Zobrazeno 1 - 10
of 13
pro vyhledávání: '"Chia Min Lai"'
Autor:
Josephine W Wu, Kuan-Nan Liu, Su-Chun How, Wei-An Chen, Chia-Min Lai, Hwai-Shen Liu, Chaur-Jong Hu, Steven S-S Wang
Publikováno v:
PLoS ONE, Vol 8, Iss 12, p e81982 (2013)
Carnosine, a common dipeptide in mammals, has previously been shown to dissemble alpha-crystallin amyloid fibrils. To date, the dipeptide's anti-fibrillogensis effect has not been thoroughly characterized in other proteins. For a more complete unders
Externí odkaz:
https://doaj.org/article/5dc412791cf14c928aa2800efb5298aa
Publikováno v:
Computer Science & Information Technology.
Publikováno v:
DASC/PiCom/DataCom/CyberSciTech
As Internet-of-Things (IoT) devices went popular in recent years, they have become ideal targets for malicious botnet activists. Due to the low cost nature of most IoT devices, the security protection among these cheap devices is often insufficient.
Publikováno v:
DSC
DNS is a very popular protocol which is responsible for translate domain name to IP address. Attacker can exploit DNS to hide data in DNS tunnel as the organization would not block DNS packets in order to access the Internet. We proposed a DNS tunnel
Publikováno v:
ICMLSC
As the worldwide internet has non-stop developments, it comes with enormous amount automatically generated malware. Those malware had become huge threaten to computer users. A comprehensive malware family classifier can help security researchers to q
As world wild internet has non-stop developments, making profit by lending registered domain names emerges as a new business in recent years. Unfortunately, the larger the market scale of domain lending service becomes, the riskier that there exist m
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_dedup___::00735095cc550b4b6d160b6fe5c13dfd
Publikováno v:
Trustcom/BigDataSE/ISPA
Given service logs of who used what service, and when, how can we find intrusions and anomalies? In this paper, a cyber threat detection framework - ChainSpot was proposed, in which the novelty is to build graphical patterns by summarizing user's seq
Publikováno v:
Colloids and surfaces. B, Biointerfaces. 151
We investigated the effects of nanoparticles (NPs) on the structure and activity of hen egg-white lysozyme (HEWL) using CeO2 and ZnO NPs. Our results showed that CeO2 NPs triggered the transition of lysozyme secondary structure from α-helix to β-sh
Publikováno v:
Proceedings of the ASE BigData & SocialInformatics 2015.
Recognition of information threats from social media can give advantages to incident response in very early stage. Previous related studies mostly focus on finding general hot terms instead of specific continuously-changing targets, such that usage o
Autor:
Kuan Nan Liu, Jeng Shiung Jan, Sung Ning Wang, Chia Min Lai, Hwai-Shen Liu, Yi Ting Lee, Rita P.-Y. Chen, Steven S.-S. Wang
Publikováno v:
Biochimica et biophysica acta. 1820(11)
Background More than twenty-seven human proteins can fold abnormally to form amyloid deposits associated with a number of degenerative diseases. The research reported here is aimed at exploring the connection between curcumin's thermostability and it