Results 71 to 80 of about 703,183 (313)
While using social software and interacting with others on the Internet, users share a lot of information about themselves. An important issue for these users is maintaining control over their own personal data and being aware to whom which data is disclosed. In this chapter, we present specific requirements and realised solutions to these problems for
van den Berg, B. +4 more
openaire +2 more sources
The Missing Link in Network Intrusion Detection: Taking AI/ML Research Efforts to Users
Intrusion Detection Systems (IDS) tackle the challenging task of detecting network attacks as fast as possible. As this is getting more complex in modern enterprise networks, Artificial Intelligence (AI) and Machine Learning (ML) have gained substantial ...
Katharina Dietz +7 more
doaj +1 more source
Functional encryption is a new paradigm for encryption where decryption does not give the entire plaintext but only some function of it. Functional encryption has great potential in privacy-enhancing technologies but suffers from excessive computational ...
Milad Bahadori +3 more
doaj +1 more source
Development of therapies targeting cancer‐associated fibroblasts (CAFs) necessitates preclinical model systems that faithfully represent CAF–tumor biology. We established an in vitro coculture system of patient‐derived pancreatic CAFs and tumor cell lines and demonstrated its recapitulation of primary CAF–tumor biology with single‐cell transcriptomics ...
Elysia Saputra +10 more
wiley +1 more source
An overview of store and forward applications commonly used in physical and occupational therapy practice is reviewed with respect to regulation, privacy, security, and clinical applications. A privacy and security checklist provides a clear reference of
Christopher Peterson, Valerie Watzlaf
doaj +1 more source
Effective therapeutic targeting of CTNNB1‐mutant hepatoblastoma with WNTinib
WNTinib, a Wnt/CTNNB1 inhibitor, was tested in hepatoblastoma (HB) experimental models. It delayed tumor growth and improved survival in CTNNB1‐mutant in vivo models. In organoids, WNTinib outperformed cisplatin and showed enhanced efficacy in combination therapy, supporting its potential as a targeted treatment for CTNNB1‐mutated HB.
Ugne Balaseviciute +17 more
wiley +1 more source
Analyzing Android App Privacy With GP-PP Model
Mobile devices have become the major platforms of the Internet of Things applications for industrial enterprises. The ever-increasing number of Android Phone users has raised great concerns regarding the privacy issues related to the use of Android Apps.
Nishtha Kesswani +2 more
doaj +1 more source
This study shows that copy number variations (CNVs) can be reliably detected in formalin‐fixed paraffin‐embedded (FFPE) solid cancer samples using ultra‐low‐pass whole‐genome sequencing, provided that key (pre)‐analytical parameters are optimized.
Hanne Goris +10 more
wiley +1 more source
Light activation of the photoswitchable cannabinoid ligand azo‐HU308 triggers Ca2+ influx in pancreatic β‐cells through TRPC channels, independent of CB2 cannabinoid receptors. This reveals a non‐GPCR pathway for cannabinoid modulation of β‐cell Ca2+ dynamics and establishes azo‐HU308 as an optical tool to study cannabinoid signaling through TRP ...
Alexander E. G. Viray, James A. Frank
wiley +1 more source
A data-driven method for surgeon-specific difficulty assessment in third molar extraction
Background and objectivesThe purpose of this study is to use a data-driven method to analyze the time taken by junior doctors to extract lower wisdom teeth and the factors affecting the difficulty of the procedure.
Chun Kang +14 more
doaj +1 more source

