Results 71 to 80 of about 291,448 (281)

Stealthy Deception Attacks Against SCADA Systems

open access: yes, 2017
SCADA protocols for Industrial Control Systems (ICS) are vulnerable to network attacks such as session hijacking. Hence, research focuses on network anomaly detection based on meta--data (message sizes, timing, command sequence), or on the state values ...
A Kleinmann   +12 more
core   +1 more source

Detecting Signalling DoS Attacks on LTE Networks [PDF]

open access: yes, 2019
As mobile communications increase their presence in our life, service availability becomes a crucial player for the next generation of cellular networks. However, both 4G and 5G systems lack of full protection against Denial-of-Service (DoS) attacks, due to the need of designing radio-access protocols focused on providing seamless connectivity.
Ginés Escudero-Andreu   +3 more
openaire   +1 more source

Multi‐omics and low‐input proteomics profiling reveals dynamic regulation driving pluripotency initiation in early mouse embryos

open access: yesFEBS Open Bio, EarlyView.
Mouse pre‐implantation development involves a transition from totipotency to pluripotency. Integrating transcriptomics, epigenetic profiling, low‐input proteomics and functional assays, we show that eight‐cell embryos retain residual totipotency features, whereas cytoskeletal remodeling regulated by the ubiquitin‐proteasome system drives progression ...
Wanqiong Li   +8 more
wiley   +1 more source

Digital twins to accelerate target identification and drug development for immune‐mediated disorders

open access: yesFEBS Open Bio, EarlyView.
Digital twins integrate patient‐derived molecular and clinical data into personalised computational models that simulate disease mechanisms. They enable rapid identification and validation of therapeutic targets, prediction of drug responses, and prioritisation of candidate interventions.
Anna Niarakis, Philippe Moingeon
wiley   +1 more source

Detection of Multi-Stage Attacks Through Attack Pattern Segmentation

open access: yesIEEE Access
Advanced cyberattack patterns threatening network assets employ various attack vectors, multi-stage attack processes, and diverse penetration strategies.
Seonghyeon Gong   +2 more
doaj   +1 more source

Threshold verification using statistical approach for fast attack detection [PDF]

open access: yes, 2009
Network has grows to a mammoth size and becoming more complex, thus exposing the services it offers towards multiple types of intrusion vulnerabilities.One method to overcome intrusion is by introducing Intrusion Detection System (IDS) for detecting the
Abdollah, Mohd Faizal   +4 more
core   +1 more source

Mutant NPM1 in Acute Myeloid Leukemia Initiation and Maintenance

open access: yesAging and Cancer, EarlyView.
NPM1 mutations drive acute myeloid leukemia by acting as neomorphic transcriptional regulators that cooperate with Menin–MLL and XPO1 to sustain HOX/MEIS1 expression and block differentiation. Targeting these mutant‐specific transcriptional dependencies provides a rational therapeutic strategy for NPM1‐mutated AML.
Yanan Jiang   +3 more
wiley   +1 more source

Situation Awareness Assessment Approach Based on Attack Traffic and System Vulnerabilities

open access: yesShuju Caiji Yu Chuli
Network security situation assessment plays an important role in the design and implementation of network defense strategies. The existing situation assessment methods gather the information of both attack and defense to construct an assessment model ...
LI Yan   +4 more
doaj   +1 more source

Super‐Refractory Status Epilepticus (SRSE) in a Patient With Compound Heterozygous OPA1 Variants: Case Report and Literature Review

open access: yesAnnals of Clinical and Translational Neurology, EarlyView.
ABSTRACT Objective Super‐Refractory Status Epilepticus (SRSE) is a rare, life‐threatening neurological emergency with unclear etiology in many cases. Mitochondrial dysfunction, often due to disease‐causing genetic variants, is increasingly recognized as a cause, with each gene producing distinct pathophysiological mechanisms.
Pouria Mohammadi   +2 more
wiley   +1 more source

Whole‐Body Pattern of Muscle Degeneration and Progression in Sarcoglycanopathies

open access: yesAnnals of Clinical and Translational Neurology, EarlyView.
ABSTRACT Objective To characterize whole‐body intramuscular fat distribution pattern in patients with sarcoglycanopathies and explore correlations with disease severity, duration and age at onset. Methods Retrospective, cross‐sectional, multicentric study enrolling patients with variants in one of the four sarcoglycan genes who underwent whole‐body ...
Laura Costa‐Comellas   +39 more
wiley   +1 more source

Home - About - Disclaimer - Privacy