UNI-MB - logo
UMNIK - logo
 

Search results

Basic search    Expert search   

Currently you are NOT authorised to access e-resources UM. For full access, REGISTER.

1 2 3 4 5
hits: 201
1.
  • Epigenetics of aging Epigenetics of aging
    Ben-Avraham, Dan Advances in experimental medicine and biology, 01/2015, Volume: 847
    Journal Article
    Peer reviewed

    The aging phenotype is the result of a complex interaction between genetic, epigenetic and environmental factors, and it is among the most complex phenotypes studied to date. Evidence suggests that ...
Check availability
2.
  • D-Score: An expert-based me... D-Score: An expert-based method for assessing the detectability of IoT-related cyber-attacks
    Meidan, Yair; Benatar, Daniel; Bitton, Ron ... Computers & security, March 2023, 2023-03-00, Volume: 126
    Journal Article
    Peer reviewed
    Open access

    IoT devices are known to be vulnerable to various cyber-attacks, such as data exfiltration and the execution of flooding attacks as part of a DDoS attack. When it comes to detecting such attacks ...
Full text
3.
  • Canonical WNT/β-Catenin Sig... Canonical WNT/β-Catenin Signaling Activated by WNT9b and RSPO2 Cooperation Regulates Facial Morphogenesis in Mice
    Jin, Yong-Ri; Han, Xiang Hua; Nishimori, Katsuhiko ... Frontiers in cell and developmental biology, 05/2020, Volume: 8
    Journal Article
    Peer reviewed
    Open access

    The R-spondin (RSPO) family of proteins potentiate canonical WNT/β-catenin signaling and may provide a mechanism to fine-tune the strength of canonical WNT signaling. Although several studies have ...
Full text

PDF
4.
  • CADeSH: Collaborative Anoma... CADeSH: Collaborative Anomaly Detection for Smart Homes
    Meidan, Yair; Avraham, Dan; Libhaber, Hanan ... IEEE internet of things journal, 05/2023, Volume: 10, Issue: 10
    Journal Article
    Open access

    Although home Internet of Things (IoT) devices are typically plain and task oriented, the context of their daily use may affect their traffic patterns. That is, a given IoT device will probably not ...
Full text
5.
  • Exploiting Meta-cognitive F... Exploiting Meta-cognitive Features for a Machine-Learning-Based One-Shot Group-Decision Aggregation
    Shinitzky, Hilla; Avraham, Dan; Vaisman, Yizhak ... Group decision and negotiation, 02/2024, Volume: 33, Issue: 1
    Journal Article
    Peer reviewed
    Open access

    The outcome of collective decision-making often relies on the procedure through which the perspectives of its members are aggregated. Popular aggregation methods, such as the majority rule, often ...
Full text
6.
  • Sequencing an Ashkenazi ref... Sequencing an Ashkenazi reference panel supports population-targeted personal genomics and illuminates Jewish and European origins
    Carmi, Shai; Hui, Ken Y; Kochav, Ethan ... Nature communications, 09/2014, Volume: 5, Issue: 1
    Journal Article
    Peer reviewed
    Open access

    The Ashkenazi Jewish (AJ) population is a genetic isolate close to European and Middle Eastern groups, with genetic diversity patterns conducive to disease mapping. Here we report high-depth ...
Full text

PDF
7.
  • Genotyping of geographicall... Genotyping of geographically diverse Druze trios reveals substructure and a recent bottleneck
    Zidan, Jamal; Ben-Avraham, Dan; Carmi, Shai ... European journal of human genetics : EJHG, 08/2015, Volume: 23, Issue: 8
    Journal Article
    Peer reviewed
    Open access

    Druze individuals rarely marry outside their faith (often practicing consanguinity) and are thus believed to form a genetic isolate. To comprehensively characterize the genetic structure of the Druze ...
Full text

PDF
8.
  • The complex genetics of gai... The complex genetics of gait speed: genome-wide meta-analysis approach
    Ben-Avraham, Dan; Karasik, David; Verghese, Joe ... Aging (Albany, NY.), 01/2017, Volume: 9, Issue: 1
    Journal Article
    Open access

    Emerging evidence suggests that the basis for variation in late-life mobility is attributable, in part, to genetic factors, which may become increasingly important with age. Our objective was to ...
Full text

PDF
9.
Full text

PDF
10.
  • CADeSH: Collaborative Anomaly Detection for Smart Homes
    Meidan, Yair; Avraham, Dan; Libhaber, Hanan ... arXiv.org, 03/2023
    Paper, Journal Article
    Open access

    Although home IoT (Internet of Things) devices are typically plain and task oriented, the context of their daily use may affect their traffic patterns. For this reason, anomaly-based intrusion ...
Full text
1 2 3 4 5
hits: 201

Load filters