نتایج جستجو برای: apts coating

تعداد نتایج: 37307  

2013
Melissa Hamm Yang Wang Richard R. Rustandi

The N-linked glycosylation in recombinant monoclonal antibodies (mAb) occurs at Asn297 on the Fc region in the CH2 domain. Glycosylation heterogeneities have been well documented to affect biological activities such as antibody-dependent cellular cytotoxicity (ADCC) and complement-dependent cytotoxicity (CDC) through their interaction with Fc-receptors. Hence, it is critical to monitor and char...

2017
Pavlos Lamprakis Ruggiero Dargenio David Gugelmann Vincent Lenders Markus Happe Laurent Vanbever

HTTP is the main protocol used by attackers to establish a command and control (C&C) channel to infected hosts in a network. Identifying such C&C channels in network traffic is however a challenge because of the large volume and complex structure of benign HTTP requests emerging from regular user browsing activities. A common approach to C&C channel detection has been to use supervised learning...

2011
Sandra Lucarelli Giovanni Di Nardo Ginevra Lastrucci Ylenia D'Alfonso Adriana Marcheggiano Tatiana Federici Simone Frediani Tullio Frediani Salvatore Cucchiara

BACKGROUND Allergic proctocolitis (APC) in exclusively breast-fed infants is caused by food proteins, deriving from maternal diet, transferred through lactation. In most cases a maternal cow milk-free diet leads to a prompt resolution of rectal bleeding, while in some patients a multiple food allergy can occur. The aim of this study was to assess whether the atopy patch test (APT) could be help...

Journal: :Biochemical Society transactions 2013
Michael J Shipston

BK (large conductance calcium- and voltage-activated potassium) channels are important determinants of physiological control in the nervous, endocrine and vascular systems with channel dysfunction associated with major disorders ranging from epilepsy to hypertension and obesity. Thus the mechanisms that control channel surface expression and/or activity are important determinants of their (path...

Journal: :Nanoscale 2015
Cheng-Han Lin Jen-Hsuan Chang Yi-Qi Yeh Si-Han Wu Yi-Hsin Liu Chung-Yuan Mou

Uniform hollow silica nanospheres (HSNs) synthesized with reverse microemulsion have great application potential as nanoreactors because enzymes or nanocatalysts can be easily encapsulated de novo in synthesis. Water-in-oil (w/o) reverse microemulsions comprising the polymeric surfactant polyoxyethylene (5) isooctylphenyl ether (Igepal CA-520), ammonia and water in a continuous oil phase (alkan...

Journal: :Journal of advances in mathematics and computer science 2023

The essence of surrogate model is a low-cost alternative, which mainly replaces the computationally heavy simulation process to reduce time cost consumed. In past two decades, this approximation based optimization method has made remarkable progress, and models are widely used in expensive analysis optimization. addition, with development technology, no longer simple substitute, but can drive n...

Journal: :Soft matter 2015
Lei Duan Fang Yang Lina Song Kun Fang Jilai Tian Yijun Liang Mingxi Li Ning Xu Zhongda Chen Yu Zhang Ning Gu

Magnetic microbubbles (MMBs) consisting of microbubbles (MBs) and magnetic nanoparticles (MNPs) were synthesized for use as novel markers for improving multifunctional biomedical imaging. The MMBs were fabricated by assembling MNPs in different concentrations on the surfaces of MBs. The relationships between the structure, magnetic properties, stability of the MMBs, and their use in magnetic re...

Journal: :IEEE Access 2022

In a world where organisations are embracing new IT working models such as Bring Your Own Device (BYOD) and remote working, the traditional mindset of defending network perimeter is no longer sufficient. Zero Trust Architecture (ZTA) has recently emerged security model in which breach dominates threat model. By default, ZTA considers any endpoint (i.e., device), user, or application to be untru...

Journal: :IEEE Transactions on Software Engineering 2023

Software updates reduce the opportunity for exploitation. However, since can also introduce breaking changes, enterprises face problem of balancing need to secure software with support operations. We propose a methodology quantitatively investigate effectiveness strategies against attacks Advanced Persistent Threats (APTs). consider where vendor are only limiting factors cases in which delay fr...

Journal: :IEEE Access 2021

Advanced persistent threats (APTs) have emerged as multi-stage attacks that targeted nation-states and their associated entities, including private corporate sectors. Cyber deception has a defense approach to secure our cyber infrastructure from APTs. Practical deployment of relies on defenders' ability place decoy nodes along the APT path optimally. This paper presents focused predicting most ...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید