Results 41 to 50 of about 1,300,731 (292)

Securing Information Systems in an Uncertain World Enterprise Level Security (Invited Paper) [PDF]

open access: yesJournal of Systemics, Cybernetics and Informatics, 2016
Increasing threat intrusions to enterprise computing systems have led to a formulation of guarded enterprise systems. The approach was to put in place steel gates and prevent hostile entities from entering the enterprise domain.
William R. Simpson
doaj  

Public Key Infrastructure based on Authentication of Media Attestments [PDF]

open access: yes, 2013
Many users would prefer the privacy of end-to-end encryption in their online communications if it can be done without significant inconvenience. However, because existing key distribution methods cannot be fully trusted enough for automatic use, key ...
Heinrich, Stuart
core  

Predictors of response and rational combinations for the novel MCL‐1 inhibitor MIK665 in acute myeloid leukemia

open access: yesMolecular Oncology, EarlyView.
This study characterizes the responses of primary acute myeloid leukemia (AML) patient samples to the MCL‐1 inhibitor MIK665. The results revealed that monocytic differentiation is associated with MIK665 sensitivity. Conversely, elevated ABCB1 expression is a potential biomarker of resistance to the treatment, which can be overcome by the combination ...
Joseph Saad   +17 more
wiley   +1 more source

A Blockchain-Based Decentralized Public Key Infrastructure Using the Web of Trust

open access: yesJournal of Cybersecurity and Privacy
Internet applications rely on Secure Socket Layer (SSL)/Transport Security Layer (TSL) certifications to establish secure communication. However, the centralized nature of certificate authorities (CAs) poses a risk, as malicious third parties could ...
Ratna Halder   +2 more
doaj   +1 more source

Caution Ahead: Overdue Investments in New York's Aging Infrastructure [PDF]

open access: yes, 2014
While Superstorm Sandy focused much-needed attention on key pieces of New York City's infrastructure, the city faces a number of other infrastructure vulnerabilities that have little to do with storm-preparedness -- from aging water mains and ...
Adam Forman
core  

Methylation biomarkers can distinguish pleural mesothelioma from healthy pleura and other pleural pathologies

open access: yesMolecular Oncology, EarlyView.
We developed and validated a DNA methylation–based biomarker panel to distinguish pleural mesothelioma from other pleural conditions. Using the IMPRESS technology, we translated this panel into a clinically applicable assay. The resulting two classifier models demonstrated excellent performance, achieving high AUC values and strong diagnostic accuracy.
Janah Vandenhoeck   +12 more
wiley   +1 more source

Perspectives in educating molecular pathologists on liquid biopsy: Toward integrative, equitable, and decentralized precision oncology

open access: yesMolecular Oncology, EarlyView.
Liquid biopsy enables minimally invasive, real‐time molecular profiling through analysis of circulating biomarkers in biological fluids. This Perspective highlights the importance of training pathologists through integrative educational programs, such as the European Masters in Molecular Pathology, to ensure effective and equitable implementation of ...
Marius Ilié   +13 more
wiley   +1 more source

The use of maxLength in the RPKI [PDF]

open access: yes, 2018
This document recommends that operators avoid using the maxLength attribute when issuing Route Origin Authorizations (ROAs) in the Resource Public Key Infrastructure (RPKI). These recommendations complement those in [RFC7115].https://datatracker.ietf.org/
Gilad, Yossi   +4 more
core  

Teaching Python with team‐based learning: using cloud‐based notebooks for interactive coding education

open access: yesFEBS Open Bio, EarlyView.
This study presents a novel approach to teaching Python and bioinformatics using team‐based learning and cloud‐hosted notebooks. By integrating interactive coding into biomedical education, the method improves accessibility, student engagement, and confidence—especially for those without a computing background.
Nuno S. Osório, Leonardo D. Garma
wiley   +1 more source

Home - About - Disclaimer - Privacy