Results 41 to 50 of about 150,216 (340)

Detecting homologous recombination deficiency for breast cancer through integrative analysis of genomic data

open access: yesMolecular Oncology, EarlyView.
This study develops a semi‐supervised classifier integrating multi‐genomic data (1404 training/5893 validation samples) to improve homologous recombination deficiency (HRD) detection in breast cancer. Our method demonstrates prognostic value and predicts chemotherapy/PARP inhibitor sensitivity in HRD+ tumours.
Rong Zhu   +12 more
wiley   +1 more source

Survey of research on confidential computing

open access: yesIET Communications
As the global data strategy deepens and data elements accelerate integrating and flowing more rapidly, the demand for data security and privacy protection has become increasingly prominent.
Dengguo Feng   +5 more
doaj   +1 more source

A Data Sharing Scheme for GDPR-Compliance Based on Consortium Blockchain

open access: yesFuture Internet, 2021
After the General Data Protection Regulation (GDPR) was introduced, some organizations and big data companies shared data without conducting any privacy protection and compliance authentication, which endangered user data security, and were punished ...
Yangheran Piao, Kai Ye, Xiaohui Cui
doaj   +1 more source

Trusted Computing and Secure Virtualization in Cloud Computing [PDF]

open access: yes, 2012
Large-scale deployment and use of cloud computing in industry is accompanied and in the same time hampered by concerns regarding protection of data handled by cloud computing providers.
Paladi, Nicolae
core   +2 more sources

Comprehensive omics‐based classification system in adult patients with B‐cell acute lymphoblastic leukemia

open access: yesMolecular Oncology, EarlyView.
The COMBAT classification system, developed through multi‐omics integration, stratifies adult patients with B‐cell acute lymphoblastic leukemia(B‐ALL) into three molecular subtypes with distinct surface antigen patterns, immune landscape, methylation patterns, biological pathways and prognosis.
Yang Song   +11 more
wiley   +1 more source

Cyber–Physical–Social Security of High-DER-Penetrated Smart Grids: Threats, Countermeasures, and Challenges

open access: yesIET Information Security
With the trend of large-scale renewable distributed energy sources (DERs) penetrating into the smart grids (SGs), the SGs entail heavy reliance on information and communication technologies (ICT) and increasing impact of social behaviors on system ...
Qiuyu Lu, Jun’e Li, Zhao Peng, Ming Ni
doaj   +1 more source

Fourteen Limit Cycles in a Seven-Degree Nilpotent System

open access: yesAbstract and Applied Analysis, 2013
Center conditions and the bifurcation of limit cycles for a seven-degree polynomial differential system in which the origin is a nilpotent critical point are studied. Using the computer algebra system Mathematica, the first 14 quasi-Lyapunov constants of
Wentao Huang, Ting Chen, Tianlong Gu
doaj   +1 more source

Simultaneous inhibition of TRIM24 and TRIM28 sensitises prostate cancer cells to antiandrogen therapy, decreasing VEGF signalling and angiogenesis

open access: yesMolecular Oncology, EarlyView.
TRIM24 and TRIM28 are androgen receptor (AR) coregulators which exhibit increased expression with cancer progression. Both TRIM24 and TRIM28 combine to influence the response of castrate‐resistant prostate cancer (CRPC) cells to AR inhibitors by mediating AR signalling, regulation of MYC and upregulating VEGF to promote angiogenesis. Castrate‐resistant
Damien A. Leach   +8 more
wiley   +1 more source

TVRAVNF: an efficient low-cost TEE-based virtual remote attestation scheme for virtual network functions

open access: yesCybersecurity
With the continuous advancement of virtualization technology and the widespread adoption of 5G networks, the application of the Network Function Virtualization (NFV) architecture has become increasingly popular and prevalent.
Jie Yuan   +4 more
doaj   +1 more source

Trusted CI Experiences in Cybersecurity and Service to Open Science

open access: yes, 2019
This article describes experiences and lessons learned from the Trusted CI project, funded by the US National Science Foundation to serve the community as the NSF Cybersecurity Center of Excellence.
Adams, Andrew   +18 more
core   +1 more source

Home - About - Disclaimer - Privacy