Results 41 to 50 of about 1,328,609 (285)

Build It, Break It, Fix It: Contesting Secure Development

open access: yes, 2016
Typical security contests focus on breaking or mitigating the impact of buggy systems. We present the Build-it Break-it Fix-it BIBIFI contest which aims to assess the ability to securely build software not just break it.
Hicks, Michael   +5 more
core   +1 more source

An architecture for certification-aware service discovery [PDF]

open access: yes, 2011
Service-orientation is an emerging paradigm for building complex systems based on loosely coupled components, deployed and consumed over the network. Despite the original intent of the paradigm, its current instantiations are limited to a single trust ...
Bezzi, M., Sabetta, A., Spanoudakis, G.
core   +1 more source

An isoform of 14‐3‐3 protein regulates transbilayer lipid movement at the plasma membrane

open access: yesFEBS Letters, EarlyView.
Loss of 14‐3‐3ζ in CHO cells confers resistance to exogenous phosphatidylserine (PS) and impairs endocytosis‐independent inward flip‐flop of fluorescent PS at the plasma membrane. RNAi‐mediated knockdown reproduces this defect, while no additive effect is seen in ATP11C‐deficient cells.
Akiko Yamaji‐Hasegawa   +3 more
wiley   +1 more source

A Systematic Literature Review of Cyber Security Monitoring in Maritime

open access: yesIEEE Access
In recent years, many cyber incidents have occurred in the maritime sector, targeting the information technology (IT) and operational technology (OT) infrastructure.
Risto Vaarandi   +4 more
doaj   +1 more source

An overview to Software Architecture in Intrusion Detection System [PDF]

open access: yes, 2014
Today by growing network systems, security is a key feature of each network infrastructure. Network Intrusion Detection Systems (IDS) provide defense model for all security threats which are harmful to any network.
Bahrami, Mehdi, Bahrami, Mohammad
core   +1 more source

Dammarenediol II enhances etoposide‐induced apoptosis by targeting O‐GlcNAc transferase and Akt/GSK3β/mTOR signaling in liver cancer

open access: yesMolecular Oncology, EarlyView.
Etoposide induces DNA damage, activating p53‐dependent apoptosis via caspase‐3/7, which cleaves PARP1. Dammarenediol II enhances this apoptotic pathway by suppressing O‐GlcNAc transferase activity, further decreasing O‐GlcNAcylation. The reduction in O‐GlcNAc levels boosts p53‐driven apoptosis and influences the Akt/GSK3β/mTOR signaling pathway ...
Jaehoon Lee   +8 more
wiley   +1 more source

A Fuzzy Logic-Based Directional Charging Scheme for Wireless Rechargeable Sensor Networks

open access: yesSensors
Wireless Power Transfer (WPT) has become a key technology to extend network lifetime in Wireless Rechargeable Sensor Networks (WRSNs). The traditional omnidirectional recharging method has a wider range of energy radiation, but it inevitably results in ...
Yuhan Ma   +4 more
doaj   +1 more source

EDNRB‐dependent endothelin signaling reduces proliferation and promotes proneural‐to‐mesenchymal transition in gliomas

open access: yesMolecular Oncology, EarlyView.
Glioma cells mainly express the endothelin receptor EDNRB, while EDNRA is restricted to a perivascular tumor subpopulation. Endothelin signaling reduces glioma cell proliferation while promoting migration and a proneural‐to‐mesenchymal transition associated with poor prognosis. This pathway activates Ca2+, K+, ERK, and STAT3 signalings and is regulated
Donovan Pineau   +36 more
wiley   +1 more source

A Novel Two-Terminal Reliability Analysis for MANET

open access: yesJournal of Applied Mathematics, 2013
Mobile ad hoc network (MANET) is a dynamic wireless communication network. Because of the dynamic and infrastructureless characteristics, MANET is vulnerable in reliability. This paper presents a novel reliability analysis for MANET.
Xibin Zhao, Zhiyang You, Hai Wan
doaj   +1 more source

End-to-End Database Software Security

open access: yesSoftware, 2023
End-to-end security is essential for relational database software. Most database management software provide data protection at the server side and in transit, but data are no longer protected once they arrive at the client software.
Denis Ulybyshev   +3 more
doaj   +1 more source

Home - About - Disclaimer - Privacy