Results 51 to 60 of about 1,328,609 (285)
E2A selectively regulates TGF‐β–induced apoptosis in KRAS‐mutant non‐small cell lung cancer
Ability to induce apoptosis by TGF‐β is frequently lost in advanced lung adenocarcinoma despite intact TGF‐β signaling. We identify E2A as a mutant KRAS–dependent mediator of resistance to TGF‐β–induced apoptosis. TGF‐β induces E2A via SMAD3 in mutant KRAS cells, and E2A silencing restores apoptosis and enhances radiation response in cell lines ...
Sergei Chuikov +3 more
wiley +1 more source
AEMB: An Automated Exploit Mitigation Bypassing Solution
Modern operating systems set exploit mitigations to thwart the exploit, which has also become a barrier to automated exploit generation (AEG). Many current AEG solutions do not fully account for exploit mitigations, and as a result, they are unable to ...
Ruipeng Wang +3 more
doaj +1 more source
The Effect of Security Education and Expertise on Security Assessments: the Case of Software Vulnerabilities [PDF]
In spite of the growing importance of software security and the industry demand for more cyber security expertise in the workforce, the effect of security education and experience on the ability to assess complex software security problems has only been ...
Allodi, Luca +3 more
core +2 more sources
CRISPRI‐mediated gene silencing and phenotypic exploration in nontuberculous mycobacteria. In this Research Protocol, we describe approaches to control, monitor, and quantitatively assess CRISPRI‐mediated gene silencing in M. smegmatis and M. abscessus model organisms.
Vanessa Point +7 more
wiley +1 more source
Calculation of the Behavior Utility of a Network System: Conception and Principle
The service and application of a network is a behavioral process that is oriented toward its operations and tasks, whose metrics and evaluation are still somewhat of a rough comparison.
Changzhen Hu
doaj +1 more source
Pharmacological inhibition of PERK in a DEN‐induced mouse model of liver cancer does not reduce tumor burden but alters cellular stress signaling. Despite blocking PERK activity, downstream stress responses, including CHOP expression, remain active, suggesting compensatory mechanisms within the unfolded protein response that may influence tumor ...
Ada Lerma‐Clavero +5 more
wiley +1 more source
Automated Risk Management Based Software Security Vulnerabilities Management
An automated risk assessment approach is explored in this work. The focus is to optimize the conventional threat modeling approach to explore software system vulnerabilities.
Raghavendra Rao Althar +4 more
doaj +1 more source
Drugs previously repurposed to target blood cancers reduced neuroblastoma and glioblastoma cell growth and viability. However, their levels of anticancer activity were different and their clinical application may be problematic due to side effects at effective doses.
Abhishek Kharawatkar +4 more
wiley +1 more source
Remote Monitoring in Myasthenia Gravis: Exploring Symptom Variability
ABSTRACT Background Myasthenia gravis (MG) is a rare, autoimmune disorder characterized by fluctuating muscle weakness and potential life‐threatening crises. While continuous specialized care is essential, access barriers often delay timely interventions. To address this, we developed MyaLink, a telemedical platform for MG patients.
Maike Stein +13 more
wiley +1 more source
Patterns of Postictal Abnormalities in Relation to Status Epilepticus in Adults
ABSTRACT Objective Abnormalities on peri‐ictal diffusion‐weighted magnetic resonance imaging (DWI‐PMAs) are well‐established for patients with status epilepticus (SE), but knowledge on patterns of DWI‐PMAs and their prognostic impact is sparse. Methods This systematic review and individual participant data meta‐analysis included observational studies ...
Andrea Enerstad Bolle +11 more
wiley +1 more source

