Results 41 to 50 of about 23,723 (266)
Exploiting metabolic adaptations to overcome dabrafenib treatment resistance in melanoma cells
We show that dabrafenib‐resistant melanoma cells undergo mitochondrial remodeling, leading to elevated respiration and ROS production balanced by stronger antioxidant defenses. This altered redox state promotes survival despite mitochondrial damage but renders resistant cells highly vulnerable to ROS‐inducing compounds such as PEITC, highlighting redox
Silvia Eller +17 more
wiley +1 more source
ATF4‐mediated stress response as a therapeutic vulnerability in chordoma
We screened 5 chordoma cell lines against 100+ inhibitors of epigenetic and metabolic pathways and kinases and identified halofuginone, a tRNA synthetase inhibitor. Mechanistically halofuginone induces an integrated stress response, with eIF2alpha phosphorylation, activation of ATF4 and its target genes CHOP, ASNS, INHBE leading to cell death ...
Lucia Cottone +11 more
wiley +1 more source
A novel metric that describes the vulnerability of the measurements in power systems to data integrity attacks is proposed. The new metric, coined vulnerability index (VuIx), leverages information theoretic measures to assess the attack effect in terms ...
Xiuzhen Ye +3 more
doaj +1 more source
Quantum Vulnerability Analysis to Guide Robust Quantum Computing System Design
While quantum computers provide exciting opportunities for information processing, they currently suffer from noise during computation that is not fully understood.
Fang Qi +6 more
doaj +1 more source
Copula-Based Vulnerability Analysis of Civil Infrastructure Subjected to Hurricanes
Coastal civil infrastructure can be susceptible to damages caused by hurricanes throughout its service life. Vulnerability assessment is a key component in hazard risk management of civil infrastructure systems.
Yaohan Li, You Dong, Deming Zhu
doaj +1 more source
Introduction to Computer Network Vulnerabilities [PDF]
System vulnerabilities are weaknesses in the software or hardware on a server or a client that can be exploited by a determined intruder to gain access to or shut down a network. Vulnerabilities exist not only in the hardware and software that constitute a computer system but also in policies and procedures, especially security policies and procedures,
openaire +1 more source
Targeted modulation of IGFL2‐AS1 reveals its translational potential in cervical adenocarcinoma
Cervical adenocarcinoma patients face worse outcomes than squamous cell carcinoma counterparts despite similar treatment. The identification of IGFL2‐AS1's differential expression provides a molecular basis for distinguishing these histotypes, paving the way for personalized therapies and improved survival in vulnerable populations globally.
Ricardo Cesar Cintra +6 more
wiley +1 more source
Design and implementation of website information disclosure assessment system. [PDF]
Internet application technologies, such as cloud computing and cloud storage, have increasingly changed people's lives. Websites contain vast amounts of personal privacy information.
Ying-Chiang Cho, Jen-Yi Pan
doaj +1 more source
Computer Network Vulnerabilities
System vulnerabilities are weaknesses in the software or hardware on a server or a client that can be exploited by a determined intruder to gain access to or shut down a network. Donald Pipkin defines system vulnerability as a condition, a weakness of or an absence of security procedure or technical, physical, or other controls that could be exploited ...
openaire +1 more source
Tumors contain diverse cellular states whose behavior is shaped by context‐dependent gene coordination. By comparing gene–gene relationships across biological contexts, we identify adaptive transcriptional modules that reorganize into distinct vulnerability axes.
Brian Nelson +9 more
wiley +1 more source

