Results 31 to 40 of about 23,723 (266)
MODELING NETWORK COMPUTER SYSTEMS WITH VULNERABILITIES
Summary: In the paper, a model for discretionary network computer systems with vulnerabilities is proposed. The model is based on the DP-model with functionally or parametrically associated with subjects entities. It is shown how to apply this model for finding all the possible paths to violate the security policy, for representating other models ...
openaire +2 more sources
Cryptochrome and PAS/LOV proteins play intricate roles in circadian clocks where they act as both sensors and mediators of protein–protein interactions. Their ubiquitous presence in signaling networks has positioned them as targets for small‐molecule therapeutics. This review provides a structural introduction to these protein families.
Eric D. Brinckman +2 more
wiley +1 more source
Structural biology of ferritin nanocages
Ferritin is a conserved iron‐storage protein that sequesters iron as a ferric mineral core within a nanocage, protecting cells from oxidative damage and maintaining iron homeostasis. This review discusses ferritin biology, structure, and function, and highlights recent cryo‐EM studies revealing mechanisms of ferritinophagy, cellular iron uptake, and ...
Eloise Mastrangelo, Flavio Di Pisa
wiley +1 more source
A framework to quantify the vulnerability of insular biota to global changes
The majority of vulnerability assessments of biodiversity to global changes have so far been applied to, and designed for, mainland systems, overlooking islands. However, islands harbour unique biodiversity and are epicentres of ongoing extinctions.
Bellard, Céline +17 more
doaj +1 more source
With the widespread use of Internet of Things and cloud computing in smart cities, various security and privacy challenges may be encountered.The most basic problem is authentication between each application, such as participating users, IoT devices ...
Huihui Huang +3 more
doaj +1 more source
Gut microbiome and aging—A dynamic interplay of microbes, metabolites, and the immune system
Age‐dependent shifts in microbial communities engender shifts in microbial metabolite profiles. These in turn drive shifts in barrier surface permeability of the gut and brain and induce immune activation. When paired with preexisting age‐related chronic inflammation this increases the risk of neuroinflammation and neurodegenerative diseases.
Aaron Mehl, Eran Blacher
wiley +1 more source
Evaluation of Post-Quantum Distributed Ledger Cryptography
This paper evaluates the current cybersecurity vulnerability of the prolific use of Elliptical Curve Digital Signature Algorithm (**ECDSA**) cryptography in use by the Bitcoin Core, Ethereum, Bitcoin Cash, and enterprise blockchains such as Multi-Chain ...
Robert Campbell Sr.
doaj +2 more sources
Automated Vulnerability Discovery and Exploitation in the Internet of Things
Recently, automated software vulnerability detection and exploitation in Internet of Things (IoT) has attracted more and more attention, due to IoT’s fast adoption and high social impact. However, the task is challenging and the solutions are non-trivial:
Zhongru Wang +9 more
doaj +1 more source
Optimizing Cybersecurity Investments over Time
In the context of growing vulnerabilities, cyber-risk management cannot rely on a one-off approach, instead calling for a continuous re-assessment of the risk and adaptation of risk management strategies.
Alessandro Mazzoccoli, Maurizio Naldi
doaj +1 more source
Dual targeting of RET and SRC synergizes in RET fusion‐positive cancer cells
Despite the strong activity of selective RET tyrosine kinase inhibitors (TKIs), resistance of RET fusion‐positive (RET+) lung cancer and thyroid cancer frequently occurs and is mainly driven by RET‐independent bypass mechanisms. Son et al. show that SRC TKIs significantly inhibit PAK and AKT survival signaling and enhance the efficacy of RET TKIs in ...
Juhyeon Son +13 more
wiley +1 more source

