Results 81 to 90 of about 306,057 (287)
Phish Phinder: A Game Design Approach to Enhance User Confidence in Mitigating Phishing Attacks
Phishing is an especially challenging cyber security threat as it does not attack computer systems, but targets the user who works on that system by relying on the vulnerability of their decision-making ability.
Arachchilage, Nalin Asanka Gamagedara +2 more
core
KDM7A and KDM1A inhibition suppresses tumour promoting pathways in prostate cancer
Treatment resistance is a major challenge for patients with advanced prostate cancer. This study examined an alternative approach to target the major prostate cancer‐promoting pathway by targeting epigenetic factors, whose levels are higher in tumours.
Jennie N Jeyapalan +16 more
wiley +1 more source
We analyze cisplatin–DNA adducts (CDAs) and double‐strand breaks (DSBs) in a cell‐cycle‐dependent manner. We find that CDAs form similarly across all cell cycle phases. DSBs arise only in S‐phase. CDAs might not directly impair DSB repair, but S‐phase DSB lesions evolve in the presence of CDAs and disrupt repair in G2, also causing radiosensitization ...
Ye Qiu +10 more
wiley +1 more source
We analyzed alterations of PAR metabolism‐related proteins in PARG inhibitor‐resistant HCT116RPDD cells. Although PARG levels remained unchanged, HCT116RPDD cells exhibited reduced PARP1 and ARH3 expression and elevated PAR levels. Interestingly, HCT116RPDD cells exhibited slightly elevated intracellular NAD+/NADH and ATP levels. Our findings suggest a
Kaede Tsuda, Yoko Ogino, Akira Sato
wiley +1 more source
Bisphenol A (BPA), a common chemical in plastics, exerts dual effects on bladder cancer cells: low doses promote growth and migration, while high doses suppress growth and migration. Multi‐omics and bioinformatics reveal BPA acts via MAPK and inflammatory pathways.
Shaomin Niu +10 more
wiley +1 more source
Law and technology security standard [PDF]
The author will deal with the relationship between law and technology from the viewpoint of technology security standard. One of the relationships can be found in that law has been providing a security level of technology.
Kitahara, Munenori
core
Intercompartmental communication in senescence
Senescent cells experience structural changes in the plasma membrane, endoplasmic reticulum, mitochondria, lysosomes, nucleus, and cytoskeleton. These alterations disrupt crosstalk among cellular compartments, impairing vesicular trafficking, contact sites, and molecular flow.
Krystyna Mazan‐Mamczarz +3 more
wiley +1 more source
Sustaining human well‐being is intimately linked to maintaining productive and healthy ecosystems. Avoiding trade‐offs and fostering co‐benefits is however challenging.
Lauric Thiault +5 more
doaj +1 more source
Cutaneous Melanoma Drives Metabolic Changes in the Aged Bone Marrow Immune Microenvironment
Melanoma, the deadliest form of skin cancer, increasingly affects older adults. Our study reveals that melanoma induces changes in iron and lipid levels in the bone marrow, impacting immune cell populations and increasing susceptibility to ferroptosis.
Alexis E. Carey +12 more
wiley +1 more source
IPhone Securtity Analysis [PDF]
The release of Apple’s iPhone was one of the most intensively publicized product releases in the history of mobile devices. While the iPhone wowed users with its exciting design and features, it also outraged many for not allowing installation of third ...
Pandya, Vaibhav Ranchhoddas
core +1 more source

