Results 31 to 40 of about 76,767 (261)

By dawn or dusk—how circadian timing rewrites bacterial infection outcomes

open access: yesFEBS Letters, EarlyView.
The circadian clock shapes immune function, yet its influence on infection outcomes is only beginning to be understood. This review highlights how circadian timing alters host responses to the bacterial pathogens Salmonella enterica, Listeria monocytogenes, and Streptococcus pneumoniae revealing that the effectiveness of immune defense depends not only
Devons Mo   +2 more
wiley   +1 more source

CTTGAN: Traffic Data Synthesizing Scheme Based on Conditional GAN

open access: yesSensors, 2022
Most machine learning algorithms only have a good recognition rate on balanced datasets. However, in the field of malicious traffic identification, benign traffic on the network is far greater than malicious traffic, and the network traffic dataset is ...
Jiayu Wang   +4 more
doaj   +1 more source

IoT device identification based on network traffic

open access: yesWireless Networks, 2023
Abstract With the rapid development of Internet of Things (IoT) technology, the widespread deployment and heterogeneity of IoT devices bring new challenges to device identification. For network administrators, understanding the IoT devices connected to the network is very important.
Dinglin Gu   +6 more
openaire   +1 more source

Phosphatidylinositol 4‐kinase as a target of pathogens—friend or foe?

open access: yesFEBS Letters, EarlyView.
This graphical summary illustrates the roles of phosphatidylinositol 4‐kinases (PI4Ks). PI4Ks regulate key cellular processes and can be hijacked by pathogens, such as viruses, bacteria and parasites, to support their intracellular replication. Their dual role as essential host enzymes and pathogen cofactors makes them promising drug targets.
Ana C. Mendes   +3 more
wiley   +1 more source

Protein pyrophosphorylation by inositol pyrophosphates — detection, function, and regulation

open access: yesFEBS Letters, EarlyView.
Protein pyrophosphorylation is an unusual signaling mechanism that was discovered two decades ago. It can be driven by inositol pyrophosphate messengers and influences various cellular processes. Herein, we summarize the research progress and challenges of this field, covering pathways found to be regulated by this posttranslational modification as ...
Sarah Lampe   +3 more
wiley   +1 more source

Automated mining of packet signatures for traffic identification at application layer with apriori algorithm

open access: yesTongxin xuebao, 2008
Automatic and accurate extraction packet signatures are the foundation of the precise traffic identification at application level. A method which can automatically extract the packet signatures of characteristic string and packet length for traffic ...
LIU Xing-bin1   +3 more
doaj   +2 more sources

In situ molecular organization and heterogeneity of the Legionella Dot/Icm T4SS

open access: yesFEBS Letters, EarlyView.
We present a nearly complete in situ model of the Legionella Dot/Icm type IV secretion system, revealing its central secretion channel and identifying new components. Using cryo‐electron tomography with AI‐based modeling, our work highlights the structure, variability, and mechanism of this complex nanomachine, advancing understanding of bacterial ...
Przemysław Dutka   +11 more
wiley   +1 more source

PICALM::MLLT10 translocated leukemia

open access: yesFEBS Letters, EarlyView.
This comprehensive review of PICALM::MLLT10 translocated acute leukemia provides an in‐depth review of the structure and function of CALM, AF10, and the fusion oncoprotein (1). The multifaceted molecular mechanisms of oncogenesis, including nucleocytoplasmic shuttling (2), epigenetic modifications (3), and disruption of endocytosis (4), are then ...
John M. Cullen   +7 more
wiley   +1 more source

Key Technology of SSL Encrypted Application Identification Under Imbalance of Application Class

open access: yesDianxin kexue, 2015
Through a in-depth study about the reason of network class imbalance, a method called SMOTE was chosen over the data set sampling preprocess, making full use of the advantages which is high accuracy of traffic model feature matching identification and ...
Xuejiao Chen, Pan Wang, Shidong3 Liu
doaj  

Network traffic identification in packet sampling environment

open access: yesDigital Communications and Networks, 2023
With the rapid growth of network bandwidth, traffic identification is currently an important challenge for network management and security. In recent years, packet sampling has been widely used in most network management systems.
Shi Dong, Yuanjun Xia
doaj   +1 more source

Home - About - Disclaimer - Privacy