-
Article
Open AccessThe G Protein Estrogen Receptor (GPER) is involved in the resistance to the CDK4/6 inhibitor palbociclib in breast cancer
The cyclin D1-cyclin dependent kinases (CDK)4/6 inhibitor palbociclib in combination with endocrine therapy shows remarkable efficacy in the management of estrogen receptor (ER)-positive and HER2-negative adva...
-
Chapter
Firmware Dynamic Analysis Through Rewriting
The proliferation of IoT devices and their increasing integration into daily life has led to significant security concerns. Due to the presence of a multitude of easily exploitable security vulnerabilities, th...
-
Chapter and Conference Paper
SigIL: A Signature-Based Approach of Malware Detection on Intermediate Language
The Internet of Things (IoT) has brought about significant advancements in connectivity but has also introduced security challenges due to the diverse range of IoT devices. Traditional security solutions strug...
-
Article
Transfer learning-based quantized deep learning models for nail melanoma classification
Skin cancer, particularly melanoma, has remained a severe issue for many years due to its increasing incidences. The rising mortality rate associated with melanoma demands immediate attention at early stages t...
-
Article
Open AccessIdentification and prediction of attacks to industrial control systems using temporal point processes
The task of identifying malicious activities in logs and predicting threats is crucial nowadays in industrial sector. In this paper, we focus on the identification of past malicious activities and in the predi...
-
Chapter and Conference Paper
FD-VAE: A Feature Driven VAE Architecture for Flexible Synthetic Data Generation
Variational autoencoders (VAEs) are artificial neural networks used to learn effective data encodings in an unsupervised manner. Each input x provided to a VAE is indeed mapped to an internal representation, say
-
Chapter and Conference Paper
A Framework for the Multi-modal Analysis of Novel Behavior in Business Processes
Novelty detection refers to the task of finding observations that are new or unusual when compared to the ‘known’ behavior. Its practical and challenging nature has been proven in many application domains whil...
-
Chapter and Conference Paper
Coalition Formation with Logic-Based Agents
Coalition formation is studied in a setting where agents take part to a group decision-making scenario and where their preferences are expressed via weighted propositional logic, in particular by considering f...
-
Chapter and Conference Paper
Intrusion Detection with Hypergraph-Based Attack Models
In numerous security scenarios, given a sequence of logged activities, it is necessary to look for all subsequences that represent an intrusion, which can be meant as any “improper” use of a system, an attempt...
-
Chapter and Conference Paper
Count Constraints and the Inverse OLAP Problem: Definition, Complexity and a Step toward Aggregate Data Exchange
A typical problem in database theory is to verify whether there exists a relation (or database) instance satisfying a number of given dependency constraints. This problem has recently received a renewed deal o...
-
Chapter and Conference Paper
Process Mining Manifesto
Process mining techniques are able to extract knowledge from event logs commonly available in today’s information systems. These techniques provide new means to discover, monitor, and improve processes in a varie...
-
Chapter and Conference Paper
Discovering Multi-perspective Process Models: The Case of Loosely-Structured Processes
Process Mining techniques exploit the information stored in the execution log of a process to extract some high-level process model, useful for analysis or design tasks. Most of these techniques focus on “stru...
-
Chapter and Conference Paper
Outlier Detection Techniques for Process Mining Applications
Classical outlier detection approaches may hardly fit process mining applications, since in these settings anomalies emerge not only as deviations from the sequence of events most often registered in the log, ...
-
Chapter and Conference Paper
Process Mining Based on Clustering: A Quest for Precision
Process mining techniques attempt to extract non-trivial and useful information from event logs recorded by information systems. For example, there are many process mining techniques to automatically discover ...
-
Article
AZD3409 inhibits the growth of breast cancer cells with intrinsic resistance to the EGFR tyrosine kinase inhibitor gefitinib
AKT and MAPK signaling are involved in the resistance of breast cancer cells to the EGFR tyrosine kinase inhibitor gefitinib. RAS proteins are upstream mediators that transfer messages from surface receptors t...
-
Chapter and Conference Paper
An Information-Theoretic Framework for High-Order Co-clustering of Heterogeneous Objects
The high-order co-clustering problem, i.e., the problem of simultaneously clustering several heterogeneous types of domains, is usually faced by minimizing a linear combination of some optimization functions eval...
-
Chapter and Conference Paper
An Information-Theoretic Framework for Process Structure and Data Mining
Process-oriented systems have been increasingly attracting data mining community, due to the opportunities the application of inductive process mining techniques to log data can open to both the analysis of compl...
-
Chapter and Conference Paper
Mining Constrained Graphs: The Case of Workflow Systems
Constrained graphs are directed graphs describing the control flow of processes models. In such graphs, nodes represent activities involved in the process, and edges the precedence relationship among such acti...
-
Chapter and Conference Paper
Modelling a Protein Structure Comparison Application on the Grid Using PROTEUS
Bioinformatics applications manage complex biological data stored into distributed and often heterogeneous databases and require large computing power. Among these, protein structure comparison applications ex...
-
Chapter and Conference Paper
Mining Hierarchies of Models: From Abstract Views to Concrete Specifications
Process mining techniques have been receiving great attention in the literature for their ability to automatically support process (re)design. The output of these techniques is a concrete workflow schema that ...