Results 61 to 70 of about 643,939 (333)

Security and Privacy of Protocols and Software with Formal Methods [PDF]

open access: yes, 2016
The protection of users' data conforming to best practice and legislation is one of the main challenges in computer science. Very often, large-scale data leaks remind us that the state of the art in data privacy and anonymity is severely lacking. The complexity of modern systems make it impossible for software architect to create secure software that ...
Biondi, Fabrizio, Legay, Axel
openaire   +3 more sources

MET and NF2 alterations confer primary and early resistance to first‐line alectinib treatment in ALK‐positive non‐small‐cell lung cancer

open access: yesMolecular Oncology, EarlyView.
Alectinib resistance in ALK+ NSCLC depends on treatment sequence and EML4‐ALK variants. Variant 1 exhibited off‐target resistance after first‐line treatment, while variant 3 and later lines favored on‐target mutations. Early resistance involved off‐target alterations, like MET and NF2, while on‐target mutations emerged with prolonged therapy.
Jie Hu   +11 more
wiley   +1 more source

BlockChain: A distributed solution to automotive security and privacy

open access: yes, 2017
Interconnected smart vehicles offer a range of sophisticated services that benefit the vehicle owners, transport authorities, car manufacturers and other service providers.
Dorri, Ali   +3 more
core   +1 more source

Evaluation of KRAS and NRAS mutations in metastatic colorectal cancer: an 8‐year study of 10 754 patients in Turkey

open access: yesMolecular Oncology, EarlyView.
This nationwide study evaluated KRAS and NRAS mutations in 10 754 Turkish patients with metastatic colorectal cancer. The results revealed a mutation frequency of 51.1%, with 46.6% having KRAS mutations, 4.5% having NRAS mutations, and 48.5% being wild‐type for both.
Gozde Kavgaci   +6 more
wiley   +1 more source

Reusable Elements for the Systematic Design of Privacy-Friendly Information Systems: A Mapping Study

open access: yesIEEE Access, 2019
Privacy by design is a new paradigm that promotes embedding privacy considerations throughout the development of information systems, to protect user privacy. Privacy engineering is the nascent field of research and practice that aims to realize this new
Julio C. Caiza   +4 more
doaj   +1 more source

Unraveling LINE‐1 retrotransposition in head and neck squamous cell carcinoma

open access: yesMolecular Oncology, EarlyView.
The novel RetroTest method allows the detection of L1 activation in clinical samples with low DNA input, providing global L1 activity and the identification of the L1 source element. We applied RetroTest to a real‐world cohort of HNSCC patients where we reported an early L1 activation, with more than 60% of T1 patients showing L1 activity.
Jenifer Brea‐Iglesias   +12 more
wiley   +1 more source

Morpheus: stream cipher for software & hardware applications [PDF]

open access: yes, 2007
In a world where electronic devices with different characteristics are networked, privacy is an essential element for the communicating process. Privacy can be achieved by encryption algorithms with unique features based on the application that are ...
Komninos, N.
core  

Software for Wearable Devices: Challenges and Opportunities

open access: yes, 2015
Wearable devices are a new form of mobile computer system that provides exclusive and user-personalized services. Wearable devices bring new issues and challenges to computer science and technology.
Chen, Xin   +5 more
core   +1 more source

Endoglin mediates the tumor‐ and metastasis‐promoting traits of stromal myofibroblasts in human breast carcinomas

open access: yesMolecular Oncology, EarlyView.
Carcinoma‐associated fibroblasts (CAFs) in tumors influence cancer progression. We identified endoglin (ENG) as a key factor in TGF‐β signaling in myofibroblastic CAFs (myCAFs), linked to poor breast cancer outcomes. Inhibiting ENG on myCAFs suppressed the TGF‐β‐Smad2/3 pathway, reducing primary tumor growth and metastasis.
Shoki Okubo   +11 more
wiley   +1 more source

The Missing Link in Network Intrusion Detection: Taking AI/ML Research Efforts to Users

open access: yesIEEE Access
Intrusion Detection Systems (IDS) tackle the challenging task of detecting network attacks as fast as possible. As this is getting more complex in modern enterprise networks, Artificial Intelligence (AI) and Machine Learning (ML) have gained substantial ...
Katharina Dietz   +7 more
doaj   +1 more source

Home - About - Disclaimer - Privacy