Results 61 to 70 of about 643,939 (333)
Security and Privacy of Protocols and Software with Formal Methods [PDF]
The protection of users' data conforming to best practice and legislation is one of the main challenges in computer science. Very often, large-scale data leaks remind us that the state of the art in data privacy and anonymity is severely lacking. The complexity of modern systems make it impossible for software architect to create secure software that ...
Biondi, Fabrizio, Legay, Axel
openaire +3 more sources
Alectinib resistance in ALK+ NSCLC depends on treatment sequence and EML4‐ALK variants. Variant 1 exhibited off‐target resistance after first‐line treatment, while variant 3 and later lines favored on‐target mutations. Early resistance involved off‐target alterations, like MET and NF2, while on‐target mutations emerged with prolonged therapy.
Jie Hu+11 more
wiley +1 more source
BlockChain: A distributed solution to automotive security and privacy
Interconnected smart vehicles offer a range of sophisticated services that benefit the vehicle owners, transport authorities, car manufacturers and other service providers.
Dorri, Ali+3 more
core +1 more source
This nationwide study evaluated KRAS and NRAS mutations in 10 754 Turkish patients with metastatic colorectal cancer. The results revealed a mutation frequency of 51.1%, with 46.6% having KRAS mutations, 4.5% having NRAS mutations, and 48.5% being wild‐type for both.
Gozde Kavgaci+6 more
wiley +1 more source
Reusable Elements for the Systematic Design of Privacy-Friendly Information Systems: A Mapping Study
Privacy by design is a new paradigm that promotes embedding privacy considerations throughout the development of information systems, to protect user privacy. Privacy engineering is the nascent field of research and practice that aims to realize this new
Julio C. Caiza+4 more
doaj +1 more source
Unraveling LINE‐1 retrotransposition in head and neck squamous cell carcinoma
The novel RetroTest method allows the detection of L1 activation in clinical samples with low DNA input, providing global L1 activity and the identification of the L1 source element. We applied RetroTest to a real‐world cohort of HNSCC patients where we reported an early L1 activation, with more than 60% of T1 patients showing L1 activity.
Jenifer Brea‐Iglesias+12 more
wiley +1 more source
Morpheus: stream cipher for software & hardware applications [PDF]
In a world where electronic devices with different characteristics are networked, privacy is an essential element for the communicating process. Privacy can be achieved by encryption algorithms with unique features based on the application that are ...
Komninos, N.
core
Software for Wearable Devices: Challenges and Opportunities
Wearable devices are a new form of mobile computer system that provides exclusive and user-personalized services. Wearable devices bring new issues and challenges to computer science and technology.
Chen, Xin+5 more
core +1 more source
Carcinoma‐associated fibroblasts (CAFs) in tumors influence cancer progression. We identified endoglin (ENG) as a key factor in TGF‐β signaling in myofibroblastic CAFs (myCAFs), linked to poor breast cancer outcomes. Inhibiting ENG on myCAFs suppressed the TGF‐β‐Smad2/3 pathway, reducing primary tumor growth and metastasis.
Shoki Okubo+11 more
wiley +1 more source
The Missing Link in Network Intrusion Detection: Taking AI/ML Research Efforts to Users
Intrusion Detection Systems (IDS) tackle the challenging task of detecting network attacks as fast as possible. As this is getting more complex in modern enterprise networks, Artificial Intelligence (AI) and Machine Learning (ML) have gained substantial ...
Katharina Dietz+7 more
doaj +1 more source