Scopus İndeksli Yayınlar Koleksiyonu / Scopus Indexed Publications Collection

Permanent URI for this collectionhttps://hdl.handle.net/11147/7148

Browse

Search Results

Now showing 1 - 3 of 3
  • Article
    Citation - WoS: 10
    Citation - Scopus: 11
    Intersection of Microrna and Gene Regulatory Networks and Their Implication in Cancer
    (Bentham Science Publishers B.V., 2014) Yousef, Malik; Trinh, Hung V.; Allmer, Jens
    MicroRNAs (miRNAs) have attracted heightened attention for their role as post-transcriptional regulators of gene expression. It has become clear that miRNAs can both up- and downregulate protein expression. According to current estimates, most human genes are harboring miRNAs and/or are regulated by them. Thus miRNAs form a complex network of expression regulation which tightly interacts with known gene regulatory networks. Similar to some transcription factors, some miRNAs can have hundreds of target transcripts whose expression they modulate. Thus miRNAs can form complex regulatory networks by themselves, but because their expression is often tightly coordinated with gene expression, they form an intertwined regulatory network with many possible interactions among gene and miRNA regulatory pathways. In this review we first consider gene regulatory networks. Then we discuss microRNAs and their implication in cancer and how they may form regulatory networks. Finally, we give our perspective and provide an outlook including the aspect of personalized medicine.
  • Conference Object
    Citation - Scopus: 4
    A Model of Distributed Key Generation for Industrial Control Systems
    (Elsevier Ltd., 2012) Kılınç, Görkem; Fovino, Igor Nai; Ferigato, Carlo; Koltuksuz, Ahmet
    The cyber-security of industrial control systems (ICS) is gaining high relevance due to the impact of industrial system failures on the citizen life. There is an urgent need for the consideration of security in their design, and for the analysis of the related vulnerabilities and potential threats. The high exposure of industrial critical infrastructure to cyber-threats is mainly due to the intrinsic weakness of the communication protocols used to control the process network. The peculiarities of the industrial protocols (low computational power, large geographical distribution, near to real-time constraints) make hard the effective use of traditional cryptographic schemes and in particular the implementation of an effective key management infrastructure supporting a cryptographic layer. In this paper, we describe a "model of distributed key generation for industrial control systems" we have recently implemented. The model is based on a known Distributed Key Generator protocol we have adapted to an industrial control system environment and to the related communication protocol (Modbus). To validate in a formal way selected security properties of the model, we introduced a Petri Nets representation. This representation allows for modeling attacks against the protocol and understanding some potential weaknesses of its implementation in the industrial control system environment.
  • Conference Object
    Citation - WoS: 2
    Citation - Scopus: 4
    Symbolic Computation of Petri Nets
    (Springer, 2007) Iglesias, Andres; Kapçak, Sinan
    Petri nets are receiving increasing attention from the scientific community during the last few years. They provide the users with a powerful formalism for describing and analyzing a variety of information processing systems such as finite-state machines, concurrent systems, multiprocessors and parallel computation, formal languages, communication protocols, etc. Although the mathematical theory of Petri nets has been intensively analyzed from several points of view, the symbolic computation of these nets is still a challenge, particularly for general-purpose computer algebra systems (CAS). In this paper, a new Mathematica package for dealing with some Petri nets is introduced.