Results 61 to 70 of about 166,319 (306)

Phosphatidylinositol 4‐kinase as a target of pathogens—friend or foe?

open access: yesFEBS Letters, EarlyView.
This graphical summary illustrates the roles of phosphatidylinositol 4‐kinases (PI4Ks). PI4Ks regulate key cellular processes and can be hijacked by pathogens, such as viruses, bacteria and parasites, to support their intracellular replication. Their dual role as essential host enzymes and pathogen cofactors makes them promising drug targets.
Ana C. Mendes   +3 more
wiley   +1 more source

Internet of things intrusion detection model and algorithm based on cloud computing and multi-feature extraction extreme learning machine

open access: yesDigital Communications and Networks, 2023
With the rapid development of the Internet of Things (IoT), there are several challenges pertaining to security in IoT applications. Compared with the characteristics of the traditional Internet, the IoT has many problems, such as large assets, complex ...
Haifeng Lin   +3 more
doaj   +1 more source

Perimeter Intrusion Detective System using Arduino [PDF]

open access: yesAPTIKOM Journal on Computer Science and Information Technologies, 2019
Perimeter intrusion detection systems are an integral part of most physical security systems. Perimeter fencing is widely used to isolate and protect public and private places such as airports, military bases, power stations and security related applications. Fence structures merely prevent a percentage of intrusions or postpone them. A higher level of
Thiri Naing   +2 more
openaire   +1 more source

A cognitive based Intrusion detection system

open access: yes, 2020
Intrusion detection is one of the primary mechanisms to provide computer networks with security. With an increase in attacks and growing dependence on various fields such as medicine, commercial, and engineering to give services over a network, securing ...
Menhaj, Mohammad Bagher   +1 more
core  

Perancangan Dan Analisis Sistem Pendeteksi Intrusi Berbasis Network Intrusion Detection System (Nids) Pada Sistem Keamanan Jaringan Komputer [PDF]

open access: yes, 2013
Network intrusion detection system is a system that can detect illegal accesses or intrusions happened in a computer network. Actually, there are many types of intrusion detection systems and the differences are based on how network administrators ...
Gozali, F. (Ferrianto)   +1 more
core  

Mechanisms of parasite‐mediated disruption of brain vessels

open access: yesFEBS Letters, EarlyView.
Parasites can affect the blood vessels of the brain, often causing serious neurological problems. This review explains how different parasites interact with and disrupt these vessels, what this means for brain health, and why these processes matter. Understanding these mechanisms may help us develop better ways to prevent or treat brain infections in ...
Leonor Loira   +3 more
wiley   +1 more source

The newfound relationship between extrachromosomal DNAs and excised signal circles

open access: yesFEBS Letters, EarlyView.
Extrachromosomal DNAs (ecDNAs) contribute to the progression of many human cancers. In addition, circular DNA by‐products of V(D)J recombination, excised signal circles (ESCs), have roles in cancer progression but have largely been overlooked. In this Review, we explore the roles of ecDNAs and ESCs in cancer development, and highlight why these ...
Dylan Casey, Zeqian Gao, Joan Boyes
wiley   +1 more source

Structural biology of ferritin nanocages

open access: yesFEBS Letters, EarlyView.
Ferritin is a conserved iron‐storage protein that sequesters iron as a ferric mineral core within a nanocage, protecting cells from oxidative damage and maintaining iron homeostasis. This review discusses ferritin biology, structure, and function, and highlights recent cryo‐EM studies revealing mechanisms of ferritinophagy, cellular iron uptake, and ...
Eloise Mastrangelo, Flavio Di Pisa
wiley   +1 more source

Soft-computing-based false alarm reduction for hierarchical data of intrusion detection system

open access: yesInternational Journal of Distributed Sensor Networks, 2019
A false alarm rate of online anomaly-based intrusion detection system is a crucial concern. It is challenging to implement in the real-world scenarios when these anomalies occur sporadically.
Parminder Singh   +4 more
doaj   +1 more source

A survey of intrusion detection system technologies [PDF]

open access: yes, 2016
This paper provides an overview of IDS types and how they work as well as configuration considerations and issues that affect them. Advanced methods of increasing the performance of an IDS are explored such as specification based IDS for protecting ...
Heenan, Ross, Moradpoor, Naghmeh
core  

Home - About - Disclaimer - Privacy