Results 81 to 90 of about 525,062 (269)
Compiling symbolic attacks to protocol implementation tests
Recently efficient model-checking tools have been developed to find flaws in security protocols specifications. These flaws can be interpreted as potential attacks scenarios but the feasability of these scenarios need to be confirmed at the ...
Ghabri, Hatem +2 more
core +4 more sources
A synthetic benzoxazine dimer derivative targets c‐Myc to inhibit colorectal cancer progression
Benzoxazine dimer derivatives bind to the bHLH‐LZ region of c‐Myc, disrupting c‐Myc/MAX complexes, which are evaluated from SAR analysis. This increases ubiquitination and reduces cellular c‐Myc. Impairing DNA repair mechanisms is shown through proteomic analysis.
Nicharat Sriratanasak +8 more
wiley +1 more source
Penetration Testing (PT), which mimics actual cyber attacks, has become an essential procedure for assessing the security posture of network infrastructures in recent years.
Railkar Dipali, Joshi Shubhalaxmi
doaj +1 more source
Urinary LGALS3BP is elevated in bladder cancer patients compared to healthy controls as detected by the 1959 antibody–based ELISA. The antibody shows enhanced reactivity to the high‐mannose glycosylated variant secreted by cancer cells treated with kifunensine (KIF).
Asia Pece +18 more
wiley +1 more source
SatGuard: Satellite Networks Penetration Testing and Vulnerability Risk Assessment Methods
Satellite networks face escalating cybersecurity threats from evolving attack vectors and systemic complexities. This paper proposes SatGuard, a novel framework integrating a three-dimensional penetration testing methodology and a nonlinear risk ...
Jin Xiao +4 more
doaj +1 more source
The paper is the continuation of the previous ones entitled „Material factors in relation to development time in liquid-penetrant inspection. Part 1. Material factors“ and „Material factors in relation to development time in liquid-penetrant inspection ...
Irek P., Słania J.
doaj +1 more source
CDK11 inhibition stabilises the tumour suppressor p53 and triggers the production of an alternative p21WAF1 splice variant p21L, through the inactivation of the spliceosomal protein SF3B1. Unlike the canonical p21WAF1 protein, p21L is localised in the cytoplasm and has reduced cell cycle‐blocking activity.
Radovan Krejcir +12 more
wiley +1 more source
While autonomous driving systems and intelligent transportation infrastructures become increasingly software-defined and network-connected, ensuring their cybersecurity has become a critical component of traffic safety.
Xingyu Wu +8 more
doaj +1 more source
Vulnerability assessment and penetration testing are the key activities of information security risk management and cyber defense and intelligence done by military organizations.
Dragan D. Mladenović
doaj +1 more source
A mouse model for vascular normalization and a human breast cancer cohort were studied to understand the relationship between vascular leakage and tumor immune suppression. For this, endothelial and immune cell RNAseq, staining for vascular function, and immune cell profiling were employed.
Liqun He +8 more
wiley +1 more source

