Results 71 to 80 of about 988,120 (358)

Cellular liquid biopsy provides unique chances for disease monitoring, preclinical model generation and therapy adjustment in rare salivary gland cancer patients

open access: yesMolecular Oncology, EarlyView.
We quantified and cultured circulating tumor cells (CTCs) of 62 patients with various cancer types and generated CTC‐derived tumoroid models from two salivary gland cancer patients. Cellular liquid biopsy‐derived information enabled molecular genetic assessment of systemic disease heterogeneity and functional testing for therapy selection in both ...
Nataša Stojanović Gužvić   +31 more
wiley   +1 more source

A cognitive based Intrusion detection system

open access: yes, 2020
Intrusion detection is one of the primary mechanisms to provide computer networks with security. With an increase in attacks and growing dependence on various fields such as medicine, commercial, and engineering to give services over a network, securing ...
Menhaj, Mohammad Bagher   +1 more
core  

INTRUSION DETECTION SYSTEM [PDF]

open access: yes, 2004
An Intrusion detection system is generally considered to be any system designed to detect attempts compromise the integrity, confidentiality or availability of the protected network and associated computer systems.
Mohamad, Abdul Hadi
core  

On the model-checking-based IDS [PDF]

open access: yesarXiv, 2018
How to identify the comprehensive comparable performance of various Intrusion Detection (ID) algorithms which are based on the Model Checking (MC) techniques? To address this open issue, we conduct some tests for the model-checking-based intrusion detection systems (IDS) algorithms.
arxiv  

Targeting rapid TKI‐induced AXL upregulation overcomes adaptive ERK reactivation and exerts antileukemic effects in FLT3/ITD acute myeloid leukemia

open access: yesMolecular Oncology, EarlyView.
Adaptive ERK reactivation hinders FLT3 tyrosine kinase inhibitor (TKI) treatment in FLT3/ITD acute myeloid leukemia. Here, we report that FLT3 TKI treatment rapidly induces AXL expression and upregulation that is temporally associated with the adaptive ERK reactivation.
Tessa S. Seale   +9 more
wiley   +1 more source

Research on industrial control system intrusion detection method based on simulation modelling

open access: yesTongxin xuebao, 2017
At present,intrusion detection system over fieldbus network layer was a basic protection method in industrial control system.However,it has some weakness,such as poor generality,high false-positive rate,and unable to detect unknown anomaly.An industrial ...
Yi-wei GAO   +5 more
doaj   +2 more sources

Intrusion Detection System using Bayesian Network Modeling [PDF]

open access: yes, 2014
Computer Network Security has become a critical and important issue due to ever increasing cyber-crimes. Cybercrimes are spanning from simple piracy crimes to information theft in international terrorism.
Abouzakhar, Nasser   +3 more
core  

An Intrusion Detection Architecture for Clustered Wireless Ad Hoc Networks [PDF]

open access: yes, 2010
Intrusion detection in wireless ad hoc networks is a challenging task because these networks change their topologies dynamically, lack concentration points where aggregated traffic can be analyzed, utilize infrastructure protocols that are susceptible to manipulation, and rely on noisy, intermittent wireless communications.
arxiv   +1 more source

Combined spatially resolved metabolomics and spatial transcriptomics reveal the mechanism of RACK1‐mediated fatty acid synthesis

open access: yesMolecular Oncology, EarlyView.
The authors analyzed the spatial distributions of gene and metabolite profiles in cervical cancer through spatial transcriptomic and spatially resolved metabolomic techniques. Pivotal genes and metabolites within these cases were then identified and validated.
Lixiu Xu   +3 more
wiley   +1 more source

Oversampling and undersampling for intrusion detection system in the supervisory control and data acquisition IEC 60870‐5‐104

open access: yesIET Cyber-Physical Systems
Supervisory control and data acquisition systems are critical in Industry 4.0 for controlling and monitoring industrial processes. However, these systems are vulnerable to various attacks, and therefore, intelligent and robust intrusion detection systems
M. Agus Syamsul Arifin   +6 more
doaj   +1 more source

Home - About - Disclaimer - Privacy