Results 41 to 50 of about 23,723 (266)

Exploiting metabolic adaptations to overcome dabrafenib treatment resistance in melanoma cells

open access: yesMolecular Oncology, EarlyView.
We show that dabrafenib‐resistant melanoma cells undergo mitochondrial remodeling, leading to elevated respiration and ROS production balanced by stronger antioxidant defenses. This altered redox state promotes survival despite mitochondrial damage but renders resistant cells highly vulnerable to ROS‐inducing compounds such as PEITC, highlighting redox
Silvia Eller   +17 more
wiley   +1 more source

ATF4‐mediated stress response as a therapeutic vulnerability in chordoma

open access: yesMolecular Oncology, EarlyView.
We screened 5 chordoma cell lines against 100+ inhibitors of epigenetic and metabolic pathways and kinases and identified halofuginone, a tRNA synthetase inhibitor. Mechanistically halofuginone induces an integrated stress response, with eIF2alpha phosphorylation, activation of ATF4 and its target genes CHOP, ASNS, INHBE leading to cell death ...
Lucia Cottone   +11 more
wiley   +1 more source

An information theoretic metric for measurement vulnerability to data integrity attacks on smart grids

open access: yesIET Smart Grid
A novel metric that describes the vulnerability of the measurements in power systems to data integrity attacks is proposed. The new metric, coined vulnerability index (VuIx), leverages information theoretic measures to assess the attack effect in terms ...
Xiuzhen Ye   +3 more
doaj   +1 more source

Quantum Vulnerability Analysis to Guide Robust Quantum Computing System Design

open access: yesIEEE Transactions on Quantum Engineering
While quantum computers provide exciting opportunities for information processing, they currently suffer from noise during computation that is not fully understood.
Fang Qi   +6 more
doaj   +1 more source

Copula-Based Vulnerability Analysis of Civil Infrastructure Subjected to Hurricanes

open access: yesFrontiers in Built Environment, 2020
Coastal civil infrastructure can be susceptible to damages caused by hurricanes throughout its service life. Vulnerability assessment is a key component in hazard risk management of civil infrastructure systems.
Yaohan Li, You Dong, Deming Zhu
doaj   +1 more source

Introduction to Computer Network Vulnerabilities [PDF]

open access: yes, 2015
System vulnerabilities are weaknesses in the software or hardware on a server or a client that can be exploited by a determined intruder to gain access to or shut down a network. Vulnerabilities exist not only in the hardware and software that constitute a computer system but also in policies and procedures, especially security policies and procedures,
openaire   +1 more source

Targeted modulation of IGFL2‐AS1 reveals its translational potential in cervical adenocarcinoma

open access: yesMolecular Oncology, EarlyView.
Cervical adenocarcinoma patients face worse outcomes than squamous cell carcinoma counterparts despite similar treatment. The identification of IGFL2‐AS1's differential expression provides a molecular basis for distinguishing these histotypes, paving the way for personalized therapies and improved survival in vulnerable populations globally.
Ricardo Cesar Cintra   +6 more
wiley   +1 more source

Design and implementation of website information disclosure assessment system. [PDF]

open access: yesPLoS ONE, 2015
Internet application technologies, such as cloud computing and cloud storage, have increasingly changed people's lives. Websites contain vast amounts of personal privacy information.
Ying-Chiang Cho, Jen-Yi Pan
doaj   +1 more source

Computer Network Vulnerabilities

open access: yes, 2009
System vulnerabilities are weaknesses in the software or hardware on a server or a client that can be exploited by a determined intruder to gain access to or shut down a network. Donald Pipkin defines system vulnerability as a condition, a weakness of or an absence of security procedure or technical, physical, or other controls that could be exploited ...
openaire   +1 more source

Network divergence analysis identifies adaptive gene modules and two orthogonal vulnerability axes in pancreatic cancer

open access: yesMolecular Oncology, EarlyView.
Tumors contain diverse cellular states whose behavior is shaped by context‐dependent gene coordination. By comparing gene–gene relationships across biological contexts, we identify adaptive transcriptional modules that reorganize into distinct vulnerability axes.
Brian Nelson   +9 more
wiley   +1 more source

Home - About - Disclaimer - Privacy