Results 101 to 110 of about 470,699 (271)

Targeted modulation of IGFL2‐AS1 reveals its translational potential in cervical adenocarcinoma

open access: yesMolecular Oncology, EarlyView.
Cervical adenocarcinoma patients face worse outcomes than squamous cell carcinoma counterparts despite similar treatment. The identification of IGFL2‐AS1's differential expression provides a molecular basis for distinguishing these histotypes, paving the way for personalized therapies and improved survival in vulnerable populations globally.
Ricardo Cesar Cintra   +6 more
wiley   +1 more source

Artificial intelligence tools for automating penetration testing

open access: yesТехнічна інженерія
The article discusses automated penetration testing using artificial intelligence (AI), which significantly enhances the efficiency and accuracy of cybersecurity assessments.
M.S. Koloshchuk   +3 more
doaj   +1 more source

Anticancer sensitivities and biological characteristics of HCT116 cells resistant to the selective poly(ADP‐ribose) glycohydrolase inhibitor

open access: yesFEBS Open Bio, EarlyView.
We analyzed alterations of PAR metabolism‐related proteins in PARG inhibitor‐resistant HCT116RPDD cells. Although PARG levels remained unchanged, HCT116RPDD cells exhibited reduced PARP1 and ARH3 expression and elevated PAR levels. Interestingly, HCT116RPDD cells exhibited slightly elevated intracellular NAD+/NADH and ATP levels. Our findings suggest a
Kaede Tsuda, Yoko Ogino, Akira Sato
wiley   +1 more source

Ontological model for predicting cyberattacks based on virtualized Honeynets

open access: yesLogos Ciencia & Tecnología, 2016
The honeynets security tools are widely used today for the purpose of gathering information from potential attackers about vulnerabilities in our network. For performing correct use of them is necessary to understand the existing types, structures raised,
Gaona-García, Pablo   +2 more
doaj   +1 more source

Analisis Dan Mitigasi Celah Keamanan Website SIMPKN Informatika Menggunakan Metode Owasp Zed Attack Proxy (ZAP) [PDF]

open access: yes
In today's technological developments, there are a variety of conveniences in processing information data that make it easier for every individual to build a website.
Perdhana, Helmi Indra
core  

Enhancing Oncological Care for India's Aging Population: Addressing the Complex Needs of Older Adults With Cancer

open access: yesAging and Cancer, EarlyView.
Aging‐associated physiological and molecular alterations pose significant challenges in cancer management among India's elderly. Limited geriatric oncology expertise, financial constraints, and inadequate specialized care exacerbate disparities. Strategic expansion of insurance coverage, integration of palliative care, and infrastructural advancements ...
Nihanthy D. Sreenath   +3 more
wiley   +1 more source

Predicting and Comparing the Subjective Health Experience of Older Cancer Survivors and Non‐Cancer Survivors: A Modeling Approach

open access: yesAging and Cancer, EarlyView.
This study underscores the significant influence of frailty and vitality on the subjective health experience of older cancer survivors with acceptance and control emerging as salient mediators. These findings affirm the conceptual and empirical robustness of the model highlighting its potential utility in shaping future interventions for older cancer ...
Damien S. E. Broekharst   +4 more
wiley   +1 more source

A Survey of Adversarial Attacks: An Open Issue for Deep Learning Sentiment Analysis Models

open access: yesApplied Sciences
In recent years, the use of deep learning models for deploying sentiment analysis systems has become a widespread topic due to their processing capacity and superior results on large volumes of information.
Monserrat Vázquez-Hernández   +5 more
doaj   +1 more source

Cutaneous Melanoma Drives Metabolic Changes in the Aged Bone Marrow Immune Microenvironment

open access: yesAging and Cancer, EarlyView.
Melanoma, the deadliest form of skin cancer, increasingly affects older adults. Our study reveals that melanoma induces changes in iron and lipid levels in the bone marrow, impacting immune cell populations and increasing susceptibility to ferroptosis.
Alexis E. Carey   +12 more
wiley   +1 more source

Face Detection Performance Using CNNs and Bug Bonuty Program (BBP)

open access: yesIraqi Journal for Computer Science and Mathematics
Bug bounty schemes make use of outside ethical hackers to find and fix a variety of security flaws, guaranteeing quicker and more affordable problem solving. Better confidence in and image of the company in the cybersecurity space, faster solving issues,
Yasmin Makki Mohialden   +2 more
doaj   +1 more source

Home - About - Disclaimer - Privacy