Results 71 to 80 of about 1,142,874 (336)

Circulating histones as clinical biomarkers in critically ill conditions

open access: yesFEBS Letters, EarlyView.
Circulating histones are emerging as promising biomarkers in critical illness due to their diagnostic, prognostic, and therapeutic potential. Detection methods such as ELISA and mass spectrometry provide reliable approaches for quantifying histone levels in plasma samples.
José Luis García‐Gimenez   +17 more
wiley   +1 more source

Real-Time Large-Scale Intrusion Detection and Prevention System (IDPS) CICIoT Dataset Traffic Assessment Based on Deep Learning

open access: yesApplied System Innovation
This research utilizes machine learning (ML), and especially deep learning (DL), techniques for efficient feature extraction of intrusion attacks.
Samuel Kofi Erskine
doaj   +1 more source

A Novel Approach to Android Malware Intrusion Detection Using Zero-Shot Learning GANs

open access: yesSir Syed University Research Journal of Engineering and Technology, 2023
This study proposes an innovative intrusion detection system for Android malware based on a zero-shot learning GAN approach. Our system achieved an accuracy of 99.99%, indicating that this approach can be highly effective for identifying intrusion ...
Syed Atir Raza Shirazi, Mehwish Shaikh
doaj  

Internet of things intrusion detection model and algorithm based on cloud computing and multi-feature extraction extreme learning machine

open access: yesDigital Communications and Networks, 2023
With the rapid development of the Internet of Things (IoT), there are several challenges pertaining to security in IoT applications. Compared with the characteristics of the traditional Internet, the IoT has many problems, such as large assets, complex ...
Haifeng Lin   +3 more
doaj   +1 more source

An Efficient Network Intrusion Detection and Classification System

open access: yesMathematics, 2022
Intrusion detection in computer networks is of great importance because of its effects on the different communication and security domains. The detection of network intrusion is a challenge.
Iftikhar Ahmad   +4 more
semanticscholar   +1 more source

The epithelial barrier theory proposes a comprehensive explanation for the origins of allergic and other chronic noncommunicable diseases

open access: yesFEBS Letters, EarlyView.
Exposure to common noxious agents (1), including allergens, pollutants, and micro‐nanoplastics, can cause epithelial barrier damage (2) in our body's protective linings. This may trigger an immune response to our microbiome (3). The epithelial barrier theory explains how this process can lead to chronic noncommunicable diseases (4) affecting organs ...
Can Zeyneloglu   +17 more
wiley   +1 more source

Security Enrichment in Intrusion Detection System Using Classifier Ensemble

open access: yesJournal of Electrical and Computer Engineering, 2017
In the era of Internet and with increasing number of people as its end users, a large number of attack categories are introduced daily. Hence, effective detection of various attacks with the help of Intrusion Detection Systems is an emerging trend in ...
Uma R. Salunkhe, Suresh N. Mali
doaj   +1 more source

Manhole intrusion detection system with notification stages

open access: yesScientific African, 2021
Appropriate design of intrusion detection systems is extremely important to safeguard critical and valuable infrastructure. Telecommunications companies (TELCOs) and electric power utilities are experiencing an increased rate of rampant underground ...
Felix Mazunga   +2 more
doaj   +1 more source

ERBIN limits epithelial cell plasticity via suppression of TGF‐β signaling

open access: yesFEBS Letters, EarlyView.
In breast and lung cancer patients, low ERBIN expression correlates with poor clinical outcomes. Here, we show that ERBIN inhibits TGF‐β‐induced epithelial‐to‐mesenchymal transition in NMuMG breast and A549 lung adenocarcinoma cell lines. ERBIN suppresses TGF‐β/SMAD signaling and reduces TGF‐β‐induced ERK phosphorylation.
Chao Li   +3 more
wiley   +1 more source

Hybrid Intrusion Detection System Based on the Stacking Ensemble of C5 Decision Tree Classifier and One Class Support Vector Machine

open access: yesElectronics, 2020
Cyberttacks are becoming increasingly sophisticated, necessitating the efficient intrusion detection mechanisms to monitor computer resources and generate reports on anomalous or suspicious activities. Many Intrusion Detection Systems (IDSs) use a single
Ansam Khraisat   +4 more
semanticscholar   +1 more source

Home - About - Disclaimer - Privacy