Results 21 to 30 of about 1,896,485 (284)
A taxonomy of malicious traffic for intrusion detection systems [PDF]
With the increasing number of network threats it is essential to have a knowledge of existing and new network threats to design better intrusion detection systems.
Atkinson, Robert +5 more
core +4 more sources
BackgroundCisgender lesbian, bisexual, and queer (LBQ+) women of color experience barriers to accessing sexual and reproductive health (SRH) services in the United States.
Megan Threats, Morgan Gray
doaj +1 more source
Background SARS-CoV-2 cases in Germany increased in early March 2020. By April 2020, cases among health care workers (HCW) were detected across departments at a tertiary care hospital in Berlin, prompting a longitudinal investigation to assess HCW SARS ...
Sara Tomczyk +11 more
doaj +1 more source
Bacillus anthracis is a potent biowarfare agent, able to be highly lethal. The bacteria dwell in the soil of certain regions, as natural flora.
Aleksandra Nakonieczna +5 more
doaj +1 more source
Cold stress tolerance of the intertidal red alga Neoporphyra haitanensis
Background Red algae Porphyra sensu lato grow naturally in the unfavorable intertidal environment, in which they are exposed to substantial temperature fluctuations. The strategies of Porphyra to tolerate cold stress are poorly understood. Results Herein,
Shanshan Zhu +9 more
doaj +1 more source
Old world hantaviruses cause hemorrhagic fever with renal syndrome (HFRS) upon zoonotic transmission to humans. In Europe, the Puumala virus (PUUV) is the main causative agent of HFRS.
Daniel Bourquain +3 more
doaj +1 more source
Sucrose is an effective carbon source for creating more reliable and environmentally friendly conditions for shrimp growth by regulating bacteria in biofloc-based culture systems.
Haipeng Guo +7 more
doaj +1 more source
The emergence of Variola virus-like viruses by natural evolution of zoonotic Orthopoxviruses, like Cowpox virus (CPXV), is a global health threat. The proteasome is essential for poxvirus replication, making the viral components interacting with the ...
Marica Grossegesse +6 more
doaj +1 more source
Characterizing Phishing Threats with Natural Language Processing
Spear phishing is a widespread concern in the modern network security landscape, but there are few metrics that measure the extent to which reconnaissance is performed on phishing targets.
Kotson, Michael C., Schulz, Alexia
core +1 more source
Reciprocal control of viral infection and phosphoinositide dynamics
Phosphoinositides, although scarce, regulate key cellular processes, including membrane dynamics and signaling. Viruses exploit these lipids to support their entry, replication, assembly, and egress. The central role of phosphoinositides in infection highlights phosphoinositide metabolism as a promising antiviral target.
Marie Déborah Bancilhon, Bruno Mesmin
wiley +1 more source

