Results 51 to 60 of about 156,609 (316)
Circulating histones as clinical biomarkers in critically ill conditions
Circulating histones are emerging as promising biomarkers in critical illness due to their diagnostic, prognostic, and therapeutic potential. Detection methods such as ELISA and mass spectrometry provide reliable approaches for quantifying histone levels in plasma samples.
José Luis García‐Gimenez+17 more
wiley +1 more source
CSI-based passive intrusion detection bound estimation in indoor NLoS scenario
Passive intrusion detection is important for many indoor safety applications. By utilizing widespread WiFi infrastructures, channel state information (CSI) based intrusion detection methods have attractive advantages such as low cost, non-line-of-sight ...
Linqing Gui, Wenyang Yuan, Fu Xiao
doaj +1 more source
Pemanfaatan Intrusion Detection System (Ids) Sebagai Otomatisasi Konfigurasi Firewall Berbasis Web Service Menggunakan Arsitektur Representational State Transfer (Rest) [PDF]
Many things can destabilize a computer network connections, both with regard to hardware and software. Therefore, we need a technique for network security, one of them is firewall.
Astuti, Y. (Yenni)+2 more
core
Analysis of intrusion detection systems
With the development of information technologies, the amount of vulnerabilities and threats to various data processing systems is increasing, therefore specialized means of security are required to ensure their normal operation and to prevent intrusions, and a promising area that is actively developing in the field of information security is the ...
Anna Korchenko+3 more
openaire +3 more sources
Cyclic nucleotide signaling as a drug target in retinitis pigmentosa
Disruptions in cGMP and cAMP signaling can contribute to retinal dysfunction and photoreceptor loss in retinitis pigmentosa. This perspective examines the mechanisms and evaluates emerging evidence on targeting these pathways as a potential therapeutic strategy to slow or prevent retinal degeneration.
Katri Vainionpää+2 more
wiley +1 more source
This research utilizes machine learning (ML), and especially deep learning (DL), techniques for efficient feature extraction of intrusion attacks.
Samuel Kofi Erskine
doaj +1 more source
A Novel Approach to Android Malware Intrusion Detection Using Zero-Shot Learning GANs
This study proposes an innovative intrusion detection system for Android malware based on a zero-shot learning GAN approach. Our system achieved an accuracy of 99.99%, indicating that this approach can be highly effective for identifying intrusion ...
Syed Atir Raza Shirazi, Mehwish Shaikh
doaj
With the rapid development of the Internet of Things (IoT), there are several challenges pertaining to security in IoT applications. Compared with the characteristics of the traditional Internet, the IoT has many problems, such as large assets, complex ...
Haifeng Lin+3 more
doaj +1 more source
Perancangan Dan Analisis Sistem Pendeteksi Intrusi Berbasis Network Intrusion Detection System (Nids) Pada Sistem Keamanan Jaringan Komputer [PDF]
Network intrusion detection system is a system that can detect illegal accesses or intrusions happened in a computer network. Actually, there are many types of intrusion detection systems and the differences are based on how network administrators ...
Gozali, F. (Ferrianto)+1 more
core
Exposure to common noxious agents (1), including allergens, pollutants, and micro‐nanoplastics, can cause epithelial barrier damage (2) in our body's protective linings. This may trigger an immune response to our microbiome (3). The epithelial barrier theory explains how this process can lead to chronic noncommunicable diseases (4) affecting organs ...
Can Zeyneloglu+17 more
wiley +1 more source