Results 61 to 70 of about 306,057 (287)
Interference Management with Partial Uplink/Downlink Spectrum Overlap
Simultaneous reuse of spectral resources by uplink and downlink, denoted as in-band full duplex (FD) communication, is promoted to double the spectral efficiency when compared to its half-duplex (HD) counterpart. Interference management, however, remains
Alouini, Mohamed-Slim +3 more
core +1 more source
Cyclic Bayesian Attack Graphs: A Systematic Computational Approach
Attack graphs are commonly used to analyse the security of medium-sized to large networks. Based on a scan of the network and likelihood information of vulnerabilities, attack graphs can be transformed into Bayesian Attack Graphs (BAGs).
Mace, John +3 more
core +1 more source
Exploiting metabolic adaptations to overcome dabrafenib treatment resistance in melanoma cells
We show that dabrafenib‐resistant melanoma cells undergo mitochondrial remodeling, leading to elevated respiration and ROS production balanced by stronger antioxidant defenses. This altered redox state promotes survival despite mitochondrial damage but renders resistant cells highly vulnerable to ROS‐inducing compounds such as PEITC, highlighting redox
Silvia Eller +17 more
wiley +1 more source
Probabilistic modeling of vulnerability of road infrastructures to floods
Factors which contribute to the vulnerability of physical elements such as road infrastructures to a natural hazard such as a flood event are pervaded by uncertainty due to the complexity of the hazard, of the vulnerable infrastructure and of their ...
Uzielli Marco +2 more
doaj +1 more source
ATF4‐mediated stress response as a therapeutic vulnerability in chordoma
We screened 5 chordoma cell lines against 100+ inhibitors of epigenetic and metabolic pathways and kinases and identified halofuginone, a tRNA synthetase inhibitor. Mechanistically halofuginone induces an integrated stress response, with eIF2alpha phosphorylation, activation of ATF4 and its target genes CHOP, ASNS, INHBE leading to cell death ...
Lucia Cottone +11 more
wiley +1 more source
Analysis of the NIST database towards the composition of vulnerabilities in attack scenarios [PDF]
The composition of vulnerabilities in attack scenarios has been traditionally performed based on detailed pre- and post-conditions. Although very precise, this approach is dependent on human analysis, is time consuming, and not at all scalable.
Franqueira, Virginia Nunes Leal +1 more
core +2 more sources
Dimethyl fumarate (DMF) reduces growth of HPV‐positive cervical cancer spheroids and induces ferroptosis in cervical cancer cells via blocking SLC7A11/Glutathione (GSH) axis. Combination of subcytotoxic doses of DMF and cisplatin (CDDP) further suppresses spheroid growth and drives cell death in 2D culture models.
Carolina Punziano +6 more
wiley +1 more source
Vulnerability remains a contested concept in legal services, with traditional models often reinforcing stigma through risk-based identification. This article introduces the Universal Practice Approach (UPA), which reframes vulnerability as a universal ...
Paolo Baffero, Harriet Pierpoint
doaj +1 more source
Targeted modulation of IGFL2‐AS1 reveals its translational potential in cervical adenocarcinoma
Cervical adenocarcinoma patients face worse outcomes than squamous cell carcinoma counterparts despite similar treatment. The identification of IGFL2‐AS1's differential expression provides a molecular basis for distinguishing these histotypes, paving the way for personalized therapies and improved survival in vulnerable populations globally.
Ricardo Cesar Cintra +6 more
wiley +1 more source
Towards Improved Protection of Vulnerable Road Users [PDF]
The paper aims at reducing injury risk and an overall increase in pedestrian passive safety by proposing pedestrian friendly vehicle design. Statistical data are used to identify the most vulnerable population group also regarding the economic losses caused by deaths or medical treatment. An age dependent anthropometric approach enables the development
L. Hynčík +3 more
openaire +1 more source

