Results 111 to 120 of about 305,450 (294)
A Hybrid Model of Network Intrusion Detection System : Applying Packet based Machine Learning Algorithm to Misuse IDS for Better Performance [PDF]
Ill-Young Weon
openalex +1 more source
Unique biological samples, such as site‐specific mutant proteins, are available only in limited quantities. Here, we present a polarization‐resolved transient infrared spectroscopy setup with referencing to improve signal‐to‐noise tailored towards tracing small signals. We provide an overview of characterizing the excitation conditions for polarization‐
Clark Zahn, Karsten Heyne
wiley +1 more source
A tri‐culture of iPSC‐derived neurons, astrocytes, and microglia treated with ferroptosis inducers as an Induced ferroptosis model was characterized by scRNA‐seq, cell survival, and cytokine release assays. This analysis revealed diverse microglial transcriptomic changes, indicating that the system captures key aspects of the complex cellular ...
Hongmei Lisa Li +6 more
wiley +1 more source
HTTP Packet Inspection Policy for Improvising Internal Network Security [PDF]
Tomar Kuldeep, S. S. Tyagi
openalex +1 more source
Mouse pre‐implantation development involves a transition from totipotency to pluripotency. Integrating transcriptomics, epigenetic profiling, low‐input proteomics and functional assays, we show that eight‐cell embryos retain residual totipotency features, whereas cytoskeletal remodeling regulated by the ubiquitin‐proteasome system drives progression ...
Wanqiong Li +8 more
wiley +1 more source
Analyzing Network Traffic for Malicious Hacker Activity [PDF]
Since the Internet came into life in the 1970s, it has been growing more than 100% every year. On the other hand, the solutions to detecting network intrusion are far outpaced.
Pyke, Randall
core
Network packet capture oriented INIC design and implementation
As the rapid growth of network bandwidth,the capability of packet capture has became the bottleneck of whole network security system.To increase the capability of packet capture and decrease the system overhead,a packet capture oriented INIC was proposed.
ZHANG Pan-yong1 +3 more
doaj +2 more sources
Linking Correlated Network Flows through Packet Timing: a Game-Theoretic Approach [PDF]
Juan A. Elices +1 more
openalex +1 more source
BMI‐1 modulation and trafficking during M phase in diffuse intrinsic pontine glioma
The schematic illustrates BMI‐1 phosphorylation during M phase, which triggers its translocation from the nucleus to the cytoplasm. In cycling cells, BMI‐1 functions within the PRC1 complex to mediate H2A K119 monoubiquitination. Following PTC596‐induced M phase arrest, phosphorylated BMI‐1 dissociates from PRC1 and is exported to the cytoplasm via its
Banlanjo Umaru +6 more
wiley +1 more source
XMILE:An XML-based approach for programmable networks [PDF]
In this paper we describe an XML-based platform for dynamic active node policy updates. XML supports the definitionof specific policy languages, their extension to satisfy new needs and the management of deployed policies on differentactive nodes.
de Meer, H, Emmerich, W, Mascolo, C
core +2 more sources

