Results 91 to 100 of about 82,373 (261)
Nanosafety data provide a guiding example for establishing best practices in data management, aligning with FAIR principles and quality criteria. This review explores existing quality assessment approaches for reliability, relevance, and completeness, emphasizing the need for harmonization and adaptation to nanomaterials and advanced materials. The aim
Verónica I. Dumit +43 more
wiley +1 more source
Network Traffic Model Based on Superposition of Single User Requests Flows
User session extraction from network traffic data is considered. Statistical analysis of inter-session times of infocommunication network link was performed.
Viet Nguyen Duc, A. S. Tamazian
doaj
A Real Network Environment Dataset for Traffic Analysis
The objective of internet traffic analysis is to identify latent patterns and ascertain the true state of internet operations by examining traffic data.
Wei Jiang +4 more
doaj +1 more source
Using iPSC‐derived motoneurons and postmortem tissue from FUS‐ALS patients, it is demonstrated that increased mitochondrial transcription leads to elevated cytosolic double‐stranded RNA (dsRNA) levels. This aberrant accumulation activates a RIG‐I–dependent innate immune response leading to neurodegeneration, which is amenable for FDA‐ and EMA‐approved ...
Marcel Naumann +26 more
wiley +1 more source
A Software Deep Packet Inspection System for Network Traffic Analysis and Anomaly Detection. [PDF]
Song W +7 more
europepmc +1 more source
Chronic Hypoxia Disrupts Spermatogenesis Through ASXL2–EZH2–Mediated Microtubule Destabilization
This study reveals the mechanism by which chronic hypoxia impairs spermatogenesis via the ASXL2–EZH2 axis, hindering the transition of spermatids from round to elongated forms. Key findings reveal that under hypoxic conditions, downregulated ASXL2 expression reduces EZH2 binding to the CEP162 promoter, leading to decreased H3K27me3 modification and ...
Jun Yin +11 more
wiley +1 more source
Network Traffic Analysis Using Sniffer
The growing sophistication of digital networks has been matched by the proliferation of cyber threats, from email and global ransomware phishing to identity theft or fraud or more sophisticated denial-of-service attacks. Although it helps in a lot of cases, traditional network monitoring systems are still expensive and resource intensive, leaving a ...
openaire +1 more source
PD‐1 Inhibits CD4+ TRM‐Mediated cDC1 Mobilization via Suppressing JAML in Human NSCLC
CD4+ tissue‐resident memory T cells (TRMs) in non‐small cell lung cancer recruit conventional type 1 dendritic cells via XCL1‐XCR1 signaling, orchestrating antitumor immunity. The costimulatory molecule JAML is essential for this process. PD‐1 blockade restores JAML expression and cDC1 mobilization, while JAML agonists synergize with anti‐PD‐1 therapy,
Zheyu Shao +16 more
wiley +1 more source
Cancer cell‐intrinsic cholesterol promotes the S‐palmitoylation of SP1, increasing its nuclear translocation and driving the transcription and secretion of MDK, which in turn facilitates the differentiation of macrophages into a lipid‐associated phenotype.
Shirong Peng +12 more
wiley +1 more source
Network communication privacy: traffic masking against traffic analysis
An increasing number of recent experimental works have been demonstrating the supposedly secure channels in the Internet are prone to privacy breaking under many respects, due to traffic features leaking information on the user activity and traffic content.
openaire +2 more sources

