Results 71 to 80 of about 306,057 (287)
Ghera: A Repository of Android App Vulnerability Benchmarks
Security of mobile apps affects the security of their users. This has fueled the development of techniques to automatically detect vulnerabilities in mobile apps and help developers secure their apps; specifically, in the context of Android platform due ...
Arzt Steven +4 more
core +1 more source
Tumors contain diverse cellular states whose behavior is shaped by context‐dependent gene coordination. By comparing gene–gene relationships across biological contexts, we identify adaptive transcriptional modules that reorganize into distinct vulnerability axes.
Brian Nelson +9 more
wiley +1 more source
Reverse Proxy Framework using Sanitization Technique for Intrusion Prevention in Database
With the increasing importance of the internet in our day to day life, data security in web application has become very crucial. Ever increasing on line and real time transaction services have led to manifold rise in the problems associated with the ...
Chougule, Archana +2 more
core +1 more source
Pre‐analytical handling critically determines liquid biopsy performance. This study defines practical best‐practice conditions for cell‐free DNA (cfDNA) and extracellular vesicle–derived DNA (evDNA), showing how processing time, storage conditions, tube type, and plasma input volume affect DNA integrity and mutation detection.
Jonas Dohmen +11 more
wiley +1 more source
VULNERABILITY ANALYSIS IN CRITICAL INFRASTRUCTURES: A METHODOLOGY
Vulnerability assessment is a crucial aspect for the development of methodologies to define the levels of protection in critical infrastructures. Throughout this research, we discussed the concept of vulnerability and methodologies and processes for ...
António FERREIRA
doaj +1 more source
Automated Dynamic Firmware Analysis at Scale: A Case Study on Embedded Web Interfaces
Embedded devices are becoming more widespread, interconnected, and web-enabled than ever. However, recent studies showed that these devices are far from being secure.
Costin, Andrei +2 more
core +2 more sources
Hippo pathway at the crossroads of stemness and therapeutic resistance in breast cancer
Dysregulation of the Hippo pathway drives nuclear accumulation of YAP/TAZ, activating stemness‐related transcriptional programs that sustain breast cancer stemness and fuel therapeutic resistance across subtypes, underscoring Hippo signaling as a targetable vulnerability. Figure created and edited with BioRender.com.
Giulia Schiavoni +11 more
wiley +1 more source
With the development of traffic and increased mobility of their population, all the countries in the globe have faced the problem of vulnerability in traffic, that is, traffic accidents involving large number of injuries and significant material damages. All road users are exposed to risk.
openaire +1 more source
Attack vectors against social networking systems : the Facebook example [PDF]
Social networking systems (SNS’s) such as Facebook are an ever evolving and developing means of social interaction, which is not only being used to disseminate information to family, friends and colleagues but as a way of meeting and interacting ...
Leitch, Shona +2 more
core +2 more sources
E2A selectively regulates TGF‐β–induced apoptosis in KRAS‐mutant non‐small cell lung cancer
Ability to induce apoptosis by TGF‐β is frequently lost in advanced lung adenocarcinoma despite intact TGF‐β signaling. We identify E2A as a mutant KRAS–dependent mediator of resistance to TGF‐β–induced apoptosis. TGF‐β induces E2A via SMAD3 in mutant KRAS cells, and E2A silencing restores apoptosis and enhances radiation response in cell lines ...
Sergei Chuikov +3 more
wiley +1 more source

