Results 81 to 90 of about 162,879 (307)

Dual targeting of RET and SRC synergizes in RET fusion‐positive cancer cells

open access: yesMolecular Oncology, EarlyView.
Despite the strong activity of selective RET tyrosine kinase inhibitors (TKIs), resistance of RET fusion‐positive (RET+) lung cancer and thyroid cancer frequently occurs and is mainly driven by RET‐independent bypass mechanisms. Son et al. show that SRC TKIs significantly inhibit PAK and AKT survival signaling and enhance the efficacy of RET TKIs in ...
Juhyeon Son   +13 more
wiley   +1 more source

Molecular characterisation of human penile carcinoma and generation of paired epithelial primary cell lines

open access: yesMolecular Oncology, EarlyView.
Generation of two normal and tumour (cancerous) paired human cell lines using an established tissue culture technique and their characterisation is described. Cell lines were characterised at cellular, protein, chromosome and gene expression levels and for HPV status.
Simon Broad   +12 more
wiley   +1 more source

Reinforced Intrusion Detection Using Pursuit Reinforcement Competitive Learning

open access: yesEmitter: International Journal of Engineering Technology, 2014
Today, information technology is growing rapidly,all information can be obtainedmuch easier. It raises some new problems; one of them is unauthorized access to the system.
Indah Yulia Prafitaning Tiyas   +3 more
doaj   +3 more sources

Applying an Ontology to a Patrol Intrusion Detection System for Wireless Sensor Networks

open access: yesInternational Journal of Distributed Sensor Networks, 2014
With the increasing application of wireless sensor networks (WSN), the security requirements for wireless sensor network communications have become critical. However, the detection mechanisms of such systems impact the effectiveness of the entire network.
Chia-Fen Hsieh   +2 more
doaj   +1 more source

Cis‐regulatory and long noncoding RNA alterations in breast cancer – current insights, biomarker utility, and the critical need for functional validation

open access: yesMolecular Oncology, EarlyView.
The noncoding region of the genome plays a key role in regulating gene expression, and mutations within these regions are capable of altering it. Researchers have identified multiple functional noncoding mutations associated with increased cancer risk in the genome of breast cancer patients.
Arnau Cuy Saqués   +3 more
wiley   +1 more source

Verifikasi Peringatan Berdasarkan Klasifikasi Serangan Pada Deteksi Intrusi Kolaboratif [PDF]

open access: yes, 2011
Since long time ago, Intrusion detection system has been used to detect into the computer network or computer it self and to find attacks. Intrusion detection system detects the intrusions of the system according to the activities of the systems.
Hakim, Riffin Sukmana   +2 more
core  

Efficient Computer Network Anomaly Detection by Changepoint Detection Methods

open access: yes, 2012
We consider the problem of efficient on-line anomaly detection in computer network traffic. The problem is approached statistically, as that of sequential (quickest) changepoint detection.
Polunchenko, Aleksey S.   +2 more
core   +1 more source

European Code Against Cancer, 5th edition – hormone replacement therapy, other common medical therapies and cancer

open access: yesMolecular Oncology, EarlyView.
The 5th edition of the European Code Against Cancer (ECAC5) contains 14 recommendations on cancer prevention. Here, we update the cancer prevention recommendations regarding the use of hormone replacement therapy (HRT), which is positioned as recommendation number 13 of the ECAC5.
Mangesh A. Thorat   +18 more
wiley   +1 more source

A machine learning approach with verification of predictions and assisted supervision for a rule-based network intrusion detection system [PDF]

open access: yes, 2008
Network security is a branch of network management in which network intrusion detection systems provide attack detection features by monitorization of traffic data.
Fernández Villamor, José Ignacio   +1 more
core   +1 more source

An End-to-End Framework for Machine Learning-Based Network Intrusion Detection System [PDF]

open access: gold, 2021
Gustavo de Carvalho Bertoli   +8 more
openalex   +1 more source

Home - About - Disclaimer - Privacy