Results 81 to 90 of about 156,609 (316)
Supervisory control and data acquisition systems are critical in Industry 4.0 for controlling and monitoring industrial processes. However, these systems are vulnerable to various attacks, and therefore, intelligent and robust intrusion detection systems
M. Agus Syamsul Arifin+6 more
doaj +1 more source
Dual targeting of AKT and mTOR using MK2206 and RAD001 reduces tumor burden in an intracardiac colon cancer circulating tumor cell xenotransplantation model. Analysis of AKT isoform‐specific knockdowns in CTC‐MCC‐41 reveals differentially regulated proteins and phospho‐proteins by liquid chromatography coupled mass spectrometry. Circulating tumor cells
Daniel J. Smit+19 more
wiley +1 more source
K-nearst Neigbour (Knn) untuk Mendeteksi Gangguan Jaringan Komputer pada Intrusion Detection Dataset [PDF]
Internet increasing is also exponentially increasing intrusion or attacks by crackers exploit vulnerabilitiesin Internet protocols, operating systems and software applications.
Susanto, B. M. (Bekti)
core
Efficient Computer Network Anomaly Detection by Changepoint Detection Methods
We consider the problem of efficient on-line anomaly detection in computer network traffic. The problem is approached statistically, as that of sequential (quickest) changepoint detection.
Polunchenko, Aleksey S.+2 more
core +1 more source
Inhibitor of DNA binding‐1 is a key regulator of cancer cell vasculogenic mimicry
Elevated expression of transcriptional regulator inhibitor of DNA binding 1 (ID1) promoted cancer cell‐mediated vasculogenic mimicry (VM) through regulation of pro‐angiogenic and pro‐cancerous genes (e.g. VE‐cadherin (CDH5), TIE2, MMP9, DKK1). Higher ID1 expression also increased metastases to the lung and the liver.
Emma J. Thompson+11 more
wiley +1 more source
Reinforced Intrusion Detection Using Pursuit Reinforcement Competitive Learning
Today, information technology is growing rapidly,all information can be obtainedmuch easier. It raises some new problems; one of them is unauthorized access to the system.
Indah Yulia Prafitaning Tiyas+3 more
doaj +3 more sources
A machine learning approach with verification of predictions and assisted supervision for a rule-based network intrusion detection system [PDF]
Network security is a branch of network management in which network intrusion detection systems provide attack detection features by monitorization of traffic data.
Fernández Villamor, José Ignacio+1 more
core +1 more source
Modified Apriori Approach for Evade Network Intrusion Detection System
Intrusion Detection System or IDS is a software or hardware tool that repeatedly scans and monitors events that took place in a computer or a network.
Chandankhede, Chaitali+2 more
core +1 more source
Nuclear prothymosin α inhibits epithelial‐mesenchymal transition (EMT) in lung cancer by increasing Smad7 acetylation and competing with Smad2 for binding to SNAI1, TWIST1, and ZEB1 promoters. In early‐stage cancer, ProT suppresses TGF‐β‐induced EMT, while its loss in the nucleus in late‐stage cancer leads to enhanced EMT and poor prognosis.
Liyun Chen+12 more
wiley +1 more source
This study develops a semi‐supervised classifier integrating multi‐genomic data (1404 training/5893 validation samples) to improve homologous recombination deficiency (HRD) detection in breast cancer. Our method demonstrates prognostic value and predicts chemotherapy/PARP inhibitor sensitivity in HRD+ tumours.
Rong Zhu+12 more
wiley +1 more source