Results 31 to 40 of about 416,944 (233)
Hyp3rArmor: reducing web application exposure to automated attacks [PDF]
Web applications (webapps) are subjected constantly to automated, opportunistic attacks from autonomous robots (bots) engaged in reconnaissance to discover victims that may be vulnerable to specific exploits.
Bestavros, Azer, Koch, William
core +1 more source
This study simultaneously investigated circulating tumor cells (CTCs) and exosomes from small‐cell lung cancer (SCLC) patients. The elevated expression of JUNB and CXCR4 in CTCs was a poor prognostic factor for SCLC patients, whereas exosomal overexpression of these biomarkers revealed a high discrimination ability of patients from healthy individuals,
Dimitrios Papakonstantinou+13 more
wiley +1 more source
Using HTML5 to Prevent Detection of Drive-by-Download Web Malware [PDF]
The web is experiencing an explosive growth in the last years. New technologies are introduced at a very fast-pace with the aim of narrowing the gap between web-based applications and traditional desktop applications.
De Maio, Giancarlo+2 more
core +2 more sources
A PANoptosis‐Based Signature for Survival and Immune Predication in Glioblastoma Multiforme
ABSTRACT Objective PANoptosis is a concept of total cell death characterized by pyroptosis, apoptosis, and necroptosis. We aimed to explore the clinical significance of PANoptosis‐related genes (PARGs) in glioblastoma multiforme (GBM). Methods Expression profiles of GBM were downloaded from the XENA database as a training dataset to construct a ...
Jun Yang+4 more
wiley +1 more source
Web-Based Remote Monitoring And Controlling System Using Embedded Web Server [PDF]
The World Wide Web (WWW) has established itself as a strong medium for distributed computing: a network user interface that is powerful and platform independent. As embedded systems become more prevalent.
Shafie@Musa, Siti Mariam
core
In the era of internet, users are keen to discover more in the web. As the number of web pages increases day-by-day malicious web pages are also increasing proportionally.
S. Chitra+10 more
semanticscholar +1 more source
MichelaNglo: sculpting protein views on web pages without coding
Motivation The sharing of macromolecular structural information online by scientists is predominantly performed via 2D static images, since the embedding of interactive 3D structures in webpages is non-trivial.
Matteo P. Ferla+4 more
semanticscholar +1 more source
Anomaly Detection in the Dynamics of Web and Social Networks Using Associative Memory [PDF]
In this work, we propose a new, fast and scalable method for anomaly detection in large time-evolving graphs. It may be a static graph with dynamic node attributes (e.g. time-series), or a graph evolving in time, such as a temporal network.
Volodymyr Miz+3 more
semanticscholar +1 more source
The temporary transition of macrophages from a pro‐inflammatory phenotype of macrophages (M1) to an anti‐inflammatory phenotype of macrophages (M2) is crucial for tissue repair and regeneration processes. Bacterial outer membrane vesicles (OMVs) are utilized as a “trojan horse” for specific M1 macrophage‐targeting and anti‐inflammatory drug delivery ...
Donglin Cai+9 more
wiley +1 more source
A Descriptive Model of Robot Team and the Dynamic Evolution of Robot Team Cooperation
At present, the research on robot team cooperation is still in qualitative analysis phase and lacks the description model that can quantitatively describe the dynamical evolution of team cooperative relationships with constantly changeable task demand in
Cheng, Xian-yi+4 more
core +2 more sources