Results 51 to 60 of about 184,016 (328)
An Empirical Study on Android-related Vulnerabilities
Mobile devices are used more and more in everyday life. They are our cameras, wallets, and keys. Basically, they embed most of our private information in our pocket.
Bavota, Gabriele+2 more
core +1 more source
This study used longitudinal transcriptomics and gene‐pattern classification to uncover patient‐specific mechanisms of chemotherapy resistance in breast cancer. Findings reveal preexisting drug‐tolerant states in primary tumors and diverse gene rewiring patterns across patients, converging on a few dysregulated functional modules. Despite receiving the
Maya Dadiani+14 more
wiley +1 more source
A framework to quantify the vulnerability of insular biota to global changes
The majority of vulnerability assessments of biodiversity to global changes have so far been applied to, and designed for, mainland systems, overlooking islands. However, islands harbour unique biodiversity and are epicentres of ongoing extinctions.
Bellard, Céline+17 more
doaj +1 more source
Optimizing Cybersecurity Investments over Time
In the context of growing vulnerabilities, cyber-risk management cannot rely on a one-off approach, instead calling for a continuous re-assessment of the risk and adaptation of risk management strategies.
Alessandro Mazzoccoli, Maurizio Naldi
doaj +1 more source
Towards Baselines for Shoulder Surfing on Mobile Authentication
Given the nature of mobile devices and unlock procedures, unlock authentication is a prime target for credential leaking via shoulder surfing, a form of an observation attack. While the research community has investigated solutions to minimize or prevent
Aviv Adam J+6 more
core +1 more source
TRPM8 levels determine tumor vulnerability to channel agonists
TRPM8 is a Ca2+ permissive channel. Regardless of the amount of its transcript, high levels of TRPM8 protein mark different tumors, including prostate, breast, colorectal, and lung carcinomas. Targeting TRPM8 with channel agonists stimulates inward calcium currents followed by emptying of cytosolic Ca2+ stores in cancer cells.
Alessandro Alaimo+18 more
wiley +1 more source
Copula-Based Vulnerability Analysis of Civil Infrastructure Subjected to Hurricanes
Coastal civil infrastructure can be susceptible to damages caused by hurricanes throughout its service life. Vulnerability assessment is a key component in hazard risk management of civil infrastructure systems.
Yaohan Li, You Dong, Deming Zhu
doaj +1 more source
With the widespread use of Internet of Things and cloud computing in smart cities, various security and privacy challenges may be encountered.The most basic problem is authentication between each application, such as participating users, IoT devices ...
Huihui Huang+3 more
doaj +1 more source
On Modeling Computer Networks for Vulnerability Analysis [PDF]
Enterprise security must take into account a holistic view of the network. Capturing security and vulnerability attributes of network services and systems is a critical aspect of effective vulnerability analysis and remediation. Unfortunately, this is not always possible due to the overhead associated with tracking distributed resources.
Brandon Pollet+5 more
openaire +2 more sources
Systematic profiling of cancer‐fibroblast interactions reveals drug combinations in ovarian cancer
Fibroblasts, cells in the tumor environment, support ovarian cancer cell growth and alter morphology and drug response. We used fibroblast and cancer cell co‐culture models to test 528 drugs and discovered new drugs for combination treatment. We showed that adding Vorinostat or Birinapant to standard chemotherapy may improve drug response, suggesting ...
Greta Gudoityte+10 more
wiley +1 more source