Results 71 to 80 of about 290,193 (257)

Day/night variations of myeloid and lymphoid cell subsets in the murine inguinal lymph node

open access: yesFEBS Open Bio, EarlyView.
The circadian system is involved in the temporal regulation of the immune system. Our study reveals that two innate immune populations, NKT cells and neutrophils, predominate at the beginning of the day in healthy mice, highlighting how the time of day influences immune responses.
Paula M. Wagner   +6 more
wiley   +1 more source

NETWORK INTRUSION DETECTION AND PREVENTION ATTACKS

open access: yesINTERNATIONAL JOURNAL OF COMPUTERS & TECHNOLOGY, 2012
Intrusion detection is an important technology in business sector as well as an active area of research. It is an important tool for information security. A Network Intrusion Detection System is used to monitor networks for attacks or intrusions and report these intrusions to the administrator in order to take evasive action.
openaire   +2 more sources

Diabetes‐induced vascular calcification is associated with low pyrophosphate and its oral supplementation prevents calcification in diabetic mice

open access: yesFEBS Open Bio, EarlyView.
Induction of diabetes in three different mouse strains uniformly resulted in an increase in TNAP activity and a reduction in pyrophosphate (PPi) in the circulation. Inhibition of TNAP restored plasma PPi. Diabetes‐induced calcification in the media layer of the aorta was detected only in the Abcc6−/− strain, which is predisposed to ectopic ...
Krisztina Fülöp   +13 more
wiley   +1 more source

Detection of Multi-Stage Attacks Through Attack Pattern Segmentation

open access: yesIEEE Access
Advanced cyberattack patterns threatening network assets employ various attack vectors, multi-stage attack processes, and diverse penetration strategies.
Seonghyeon Gong   +2 more
doaj   +1 more source

Neural Network Model for Detecting Network Scanning Attacks

open access: yesInternational Journal of Engineering Research and Technology, 2020
© International Research Publication House This paper discusses the concept and problem of detecting network scanning attacks and describes the targets of network scanning attacks. The main attack methods and approaches to scanning network ports are considered. Intrusion detection systems (IDS) are used to detect network scanning attacks.
Panischev O.Y.   +4 more
openaire   +1 more source

Enzymatic degradation of biopolymers in amorphous and molten states: mechanisms and applications

open access: yesFEBS Open Bio, EarlyView.
This review explains how polymer morphology and thermal state shape enzymatic degradation pathways, comparing amorphous and molten biopolymer structures. By integrating structure–reactivity principles with insights from thermodynamics and enzyme engineering, it highlights mechanisms that enable efficient polymer breakdown.
Anđela Pustak, Aleksandra Maršavelski
wiley   +1 more source

Situation Awareness Assessment Approach Based on Attack Traffic and System Vulnerabilities

open access: yesShuju Caiji Yu Chuli
Network security situation assessment plays an important role in the design and implementation of network defense strategies. The existing situation assessment methods gather the information of both attack and defense to construct an assessment model ...
LI Yan   +4 more
doaj   +1 more source

Microglial dynamics and ferroptosis induction in human iPSC‐derived neuron–astrocyte–microglia tri‐cultures

open access: yesFEBS Open Bio, EarlyView.
A tri‐culture of iPSC‐derived neurons, astrocytes, and microglia treated with ferroptosis inducers as an Induced ferroptosis model was characterized by scRNA‐seq, cell survival, and cytokine release assays. This analysis revealed diverse microglial transcriptomic changes, indicating that the system captures key aspects of the complex cellular ...
Hongmei Lisa Li   +6 more
wiley   +1 more source

Multi‐omics and low‐input proteomics profiling reveals dynamic regulation driving pluripotency initiation in early mouse embryos

open access: yesFEBS Open Bio, EarlyView.
Mouse pre‐implantation development involves a transition from totipotency to pluripotency. Integrating transcriptomics, epigenetic profiling, low‐input proteomics and functional assays, we show that eight‐cell embryos retain residual totipotency features, whereas cytoskeletal remodeling regulated by the ubiquitin‐proteasome system drives progression ...
Wanqiong Li   +8 more
wiley   +1 more source

Fuzzy computation on ensemble deep network for the performance of vampire attack detection model in WSN

open access: yesEURASIP Journal on Wireless Communications and Networking
Context Wireless sensor network (WSN) is susceptible to vampire attacks. It is a type of denial of service (DoS) attack that drains sensor nodes’ energy, leading to network failure. The study addresses the challenge by detecting these attacks to conserve
M. Sudha   +3 more
doaj   +1 more source

Home - About - Disclaimer - Privacy