Results 61 to 70 of about 291,448 (281)

EDNRB‐dependent endothelin signaling reduces proliferation and promotes proneural‐to‐mesenchymal transition in gliomas

open access: yesMolecular Oncology, EarlyView.
Glioma cells mainly express the endothelin receptor EDNRB, while EDNRA is restricted to a perivascular tumor subpopulation. Endothelin signaling reduces glioma cell proliferation while promoting migration and a proneural‐to‐mesenchymal transition associated with poor prognosis. This pathway activates Ca2+, K+, ERK, and STAT3 signalings and is regulated
Donovan Pineau   +36 more
wiley   +1 more source

Detection of denial-of-service attacks based on computer vision techniques [PDF]

open access: yes, 2013
University of Technology, Sydney. Faculty of Engineering and Information Technology.A Denial-of-Service (DoS) attack is an intrusive attempt, which aims to force a designated resource (e.g., network bandwidth, processor time or memory) to be unavailable ...
Tan, Z
core  

Somatic mutational landscape in von Hippel–Lindau familial hemangioblastoma

open access: yesMolecular Oncology, EarlyView.
The causes of central nervous system (CNS) hemangioblastoma in Von Hippel–Lindau (vHL) disease are unclear. We used Whole Exome Sequencing (WES) on familial hemangioblastoma to investigate events that underlie tumor development. Our findings suggest that VHL loss creates a permissive environment for tumor formation, while additional alterations ...
Maja Dembic   +5 more
wiley   +1 more source

Hippo pathway at the crossroads of stemness and therapeutic resistance in breast cancer

open access: yesMolecular Oncology, EarlyView.
Dysregulation of the Hippo pathway drives nuclear accumulation of YAP/TAZ, activating stemness‐related transcriptional programs that sustain breast cancer stemness and fuel therapeutic resistance across subtypes, underscoring Hippo signaling as a targetable vulnerability. Figure created and edited with BioRender.com.
Giulia Schiavoni   +11 more
wiley   +1 more source

Hijacking emergency granulopoiesis: Neutrophil ontogeny and reprogramming in cancer

open access: yesMolecular Oncology, EarlyView.
Neutrophils are highly plastic innate immune cells; their functions in cancer extend beyond the tumour microenvironment. This Review summarises current understanding of neutrophil maturation and heterogeneity and highlights tumour‐induced granulopoiesis as a systemic programme that expands immature, immunosuppressive neutrophils via tumour‐derived ...
Gabriela Marinescu, Yi Feng
wiley   +1 more source

Insider Attacker Detection in Wireless Sensor Networks [PDF]

open access: yesIEEE INFOCOM 2007 - 26th IEEE International Conference on Computer Communications, 2007
Though destructive to network functions, insider attackers are not detectable with only the classic cryptography-based techniques. Many mission-critic sensor network applications demand an effective, light, flexible algorithm for internal adversary identification with only localized information available.
Fang Liu 0025   +2 more
openaire   +1 more source

A High‐Sensitivity Circulating Nucleic Acid Sequencing Assay for Assessing Treatment Response to Alectinib in a Pediatric Patient With ALK‐Rearranged Non–Small Cell Lung Cancer

open access: yes
Pediatric Blood &Cancer, EarlyView.
Alberto D. Guerra   +9 more
wiley   +1 more source

Microglial dynamics and ferroptosis induction in human iPSC‐derived neuron–astrocyte–microglia tri‐cultures

open access: yesFEBS Open Bio, EarlyView.
A tri‐culture of iPSC‐derived neurons, astrocytes, and microglia treated with ferroptosis inducers as an Induced ferroptosis model was characterized by scRNA‐seq, cell survival, and cytokine release assays. This analysis revealed diverse microglial transcriptomic changes, indicating that the system captures key aspects of the complex cellular ...
Hongmei Lisa Li   +6 more
wiley   +1 more source

SIP Flooding Attack Detection Technology of Multi-agent System Covert Network Based on BiGRU Algorithm

open access: yesInternational Journal of Computational Intelligence Systems
The hidden network environment of multi-agent systems is complex and intricate. The data characteristics generated by SIP flood attacks may overlap and confuse with normal traffic characteristics, and the network traffic characteristics will dynamically ...
Tong Wu   +5 more
doaj   +1 more source

Intrusion detection mechanisms for VoIP applications [PDF]

open access: yes, 2006
VoIP applications are emerging today as an important component in business and communication industry. In this paper, we address the intrusion detection and prevention in VoIP networks and describe how a conceptual solution based on the Bayes inference ...
Festor, Olivier   +2 more
core   +3 more sources

Home - About - Disclaimer - Privacy