Results 71 to 80 of about 988,120 (358)
We quantified and cultured circulating tumor cells (CTCs) of 62 patients with various cancer types and generated CTC‐derived tumoroid models from two salivary gland cancer patients. Cellular liquid biopsy‐derived information enabled molecular genetic assessment of systemic disease heterogeneity and functional testing for therapy selection in both ...
Nataša Stojanović Gužvić+31 more
wiley +1 more source
A cognitive based Intrusion detection system
Intrusion detection is one of the primary mechanisms to provide computer networks with security. With an increase in attacks and growing dependence on various fields such as medicine, commercial, and engineering to give services over a network, securing ...
Menhaj, Mohammad Bagher+1 more
core
INTRUSION DETECTION SYSTEM [PDF]
An Intrusion detection system is generally considered to be any system designed to detect attempts compromise the integrity, confidentiality or availability of the protected network and associated computer systems.
Mohamad, Abdul Hadi
core
On the model-checking-based IDS [PDF]
How to identify the comprehensive comparable performance of various Intrusion Detection (ID) algorithms which are based on the Model Checking (MC) techniques? To address this open issue, we conduct some tests for the model-checking-based intrusion detection systems (IDS) algorithms.
arxiv
Adaptive ERK reactivation hinders FLT3 tyrosine kinase inhibitor (TKI) treatment in FLT3/ITD acute myeloid leukemia. Here, we report that FLT3 TKI treatment rapidly induces AXL expression and upregulation that is temporally associated with the adaptive ERK reactivation.
Tessa S. Seale+9 more
wiley +1 more source
Research on industrial control system intrusion detection method based on simulation modelling
At present,intrusion detection system over fieldbus network layer was a basic protection method in industrial control system.However,it has some weakness,such as poor generality,high false-positive rate,and unable to detect unknown anomaly.An industrial ...
Yi-wei GAO+5 more
doaj +2 more sources
Intrusion Detection System using Bayesian Network Modeling [PDF]
Computer Network Security has become a critical and important issue due to ever increasing cyber-crimes. Cybercrimes are spanning from simple piracy crimes to information theft in international terrorism.
Abouzakhar, Nasser+3 more
core
An Intrusion Detection Architecture for Clustered Wireless Ad Hoc Networks [PDF]
Intrusion detection in wireless ad hoc networks is a challenging task because these networks change their topologies dynamically, lack concentration points where aggregated traffic can be analyzed, utilize infrastructure protocols that are susceptible to manipulation, and rely on noisy, intermittent wireless communications.
arxiv +1 more source
The authors analyzed the spatial distributions of gene and metabolite profiles in cervical cancer through spatial transcriptomic and spatially resolved metabolomic techniques. Pivotal genes and metabolites within these cases were then identified and validated.
Lixiu Xu+3 more
wiley +1 more source
Supervisory control and data acquisition systems are critical in Industry 4.0 for controlling and monitoring industrial processes. However, these systems are vulnerable to various attacks, and therefore, intelligent and robust intrusion detection systems
M. Agus Syamsul Arifin+6 more
doaj +1 more source