period, internet has turned into an indispensable wellspring of correspondence in just about every calling.
Iqbal, M
core
Cyber Attacks on Intrusion Detection System
Soft Computing techniques are fast growing technology used for problem solving, Information security is of essence factor in the age of computer world. Protecting information, systems and resources from unauthorized use, duplication, modification ,adjustment or any kind of cause which damage the resources such that it cannot be repaired or no longer ...
Sharma, Priyanka, Kunwar, Rakesh Singh
openaire +1 more source
The LINC01116 long noncoding RNA is induced by hypoxia and associated with poor prognosis and high recurrence rates in two cohorts of lung adenocarcinoma patients. Here, we demonstrate that besides its expression in cancer cells, LINC01116 is markedly expressed in lymphatic endothelial cells of the tumor stroma in which it participates in hypoxia ...
Marine Gautier‐Isola +12 more
wiley +1 more source
Multi-objective optimization algorithms for intrusion detection in IoT networks: A systematic review
The significance of intrusion detection systems in networks has grown because of the digital revolution and increased operations. The intrusion detection method classifies the network traffic as threat or normal based on the data features.
Shubhkirti Sharma +2 more
doaj +1 more source
Penerapan Metode Support Vector Machine pada Sistem Deteksi Intrusi secara Real-time [PDF]
Intrusion detection system is a system for detecting attacks or intrusions in a network or computer system, generally intrusion detection is done with comparing network traffic pattern with known attack pattern or with finding unnormal pattern of network
Jacobus, J. (Jacobus), Winarko, E. (Edi)
core
Feature selection for intrusion detection system in Internet-of-Things (IoT)
Pushparaj R. Nimbalkar +1 more
openalex +1 more source
The cancer problem is increasing globally with projections up to the year 2050 showing unfavourable outcomes in terms of incidence and cancer‐related deaths. The main challenges are prevention, improved therapeutics resulting in increased cure rates and enhanced health‐related quality of life.
Ulrik Ringborg +43 more
wiley +1 more source
Analysis And Evaluation Snort, Bro, and Suricata as Intrusion Detection System Based on Linux Server [PDF]
Security and confidentiality of data on computer networks is currently a problem that continues to grow. Installation of firewalls, antivirus, IDS (Intrusion Detection System) / IPS (Intrusion Prevention System) and various other security applications
, Fatah Yasin Al Irsyadi, S.T., M.T +2 more
core

