Results 41 to 50 of about 666,217 (308)

Labelled Dataset on Distributed Denial-of-Service (DDoS) Attacks Based on Internet Control Message Protocol Version 6 (ICMPv6)

open access: yesWireless Communications and Mobile Computing, 2022
The most dangerous attack against IPv6 networks today is a distributed denial-of-service (DDoS) attack using Internet Control Message Protocol version 6 (ICMPv6) messages. Many ICMPv6-DDoS attack detection mechanisms rely on self-created datasets because very few suitable ICMPv6-DDoS attack datasets are publicly available due to privacy and security ...
Selvakumar Manickam   +6 more
openaire   +1 more source

Privacy-preserving scoring of tree ensembles : a novel framework for AI in healthcare [PDF]

open access: yes, 2018
Machine Learning (ML) techniques now impact a wide variety of domains. Highly regulated industries such as healthcare and finance have stringent compliance and data governance policies around data sharing.
De Cock, Martine   +6 more
core   +1 more source

Protocol to generate fast-dissociating recombinant antibody fragments for multiplexed super-resolution microscopy

open access: yesSTAR Protocols, 2023
Summary: Multiplexed high-density label super-resolution microscopy image reconstruction by integrating exchangeable single-molecule localization (IRIS) enables elucidating fine structures and molecular distribution in cells and tissues.
Qianli Zhang   +2 more
doaj  

Somatic Differentiation and MR Imaging of Magnetically Labeled Human Embryonic Stem Cells

open access: yesCell Transplantation, 2012
Magnetic resonance (MR) imaging of superparamagnetic iron oxide (SPIO)-labeled stem cells offers a non-invasive evaluation of stem cell engraftment in host organs.
Hossein Nejadnik   +10 more
doaj   +1 more source

High-level Counterexamples for Probabilistic Automata [PDF]

open access: yes, 2015
Providing compact and understandable counterexamples for violated system properties is an essential task in model checking. Existing works on counterexamples for probabilistic systems so far computed either a large set of system runs or a subset of the ...
Jansen, Nils   +3 more
core   +1 more source

Extracting histones for the specific purpose of label-free MS [PDF]

open access: yes, 2016
Extracting histones from cells is the first step in studies that aim to characterize histones and their post-translational modifications (hPTMs) with MS.
De Clerck, Laura   +9 more
core   +2 more sources

Quantitative Characterization of the T Cell Receptor Repertoire of Naïve and Memory Subsets Using an Integrated Experimental and Computational Pipeline Which Is Robust, Economical, and Versatile

open access: yesFrontiers in Immunology, 2017
The T cell receptor (TCR) repertoire can provide a personalized biomarker for infectious and non-infectious diseases. We describe a protocol for amplifying, sequencing, and analyzing TCRs which is robust, sensitive, and versatile.
Theres Oakes   +13 more
doaj   +1 more source

24 versus 48 Weeks of Peginterferon Plus Ribavirin in Hepatitis C Virus Genotype 6 Chronically Infected Patients with a Rapid Virological Response: A Non-Inferiority Randomized Controlled Trial. [PDF]

open access: yesPLoS ONE, 2015
The optimal treatment of hepatitis C virus (HCV) genotype 6 is unclear owing to its limited geographic distribution. Because of a high predictive value of rapid virological response (RVR) for sustained virological response (SVR), we conducted an open ...
Qingxian Cai   +21 more
doaj   +1 more source

More is Less: Perfectly Secure Oblivious Algorithms in the Multi-Server Setting [PDF]

open access: yes, 2018
The problem of Oblivious RAM (ORAM) has traditionally been studied in a single-server setting, but more recently the multi-server setting has also been considered. Yet it is still unclear whether the multi-server setting has any inherent advantages, e.g.,
E Shi   +8 more
core   +2 more sources

Home - About - Disclaimer - Privacy