Results 61 to 70 of about 290,193 (257)

Threshold verification using statistical approach for fast attack detection [PDF]

open access: yes, 2009
Network has grows to a mammoth size and becoming more complex, thus exposing the services it offers towards multiple types of intrusion vulnerabilities.One method to overcome intrusion is by introducing Intrusion Detection System (IDS) for detecting the
Abdollah, Mohd Faizal   +4 more
core   +1 more source

Attack Detection in Sensor Network Target Localization Systems with Quantized Data

open access: yes, 2017
We consider a sensor network focused on target localization, where sensors measure the signal strength emitted from the target. Each measurement is quantized to one bit and sent to the fusion center.
Blum, Rick S.   +3 more
core   +1 more source

Exploiting metabolic adaptations to overcome dabrafenib treatment resistance in melanoma cells

open access: yesMolecular Oncology, EarlyView.
We show that dabrafenib‐resistant melanoma cells undergo mitochondrial remodeling, leading to elevated respiration and ROS production balanced by stronger antioxidant defenses. This altered redox state promotes survival despite mitochondrial damage but renders resistant cells highly vulnerable to ROS‐inducing compounds such as PEITC, highlighting redox
Silvia Eller   +17 more
wiley   +1 more source

Developing evidence‐based, cost‐effective P4 cancer medicine for driving innovation in prevention, therapeutics, patient care and reducing healthcare inequalities

open access: yesMolecular Oncology, EarlyView.
The cancer problem is increasing globally with projections up to the year 2050 showing unfavourable outcomes in terms of incidence and cancer‐related deaths. The main challenges are prevention, improved therapeutics resulting in increased cure rates and enhanced health‐related quality of life.
Ulrik Ringborg   +43 more
wiley   +1 more source

Detecting Sybil attacks in vehicular networks [PDF]

open access: yesJournal of Trust Management, 2014
Abstract Abstract A Sybil attack consists of an adversary assuming multiple identities to defeat the trust of an existing reputation system. When Sybil attacks are launched in vehicular networks, the mobility of vehicles increases the difficulty of identifying the malicious vehicle location.
Al-Mutaz, Muhammad   +2 more
openaire   +1 more source

Tumour–host interactions in Drosophila: mechanisms in the tumour micro‐ and macroenvironment

open access: yesMolecular Oncology, EarlyView.
This review examines how tumour–host crosstalk takes place at multiple levels of biological organisation, from local cell competition and immune crosstalk to organism‐wide metabolic and physiological collapse. Here, we integrate findings from Drosophila melanogaster studies that reveal conserved mechanisms through which tumours hijack host systems to ...
José Teles‐Reis, Tor Erik Rusten
wiley   +1 more source

Synthetic Iris Presentation Attack using iDCGAN

open access: yes, 2017
Reliability and accuracy of iris biometric modality has prompted its large-scale deployment for critical applications such as border control and national ID projects.
Kohli, Naman   +4 more
core   +1 more source

Sybil Attack Detection in Vehicular Networks [PDF]

open access: yesComputer Science and Information Technology, 2014
Vehicular communication intends to improve the traffic safety for decreasing number of accidents and manages traffic for saving money and time. In vehicular communication, vehicles communicate wirelessly and so security of this network against attackers should be considered.
Ali Akbar Pouyan, Mahdiyeh Alimohammadi
openaire   +1 more source

Rethinking plastic waste: innovations in enzymatic breakdown of oil‐based polyesters and bioplastics

open access: yesFEBS Open Bio, EarlyView.
Plastic pollution remains a critical environmental challenge, and current mechanical and chemical recycling methods are insufficient to achieve a fully circular economy. This review highlights recent breakthroughs in the enzymatic depolymerization of both oil‐derived polyesters and bioplastics, including high‐throughput protein engineering, de novo ...
Elena Rosini   +2 more
wiley   +1 more source

SIP Flooding Attack Detection Technology of Multi-agent System Covert Network Based on BiGRU Algorithm

open access: yesInternational Journal of Computational Intelligence Systems
The hidden network environment of multi-agent systems is complex and intricate. The data characteristics generated by SIP flood attacks may overlap and confuse with normal traffic characteristics, and the network traffic characteristics will dynamically ...
Tong Wu   +5 more
doaj   +1 more source

Home - About - Disclaimer - Privacy