Results 71 to 80 of about 202,881 (332)
ATF4‐mediated stress response as a therapeutic vulnerability in chordoma
We screened 5 chordoma cell lines against 100+ inhibitors of epigenetic and metabolic pathways and kinases and identified halofuginone, a tRNA synthetase inhibitor. Mechanistically halofuginone induces an integrated stress response, with eIF2alpha phosphorylation, activation of ATF4 and its target genes CHOP, ASNS, INHBE leading to cell death ...
Lucia Cottone +11 more
wiley +1 more source
Rowhammer Attacks in Dynamic Random-Access Memory and Defense Methods
This paper provides a comprehensive overview of the security vulnerability known as rowhammer in Dynamic Random-Access Memory (DRAM). While DRAM offers many desirable advantages, including low latency, high density, and cost-effectiveness, rowhammer ...
Dayeon Kim +6 more
doaj +1 more source
Cloud computing adoption has been increasing rapidly amid COVID-19 as organisations accelerate the implementation of their digital strategies. Most models adopt traditional dynamic risk assessment, which does not adequately quantify or monetise risks to ...
Dawood Behbehani +3 more
doaj +1 more source
We analyzed alterations of PAR metabolism‐related proteins in PARG inhibitor‐resistant HCT116RPDD cells. Although PARG levels remained unchanged, HCT116RPDD cells exhibited reduced PARP1 and ARH3 expression and elevated PAR levels. Interestingly, HCT116RPDD cells exhibited slightly elevated intracellular NAD+/NADH and ATP levels. Our findings suggest a
Kaede Tsuda, Yoko Ogino, Akira Sato
wiley +1 more source
Memory Vulnerability: A Case for Delaying Error Reporting
To face future reliability challenges, it is necessary to quantify the risk of error in any part of a computing system. To this goal, the Architectural Vulnerability Factor (AVF) has long been used for chips.
Casas, Marc +3 more
core
This study underscores the significant influence of frailty and vitality on the subjective health experience of older cancer survivors with acceptance and control emerging as salient mediators. These findings affirm the conceptual and empirical robustness of the model highlighting its potential utility in shaping future interventions for older cancer ...
Damien S. E. Broekharst +4 more
wiley +1 more source
SURVEY ON CLOUD COMPUTING VULNERABILITY AND CYBER ATTACKS: A DEFENSIVE APPROACH
Cyber attacks against cloud computing discourage users to migrate to cloud computing. Cloud computing currently has weaknesses in terms of securing data. Unprotected data and weak storage security are potential threats to cloud computing.
YUCEL TUREL
doaj
Vulnerability Management for an Enterprise Resource Planning System
Enterprise resource planning (ERP) systems are commonly used in technical educational institutions(TEIs). ERP systems should continue providing services to its users irrespective of the level of failure.
Garg, Deepak, Goel, Shivani, Kiran, Ravi
core +1 more source
Cutaneous Melanoma Drives Metabolic Changes in the Aged Bone Marrow Immune Microenvironment
Melanoma, the deadliest form of skin cancer, increasingly affects older adults. Our study reveals that melanoma induces changes in iron and lipid levels in the bone marrow, impacting immune cell populations and increasing susceptibility to ferroptosis.
Alexis E. Carey +12 more
wiley +1 more source
GreenBERT: A lightweight green transformer for automated prediction of software vulnerability scores
Timely assessment of software vulnerabilities is critical for effective patch prioritization, yet manual Common Vulnerability Scoring System (CVSS) scoring remains slow and resource-intensive.
Seyedeh Leili Mirtaheri +3 more
doaj +1 more source

