Results 51 to 60 of about 988,120 (358)
Database Intrusion Detection Systems (DIDs): Insider Threat Detection via Behavioural-based Anomaly Detection Systems -- A Brief Survey of Concepts and Approaches [PDF]
One of the data security and privacy concerns is of insider threats, where legitimate users of the system abuse the access privileges they hold. The insider threat to data security means that an insider steals or leaks sensitive personal information.
arxiv
Cancer‐associated fibroblasts (CAFs) promote cancer growth, invasion (metastasis), and drug resistance. Here, we identified functional and diverse circulating CAFs (cCAFs) in patients with metastatic prostate cancer (mPCa). cCAFs were found in higher numbers and were functional and diverse in mPCa patients versus healthy individuals, suggesting their ...
Richell Booijink+6 more
wiley +1 more source
Security Enrichment in Intrusion Detection System Using Classifier Ensemble
In the era of Internet and with increasing number of people as its end users, a large number of attack categories are introduced daily. Hence, effective detection of various attacks with the help of Intrusion Detection Systems is an emerging trend in ...
Uma R. Salunkhe, Suresh N. Mali
doaj +1 more source
Hybrid feature selection technique for intrusion detection system [PDF]
High dimensionality’s problems have make feature selection as one of the most important criteria in determining the efficiency of intrusion detection systems.
Kamarudin, Muhammad Hilmi+2 more
core +1 more source
Surfaceome: a new era in the discovery of immune evasion mechanisms of circulating tumor cells
In the era of immunotherapies, many patients either do not respond or eventually develop resistance. We propose to pave the way for proteomic analysis of surface‐expressed proteins called surfaceome, of circulating tumor cells. This approach seeks to identify immune evasion mechanisms and discover potential therapeutic targets. Circulating tumor cells (
Doryan Masmoudi+3 more
wiley +1 more source
Analysis of intrusion detection systems
With the development of information technologies, the amount of vulnerabilities and threats to various data processing systems is increasing, therefore specialized means of security are required to ensure their normal operation and to prevent intrusions, and a promising area that is actively developing in the field of information security is the ...
Anna Korchenko+3 more
openaire +3 more sources
Circulating tumor DNA (ctDNA) offers a possibility for different applications in early and late stage breast cancer management. In early breast cancer tumor informed approaches are increasingly used for detecting molecular residual disease (MRD) and early recurrence. In advanced stage, ctDNA provides a possibility for monitoring disease progression and
Eva Valentina Klocker+14 more
wiley +1 more source
Verifikasi Peringatan Berdasarkan Klasifikasi Serangan Pada Deteksi Intrusi Kolaboratif [PDF]
Since long time ago, Intrusion detection system has been used to detect into the computer network or computer it self and to find attacks. Intrusion detection system detects the intrusions of the system according to the activities of the systems.
Hakim, Riffin Sukmana+2 more
core
Cell‐free and extracellular vesicle microRNAs with clinical utility for solid tumors
Cell‐free microRNAs (cfmiRs) are small‐RNA circulating molecules detectable in almost all body biofluids. Innovative technologies have improved the application of cfmiRs to oncology, with a focus on clinical needs for different solid tumors, but with emphasis on diagnosis, prognosis, cancer recurrence, as well as treatment monitoring.
Yoshinori Hayashi+6 more
wiley +1 more source
TII-SSRC-23 Dataset: Typological Exploration of Diverse Traffic Patterns for Intrusion Detection [PDF]
The effectiveness of network intrusion detection systems, predominantly based on machine learning, are highly influenced by the dataset they are trained on. Ensuring an accurate reflection of the multifaceted nature of benign and malicious traffic in these datasets is essential for creating models capable of recognizing and responding to a wide array ...
arxiv