Results 81 to 90 of about 162,879 (307)
Dual targeting of RET and SRC synergizes in RET fusion‐positive cancer cells
Despite the strong activity of selective RET tyrosine kinase inhibitors (TKIs), resistance of RET fusion‐positive (RET+) lung cancer and thyroid cancer frequently occurs and is mainly driven by RET‐independent bypass mechanisms. Son et al. show that SRC TKIs significantly inhibit PAK and AKT survival signaling and enhance the efficacy of RET TKIs in ...
Juhyeon Son +13 more
wiley +1 more source
Generation of two normal and tumour (cancerous) paired human cell lines using an established tissue culture technique and their characterisation is described. Cell lines were characterised at cellular, protein, chromosome and gene expression levels and for HPV status.
Simon Broad +12 more
wiley +1 more source
Reinforced Intrusion Detection Using Pursuit Reinforcement Competitive Learning
Today, information technology is growing rapidly,all information can be obtainedmuch easier. It raises some new problems; one of them is unauthorized access to the system.
Indah Yulia Prafitaning Tiyas +3 more
doaj +3 more sources
Applying an Ontology to a Patrol Intrusion Detection System for Wireless Sensor Networks
With the increasing application of wireless sensor networks (WSN), the security requirements for wireless sensor network communications have become critical. However, the detection mechanisms of such systems impact the effectiveness of the entire network.
Chia-Fen Hsieh +2 more
doaj +1 more source
The noncoding region of the genome plays a key role in regulating gene expression, and mutations within these regions are capable of altering it. Researchers have identified multiple functional noncoding mutations associated with increased cancer risk in the genome of breast cancer patients.
Arnau Cuy Saqués +3 more
wiley +1 more source
Verifikasi Peringatan Berdasarkan Klasifikasi Serangan Pada Deteksi Intrusi Kolaboratif [PDF]
Since long time ago, Intrusion detection system has been used to detect into the computer network or computer it self and to find attacks. Intrusion detection system detects the intrusions of the system according to the activities of the systems.
Hakim, Riffin Sukmana +2 more
core
Efficient Computer Network Anomaly Detection by Changepoint Detection Methods
We consider the problem of efficient on-line anomaly detection in computer network traffic. The problem is approached statistically, as that of sequential (quickest) changepoint detection.
Polunchenko, Aleksey S. +2 more
core +1 more source
The 5th edition of the European Code Against Cancer (ECAC5) contains 14 recommendations on cancer prevention. Here, we update the cancer prevention recommendations regarding the use of hormone replacement therapy (HRT), which is positioned as recommendation number 13 of the ECAC5.
Mangesh A. Thorat +18 more
wiley +1 more source
A machine learning approach with verification of predictions and assisted supervision for a rule-based network intrusion detection system [PDF]
Network security is a branch of network management in which network intrusion detection systems provide attack detection features by monitorization of traffic data.
Fernández Villamor, José Ignacio +1 more
core +1 more source
An End-to-End Framework for Machine Learning-Based Network Intrusion Detection System [PDF]
Gustavo de Carvalho Bertoli +8 more
openalex +1 more source

