Results 71 to 80 of about 202,881 (332)

ATF4‐mediated stress response as a therapeutic vulnerability in chordoma

open access: yesMolecular Oncology, EarlyView.
We screened 5 chordoma cell lines against 100+ inhibitors of epigenetic and metabolic pathways and kinases and identified halofuginone, a tRNA synthetase inhibitor. Mechanistically halofuginone induces an integrated stress response, with eIF2alpha phosphorylation, activation of ATF4 and its target genes CHOP, ASNS, INHBE leading to cell death ...
Lucia Cottone   +11 more
wiley   +1 more source

Rowhammer Attacks in Dynamic Random-Access Memory and Defense Methods

open access: yesSensors
This paper provides a comprehensive overview of the security vulnerability known as rowhammer in Dynamic Random-Access Memory (DRAM). While DRAM offers many desirable advantages, including low latency, high density, and cost-effectiveness, rowhammer ...
Dayeon Kim   +6 more
doaj   +1 more source

Cloud Enterprise Dynamic Risk Assessment (CEDRA): a dynamic risk assessment using dynamic Bayesian networks for cloud environment

open access: yesJournal of Cloud Computing: Advances, Systems and Applications, 2023
Cloud computing adoption has been increasing rapidly amid COVID-19 as organisations accelerate the implementation of their digital strategies. Most models adopt traditional dynamic risk assessment, which does not adequately quantify or monetise risks to ...
Dawood Behbehani   +3 more
doaj   +1 more source

Anticancer sensitivities and biological characteristics of HCT116 cells resistant to the selective poly(ADP‐ribose) glycohydrolase inhibitor

open access: yesFEBS Open Bio, EarlyView.
We analyzed alterations of PAR metabolism‐related proteins in PARG inhibitor‐resistant HCT116RPDD cells. Although PARG levels remained unchanged, HCT116RPDD cells exhibited reduced PARP1 and ARH3 expression and elevated PAR levels. Interestingly, HCT116RPDD cells exhibited slightly elevated intracellular NAD+/NADH and ATP levels. Our findings suggest a
Kaede Tsuda, Yoko Ogino, Akira Sato
wiley   +1 more source

Memory Vulnerability: A Case for Delaying Error Reporting

open access: yes, 2018
To face future reliability challenges, it is necessary to quantify the risk of error in any part of a computing system. To this goal, the Architectural Vulnerability Factor (AVF) has long been used for chips.
Casas, Marc   +3 more
core  

Predicting and Comparing the Subjective Health Experience of Older Cancer Survivors and Non‐Cancer Survivors: A Modeling Approach

open access: yesAging and Cancer, EarlyView.
This study underscores the significant influence of frailty and vitality on the subjective health experience of older cancer survivors with acceptance and control emerging as salient mediators. These findings affirm the conceptual and empirical robustness of the model highlighting its potential utility in shaping future interventions for older cancer ...
Damien S. E. Broekharst   +4 more
wiley   +1 more source

SURVEY ON CLOUD COMPUTING VULNERABILITY AND CYBER ATTACKS: A DEFENSIVE APPROACH

open access: yesTASK Quarterly, 2013
Cyber attacks against cloud computing discourage users to migrate to cloud computing. Cloud computing currently has weaknesses in terms of securing data. Unprotected data and weak storage security are potential threats to cloud computing.
YUCEL TUREL
doaj  

Vulnerability Management for an Enterprise Resource Planning System

open access: yes, 2012
Enterprise resource planning (ERP) systems are commonly used in technical educational institutions(TEIs). ERP systems should continue providing services to its users irrespective of the level of failure.
Garg, Deepak, Goel, Shivani, Kiran, Ravi
core   +1 more source

Cutaneous Melanoma Drives Metabolic Changes in the Aged Bone Marrow Immune Microenvironment

open access: yesAging and Cancer, EarlyView.
Melanoma, the deadliest form of skin cancer, increasingly affects older adults. Our study reveals that melanoma induces changes in iron and lipid levels in the bone marrow, impacting immune cell populations and increasing susceptibility to ferroptosis.
Alexis E. Carey   +12 more
wiley   +1 more source

GreenBERT: A lightweight green transformer for automated prediction of software vulnerability scores

open access: yesArray
Timely assessment of software vulnerabilities is critical for effective patch prioritization, yet manual Common Vulnerability Scoring System (CVSS) scoring remains slow and resource-intensive.
Seyedeh Leili Mirtaheri   +3 more
doaj   +1 more source

Home - About - Disclaimer - Privacy