Results 51 to 60 of about 23,723 (266)
Rowhammer Attacks in Dynamic Random-Access Memory and Defense Methods
This paper provides a comprehensive overview of the security vulnerability known as rowhammer in Dynamic Random-Access Memory (DRAM). While DRAM offers many desirable advantages, including low latency, high density, and cost-effectiveness, rowhammer ...
Dayeon Kim +6 more
doaj +1 more source
Pre‐analytical handling critically determines liquid biopsy performance. This study defines practical best‐practice conditions for cell‐free DNA (cfDNA) and extracellular vesicle–derived DNA (evDNA), showing how processing time, storage conditions, tube type, and plasma input volume affect DNA integrity and mutation detection.
Jonas Dohmen +11 more
wiley +1 more source
E2A selectively regulates TGF‐β–induced apoptosis in KRAS‐mutant non‐small cell lung cancer
Ability to induce apoptosis by TGF‐β is frequently lost in advanced lung adenocarcinoma despite intact TGF‐β signaling. We identify E2A as a mutant KRAS–dependent mediator of resistance to TGF‐β–induced apoptosis. TGF‐β induces E2A via SMAD3 in mutant KRAS cells, and E2A silencing restores apoptosis and enhances radiation response in cell lines ...
Sergei Chuikov +3 more
wiley +1 more source
SURVEY ON CLOUD COMPUTING VULNERABILITY AND CYBER ATTACKS: A DEFENSIVE APPROACH
Cyber attacks against cloud computing discourage users to migrate to cloud computing. Cloud computing currently has weaknesses in terms of securing data. Unprotected data and weak storage security are potential threats to cloud computing.
YUCEL TUREL
doaj
Fault and Error Tolerance in Neural Networks: A Review
Beyond energy, the growing number of defects in physical substrates is becoming another major constraint that affects the design of computing devices and systems.
Cesar Torres-Huitzil, Bernard Girau
doaj +1 more source
We analyze cisplatin–DNA adducts (CDAs) and double‐strand breaks (DSBs) in a cell‐cycle‐dependent manner. We find that CDAs form similarly across all cell cycle phases. DSBs arise only in S‐phase. CDAs might not directly impair DSB repair, but S‐phase DSB lesions evolve in the presence of CDAs and disrupt repair in G2, also causing radiosensitization ...
Ye Qiu +10 more
wiley +1 more source
GreenBERT: A lightweight green transformer for automated prediction of software vulnerability scores
Timely assessment of software vulnerabilities is critical for effective patch prioritization, yet manual Common Vulnerability Scoring System (CVSS) scoring remains slow and resource-intensive.
Seyedeh Leili Mirtaheri +3 more
doaj +1 more source
Computational complexity of network vulnerability analysis
Abstract Residual closeness is recently proposed as a vulnerability measure to characterize the stability of complex networks. Residual closeness is essential in the analysis of complex networks, but costly to compute. Currently, the fastest known algorithms run in polynomial time.
openaire +3 more sources
We analyzed alterations of PAR metabolism‐related proteins in PARG inhibitor‐resistant HCT116RPDD cells. Although PARG levels remained unchanged, HCT116RPDD cells exhibited reduced PARP1 and ARH3 expression and elevated PAR levels. Interestingly, HCT116RPDD cells exhibited slightly elevated intracellular NAD+/NADH and ATP levels. Our findings suggest a
Kaede Tsuda, Yoko Ogino, Akira Sato
wiley +1 more source
IMPACTS AND CHALLENGES OF CLOUD COMPUTING FOR SMALL AND MEDIUM SCALE BUSINESSES IN NIGERIA [PDF]
Cloud computing technology is providing businesses, be it micro, small, medium, and large scale enterprises with the same level playing grounds. Small and Medium enterprises (SMEs) that have adopted the cloud are taking their businesses to greater ...
Scholastica Mallo, Francisca Ogwueleka
doaj

