Results 71 to 80 of about 166,319 (306)

Evaluation of Machine Learning Algorithms for Intrusion Detection System

open access: yes, 2018
Intrusion detection system (IDS) is one of the implemented solutions against harmful attacks. Furthermore, attackers always keep changing their tools and techniques. However, implementing an accepted IDS system is also a challenging task.
Alkasassbeh, Mouhammd   +3 more
core   +1 more source

Characterizing the salivary RNA landscape to identify potential diagnostic, prognostic, and follow‐up biomarkers for breast cancer

open access: yesMolecular Oncology, EarlyView.
This study explores salivary RNA for breast cancer (BC) diagnosis, prognosis, and follow‐up. High‐throughput RNA sequencing identified distinct salivary RNA signatures, including novel transcripts, that differentiate BC from healthy controls, characterize histological and molecular subtypes, and indicate lymph node involvement.
Nicholas Rajan   +9 more
wiley   +1 more source

Research on industrial control system intrusion detection method based on simulation modelling

open access: yesTongxin xuebao, 2017
At present,intrusion detection system over fieldbus network layer was a basic protection method in industrial control system.However,it has some weakness,such as poor generality,high false-positive rate,and unable to detect unknown anomaly.An industrial ...
Yi-wei GAO   +5 more
doaj   +2 more sources

Bridging the gap: Multi‐stakeholder perspectives of molecular diagnostics in oncology

open access: yesMolecular Oncology, EarlyView.
Although molecular diagnostics is transforming cancer care, implementing novel technologies remains challenging. This study identifies unmet needs and technology requirements through a two‐step stakeholder involvement. Liquid biopsies for monitoring applications and predictive biomarker testing emerge as key unmet needs. Technology requirements vary by
Jorine Arnouts   +8 more
wiley   +1 more source

A Multi-Dimensional approach towards Intrusion Detection System

open access: yes, 2012
In this paper, we suggest a multi-dimensional approach towards intrusion detection. Network and system usage parameters like source and destination IP addresses; source and destination ports; incoming and outgoing network traffic data rate and number of ...
Sanyal, Sugata   +1 more
core   +3 more sources

Adenosine‐to‐inosine editing of miR‐200b‐3p is associated with the progression of high‐grade serous ovarian cancer

open access: yesMolecular Oncology, EarlyView.
A‐to‐I editing of miRNAs, particularly miR‐200b‐3p, contributes to HGSOC progression by enhancing cancer cell proliferation, migration and 3D growth. The edited form is linked to poorer patient survival and the identification of novel molecular targets.
Magdalena Niemira   +14 more
wiley   +1 more source

Emerging role of ARHGAP29 in melanoma cell phenotype switching

open access: yesMolecular Oncology, EarlyView.
This study gives first insights into the role of ARHGAP29 in malignant melanoma. ARHGAP29 was revealed to be connected to tumor cell plasticity, promoting a mesenchymal‐like, invasive phenotype and driving tumor progression. Further, it modulates cell spreading by influencing RhoA/ROCK signaling and affects SMAD2 activity. Rho GTPase‐activating protein
Beatrice Charlotte Tröster   +3 more
wiley   +1 more source

Reinforced Intrusion Detection Using Pursuit Reinforcement Competitive Learning

open access: yesEmitter: International Journal of Engineering Technology, 2014
Today, information technology is growing rapidly,all information can be obtainedmuch easier. It raises some new problems; one of them is unauthorized access to the system.
Indah Yulia Prafitaning Tiyas   +3 more
doaj   +3 more sources

Oversampling and undersampling for intrusion detection system in the supervisory control and data acquisition IEC 60870‐5‐104

open access: yesIET Cyber-Physical Systems
Supervisory control and data acquisition systems are critical in Industry 4.0 for controlling and monitoring industrial processes. However, these systems are vulnerable to various attacks, and therefore, intelligent and robust intrusion detection systems
M. Agus Syamsul Arifin   +6 more
doaj   +1 more source

Adaptaquin is selectively toxic to glioma stem cells through disruption of iron and cholesterol metabolism

open access: yesMolecular Oncology, EarlyView.
Adaptaquin selectively kills glioma stem cells while sparing differentiated brain cells. Transcriptomic and proteomic analyses show Adaptaquin disrupts iron and cholesterol homeostasis, with iron chelation amplifying cytotoxicity via cholesterol depletion, mitochondrial dysfunction, and elevated reactive oxygen species.
Adrien M. Vaquié   +16 more
wiley   +1 more source

Home - About - Disclaimer - Privacy