Results 41 to 50 of about 291,448 (281)
A Machine-Synesthetic Approach To DDoS Network Attack Detection
In the authors' opinion, anomaly detection systems, or ADS, seem to be the most perspective direction in the subject of attack detection, because these systems can detect, among others, the unknown (zero-day) attacks.
A Mohiuddin +7 more
core +1 more source
ABSTRACT Objective To evaluate selumetinib exposure using therapeutic drug monitoring (TDM) in pediatric patients with neurofibromatosis type 1 (NF1) and plexiform neurofibromas (PN), assess interpatient pharmacokinetic variability, and explore the relationship between drug exposure, clinical response, and adverse effects.
Janka Kovács +8 more
wiley +1 more source
Feature Engineering for Detection of Wormhole Attacking in Mobile Ad Hoc Networks with Machine Learning Methods [PDF]
Due to the self-configuring nature of a Mobile Ad Hoc Network (MANET), each node must participate in the routing process, in addition to its other activities.
Dooley, Laurence S. +3 more
core
An Intelligent Communication Warning Vulnerability Detection Algorithm Based on IoT Technology
This paper mainly studies the vulnerability intelligent early warning technology in the IoT environment, and studies the network security assessment method based on the attack graph association analysis of the IoT environment, and analyzes the attack ...
Mao Yi, Xiaohui Xu, Lei Xu
doaj +1 more source
A machine learning approach with verification of predictions and assisted supervision for a rule-based network intrusion detection system [PDF]
Network security is a branch of network management in which network intrusion detection systems provide attack detection features by monitorization of traffic data.
Fernández Villamor, José Ignacio +1 more
core +1 more source
Modified Apriori Approach for Evade Network Intrusion Detection System
Intrusion Detection System or IDS is a software or hardware tool that repeatedly scans and monitors events that took place in a computer or a network.
Chandankhede, Chaitali +2 more
core +1 more source
A neural network application for attack detection in computer networks
This work presents a network intrusion detection method, created to identify and classify illegitimate information in TCP/IP packet payload based on the Snort signature set that represents possible attacks to a network. For this development, a type of neural network named Hamming net was used.
Lília de Sá Silva +3 more
openaire +2 more sources
Structural biology of ferritin nanocages
Ferritin is a conserved iron‐storage protein that sequesters iron as a ferric mineral core within a nanocage, protecting cells from oxidative damage and maintaining iron homeostasis. This review discusses ferritin biology, structure, and function, and highlights recent cryo‐EM studies revealing mechanisms of ferritinophagy, cellular iron uptake, and ...
Eloise Mastrangelo, Flavio Di Pisa
wiley +1 more source
Research on wormhole attacks in wireless mesh networks
In order to detect the wormhole attacks effectively in wireless mesh network,a wormhole attack model ac-cording to the MR-LQSR(multi-radio link-quality source routing) protocol proposed by Microsoft was presented.Then,the characteristics of wireless mesh
FU Ying-fang1 +3 more
doaj +2 more sources
We identified a systemic, progressive loss of protein S‐glutathionylation—detected by nonreducing western blotting—alongside dysregulation of glutathione‐cycle enzymes in both neuronal and peripheral tissues of Taiwanese SMA mice. These alterations were partially rescued by SMN antisense oligonucleotide therapy, revealing persistent redox imbalance as ...
Sofia Vrettou, Brunhilde Wirth
wiley +1 more source

