Results 71 to 80 of about 150,878 (273)

Potential therapeutic targeting of BKCa channels in glioblastoma treatment

open access: yesMolecular Oncology, EarlyView.
This review summarizes current insights into the role of BKCa and mitoBKCa channels in glioblastoma biology, their potential classification as oncochannels, and the emerging pharmacological strategies targeting these channels, emphasizing the translational challenges in developing BKCa‐directed therapies for glioblastoma treatment.
Kamila Maliszewska‐Olejniczak   +4 more
wiley   +1 more source

Passive intrusion detection system [PDF]

open access: yes, 1980
An intrusion detection system is described in which crystal oscillators are used to provide a frequency which varies as a function of fluctuations of a particular environmental property of the atmosphere, e.g., humidity, in the protected volume.
Laue, E. G.
core   +1 more source

Comparison of System Call Representations for Intrusion Detection

open access: yes, 2019
Over the years, artificial neural networks have been applied successfully in many areas including IT security. Yet, neural networks can only process continuous input data.
A Sharma   +9 more
core   +1 more source

Exploiting metabolic adaptations to overcome dabrafenib treatment resistance in melanoma cells

open access: yesMolecular Oncology, EarlyView.
We show that dabrafenib‐resistant melanoma cells undergo mitochondrial remodeling, leading to elevated respiration and ROS production balanced by stronger antioxidant defenses. This altered redox state promotes survival despite mitochondrial damage but renders resistant cells highly vulnerable to ROS‐inducing compounds such as PEITC, highlighting redox
Silvia Eller   +17 more
wiley   +1 more source

Reinforced Intrusion Detection Using Pursuit Reinforcement Competitive Learning

open access: yesEmitter: International Journal of Engineering Technology, 2014
Today, information technology is growing rapidly,all information can be obtainedmuch easier. It raises some new problems; one of them is unauthorized access to the system.
Indah Yulia Prafitaning Tiyas   +3 more
doaj   +3 more sources

Perancangan Dan Analisis Sistem Pendeteksi Intrusi Berbasis Network Intrusion Detection System (Nids) Pada Sistem Keamanan Jaringan Komputer [PDF]

open access: yes, 2013
Network intrusion detection system is a system that can detect illegal accesses or intrusions happened in a computer network. Actually, there are many types of intrusion detection systems and the differences are based on how network administrators ...
Gozali, F. (Ferrianto)   +1 more
core  

Modified Apriori Approach for Evade Network Intrusion Detection System

open access: yes, 2014
Intrusion Detection System or IDS is a software or hardware tool that repeatedly scans and monitors events that took place in a computer or a network.
Chandankhede, Chaitali   +2 more
core   +1 more source

Plecstatin inhibits hepatocellular carcinoma tumorigenesis and invasion through cytolinker plectin

open access: yesMolecular Oncology, EarlyView.
The ruthenium‐based metallodrug plecstatin exerts its anticancer effect in hepatocellular carcinoma (HCC) primarily through selective targeting of plectin. By disrupting plectin‐mediated cytoskeletal organization, plecstatin inhibits anchorage‐dependent growth, cell polarization, and tumor cell dissemination.
Zuzana Outla   +10 more
wiley   +1 more source

Oversampling and undersampling for intrusion detection system in the supervisory control and data acquisition IEC 60870‐5‐104

open access: yesIET Cyber-Physical Systems
Supervisory control and data acquisition systems are critical in Industry 4.0 for controlling and monitoring industrial processes. However, these systems are vulnerable to various attacks, and therefore, intelligent and robust intrusion detection systems
M. Agus Syamsul Arifin   +6 more
doaj   +1 more source

IDSGAN: Generative Adversarial Networks for Attack Generation against Intrusion Detection

open access: yes, 2019
As an important tool in security, the intrusion detection system bears the responsibility of the defense to network attacks performed by malicious traffic.
Lin, Zilong, Shi, Yong, Xue, Zhi
core  

Home - About - Disclaimer - Privacy