- Network Security and Intrusion Detection
- Advanced Malware Detection Techniques
- Cancer-related Molecular Pathways
- Information and Cyber Security
- Ovarian cancer diagnosis and treatment
- Privacy-Preserving Technologies in Data
- Genetic factors in colorectal cancer
- Pancreatic and Hepatic Oncology Research
- Blockchain Technology Applications and Security
- Merger and Competition Analysis
- Cybercrime and Law Enforcement Studies
- Endometrial and Cervical Cancer Treatments
- Internet Traffic Analysis and Secure E-voting
- Security and Verification in Computing
- Complex Network Analysis Techniques
- User Authentication and Security Systems
- Access Control and Trust
- Cancer Treatment and Pharmacology
- Crime, Illicit Activities, and Governance
- Cancer Genomics and Diagnostics
- Privacy, Security, and Data Protection
- Security in Wireless Sensor Networks
- Cancer Cells and Metastasis
- Ancient Mediterranean Archaeology and History
- Cryptography and Data Security
University of Zagreb
2025
Innovative Technologies Center (Greece)
2019-2023
Aristotle University of Thessaloniki
2005-2022
Papageorgiou General Hospital
2016-2021
Alexander Technological Educational Institute of Thessaloniki
2018-2019
Hellenic Cooperative Oncology Group
2016-2019
International Hellenic University
2019
Pfizer (United States)
2011-2017
Technical University of Crete
2013-2016
UConn Health
2000-2015
The relationship between abnormal cell proliferation and aberrant control of hormonal secretion is a fundamental poorly understood issue in endocrine neoplasia. Transgenic mice with parathyroid-targeted overexpression the cyclin D1 oncogene, modeling gene rearrangement found human tumors, were created to determine whether primary defect this cell-cycle regulator can cause an serum calcium parathyroid hormone response, as typical hyperparathyroidism. We also sought develop animal model...
The cyclin D1 gene encodes a regulatory subunit of the holoenzyme that phosphorylates and inactivates pRb tumor suppressor to promote nuclear DNA synthesis.cyclin is overexpressed in human breast cancers sufficient for development murine mammary tumors.Herein, shown perform novel function, inhibiting mitochondrial function size.Mitochondrial activity was enhanced by genetic deletion or antisense small interfering RNA D1.Global expression profiling functional analysis epithelial cell-targeted...
Threat intelligence sharing has become a cornerstone of cooperative and collaborative cybersecurity. Sources providing such data have more widespread in recent years, ranging from public entities (driven by legislatorial changes) to commercial companies open communities that provide threat order help organisations individuals better understand assess the cyber landscape putting their systems at risk. Tool support automatically process this information is emerging concurrently. It been...
Threat intelligence helps businesses and organisations make the right decisions in their fight against cyber threats, strategically design digital defences for an optimised up-to-date security situation. Combined with advanced analysis, threat reduce time between detection of attack its containment. This is achieved by continuously providing information, accompanied data, on existing emerging threats vulnerabilities affecting corporate networks. paper addresses challenges that are bound to...
Aberrant crypt foci (ACF), putative preneoplastic lesions, are early morphological changes induced by the colon carcinogen azoxymethane (AOM). Although inbred mice differ markedly in their susceptibility to AOM carcinogenesis, we have previously shown that ACF develop both resistant and sensitive mouse strains after treatment. The purpose of this study was examine sequential development identify characteristics distal mice. A/J (highly susceptible), SWR/J (relatively susceptible) AKR/J...
// Mathew C. Casimiro 1, 4 , Gabriele Di Sante Marco Crosariol Emanuele Loro William Dampier 5 Adam Ertel Zuoren Yu Elizabeth A. Saria 6 Alexandros Papanikolaou Zhiping Li Chenguang Wang 3, Sankar Addya Michael P. Lisanti Paolo Fortina Robert D. Cardiff 7 Aydin Tozeren Erik S. Knudsen Andrew Arnold Richard G. Pestell 2, 4, 8 1 Departments of Cancer Biology, Thomas Jefferson University & Hospital, Philadelphia, PA 19107, USA 2 Medical Oncology, 3 Stem Cell and Regenerative Medicine,...
In the Internet of Things (IoT) ecosystem, volume data generated by devices in user’s environment is continually increasing and becoming particular value. such an average user bound to face considerable difficulties understanding size scope his/her collected data. However, provisions European General Data Protection Regulation (GDPR) require subjects be able control their personal data, informed, consent its processing intelligible manner. This paper proposes ADVOCATE platform, a...
The cognitive impairments observed in Alzheimer's disease (AD) are part a consequence of reduced acetylcholine (ACh) levels resulting from loss cholinergic neurons. Preclinically, serotonin 4 receptor (5-HT(4)) agonists reported to modulate function and therefore may provide new mechanistic approach for treating deficits associated with AD. Herein we communicate the design synthesis potent, selective, brain penetrant 5-HT(4) agonists. overall goal medicinal chemistry strategy was...
Alterations in the expression of cell cycle regulators, cyclin D1 and cyclin-dependent kinase 4 (Cdk4), have been implicated malignancies both humans experimental animal models. We hypothesize that altered Cdk4 may also be involved mouse colon tumorigenesis induced by chemical carcinogen, azoxymethane (AOM). In present study, SWR/J mice were given AOM i.p. injection at a dose 10 mg/kg once week for 8 weeks, colonic tissue tumors isolated 18 weeks later. The localization examined reverse...
Aberrant crypt foci (ACF), putative preneoplastic lesions, are early morphological changes induced by the colon carcinogen azoxymethane (AOM). Although inbred mice differ markedly in their susceptibility to AOM carcinogenesis, we have previously shown that ACF develop both resistant and sensitive mouse strains after treatment. The purpose of this study was examine sequential development identify characteristics distal mice. A/J (highly susceptible), SWR/J (relatively susceptible) AKR/J...
The possibility to predict the epitope recognized by a given T-cell receptor (TCR), based on Complementarity Determining Region 3 (CDR3) sequence, could significantly facilitate cancer immunotherapy approaches. However, accurate prediction of TCR peptide binding is still significant challenge. We have developed new machine-learning-based framework support adoptive Tcell therapy for cancer. Our predicts probability presence specific amino acids in epitopes presented MHC (Major...
Paclitaxel-based regimens are frequently associated with the development of peripheral neuropathy. The autonomous nervous system (ANS) effects, however, this chemotherapeutic agent remain unexplored.We investigated a group 31 female patients ovarian cancer receiving treatment paclitaxel and carboplatin, as well 16 healthy age- gender-matched volunteers. All study participants completed questionnaire were assessed neurophysiologically at three time points (baseline, 3-4 months 6-8 following...
Prolactin-secreting pituitary adenomas are common spontaneous lesions in aging FVB females. proliferations play a significant role mouse mammary tumorigenesis generally producing adenosquamous carcinomas. Since genetically engineered mice frequently used to study tumor biology, we have examined cohort of 64 wild-type FVB/N females establish the prevalence and nature tumors. Tissues from glands were studied by histopathology immunohistochemistry. Of mice, 20 had tumors Mammary associated 17...
The widespread use of mobile devices has attracted the attention cyber-criminals, who exploit their functionality for malevolent purposes. A very popular and well-known such approach is unsolicited electronic messages, also known as spam. Such messages can be used by attackers in order to tempt recipient visit a malicious page, or reply message charged at premium rates, even advertising goods offers. Several mechanisms developed fighting spam have been based on widely adopted e-mail...
The wide deployment of low-power and lossy networks (LLNs) connected to the Internet has raised many security concerns regarding protection data they handle communicate. Such now face all sorts threats identified in traditional networks. However, solutions found cannot directly be adopted by LLNs, due inherent limited capabilities embedded systems that comprise them. This paper focuses on provided LLN nodes using 6LoWPAN adaptation format, one predominant for communicating over IEEE 802.15.4...