To see the other types of publications on this topic, follow the link: Decoy Strategy.

Journal articles on the topic 'Decoy Strategy'

Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles

Select a source type:

Consult the top 50 journal articles for your research on the topic 'Decoy Strategy.'

Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.

You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.

Browse journal articles on a wide variety of disciplines and organise your bibliography correctly.

1

Seo, Sang, and Dohoon Kim. "OSINT-Based LPC-MTD and HS-Decoy for Organizational Defensive Deception." Applied Sciences 11, no. 8 (2021): 3402. http://dx.doi.org/10.3390/app11083402.

Full text
Abstract:
This study aimed to alleviate the theoretical limitations of existing moving target defense (MTD) and decoy concepts and improve the efficiency of defensive deception technology within an organization. We present the concept of an open-source intelligence (OSINT)-based hierarchical social engineering decoy (HS-Decoy) strategy while considering the actual fingerprint of each organization. In addition, we propose a loosely proactive control-based MTD strategy that is based on the intended competitive exposure of OSINT between defenders and attackers. Existing MTDs and decoys are biased toward pr
APA, Harvard, Vancouver, ISO, and other styles
2

Linsky, Thomas W., Renan Vergara, Nuria Codina, et al. "De novo design of potent and resilient hACE2 decoys to neutralize SARS-CoV-2." Science 370, no. 6521 (2020): 1208–14. http://dx.doi.org/10.1126/science.abe0075.

Full text
Abstract:
We developed a de novo protein design strategy to swiftly engineer decoys for neutralizing pathogens that exploit extracellular host proteins to infect the cell. Our pipeline allowed the design, validation, and optimization of de novo human angiotensin-converting enzyme 2 (hACE2) decoys to neutralize severe acute respiratory syndrome coronavirus 2 (SARS-CoV-2). The best monovalent decoy, CTC-445.2, bound with low nanomolar affinity and high specificity to the receptor-binding domain (RBD) of the spike protein. Cryo–electron microscopy (cryo-EM) showed that the design is accurate and can simult
APA, Harvard, Vancouver, ISO, and other styles
3

Huang, Hesong, Zhongxiang Tong, Taorui Li, Lintong Jia, and Shenbo Li. "Defense Strategy of Aircraft Confronted with IR Guided Missile." Mathematical Problems in Engineering 2017 (2017): 1–9. http://dx.doi.org/10.1155/2017/9070412.

Full text
Abstract:
Surface-type infrared (IR) decoy can simulate the IR characteristics of the target aircraft, which is one of the most effective equipment to confront IR guided missile. In the air combat, the IR guided missile poses a serious threat to the aircraft when it comes from the front of target aircraft. In this paper, firstly, the model of aircraft and surface-type IR decoy is established. To ensure their authenticity, the aircraft maneuver and radiation models based on real data of flight and exhaust system radiation in the state of different heights and different speeds are established. Secondly, t
APA, Harvard, Vancouver, ISO, and other styles
4

Ackerman, Joshua T., John M. Eadie, and Thomas G. Moore. "Does Life History Predict Risk-Taking Behavior of Wintering Dabbling Ducks?" Condor 108, no. 3 (2006): 530–46. http://dx.doi.org/10.1093/condor/108.3.530.

Full text
Abstract:
AbstractLife-history theory predicts that longer-lived, less fecund species should take fewer risks when exposed to predation than shorter-lived, more fecund species. We tested this prediction for seven species of dabbling ducks (Anas) by measuring the approach behavior (behavior of ducks when approaching potential landing sites) of 1099 duck flocks during 37 hunting trials and 491 flocks during 13 trials conducted immediately after the 1999–2000 waterfowl hunting season in California, USA. We also experimentally manipulated the attractiveness of the study site by using two decoy treatments: (
APA, Harvard, Vancouver, ISO, and other styles
5

Kato, K., K. Akeda, S. Miyazaki, et al. "NF-kB decoy oligodeoxynucleotide preserves disc height in a rabbit anular-puncture model and reduces pain induction in a rat xenograft-radiculopathy model." European Cells and Materials 42 (July 20, 2021): 90–109. http://dx.doi.org/10.22203/ecm.v042a07.

Full text
Abstract:
While it is known that the degenerated intervertebral disc (IVD) is one of the primary reasons for low-back pain and subsequent need for medical care, there are currently no established effective methods for direct treatment. Nuclear factor-κB (NF-κB) is a transcription factor that regulates various genes’ expression, among which are inflammatory cytokines, in many tissues including the IVD. NF-κB decoy is an oligodeoxynucleotide containing the NF-κB binding site that entraps NF-κB subunits, resulting in suppression of NF-κB activity. In the present preclinical study, NF-κB decoy was injected
APA, Harvard, Vancouver, ISO, and other styles
6

Bern, Marshall W., and Yong J. Kil. "Two-Dimensional Target Decoy Strategy for Shotgun Proteomics." Journal of Proteome Research 10, no. 12 (2011): 5296–301. http://dx.doi.org/10.1021/pr200780j.

Full text
APA, Harvard, Vancouver, ISO, and other styles
7

Burri Naresh, Et al. "Integrating Enhanced Decoy Technology and User Behavior Profiling for Strengthening Cloud Server Security." International Journal on Recent and Innovation Trends in Computing and Communication 11, no. 8 (2023): 401–8. http://dx.doi.org/10.17762/ijritcc.v11i8.9082.

Full text
Abstract:
Information technology improvements have improved things but also caused security issues, particularly with regard to password file security. Strong security measures are needed for cloud computing, which holds massive amounts of data. This study investigates the possibility of Enhanced Decoy technology and User Behaviour Profiling as a combined strategy to improve cloud server security. Although there are algorithms for both strategies, after recognizing anonymous user behaviour, effectively providing Enhanced Decoy files without raising suspicion is still difficult. In order to provide a com
APA, Harvard, Vancouver, ISO, and other styles
8

Ramasamy, Thiruganesh, Xucai Chen, Bin Qin, Daniel E. Johnson, Jennifer R. Grandis, and Flordeliza S. Villanueva. "STAT3 decoy oligonucleotide-carrying microbubbles with pulsed ultrasound for enhanced therapeutic effect in head and neck tumors." PLOS ONE 15, no. 11 (2020): e0242264. http://dx.doi.org/10.1371/journal.pone.0242264.

Full text
Abstract:
Signal transducer and activator of transcription-3 (STAT3) is an oncogenic transcription factor implicated in carcinogenesis, tumor progression, and drug resistance in head and neck squamous cell carcinoma (HNSCC). A decoy oligonucleotide targeting STAT3 offers a promising anti-tumor strategy, but achieving targeted tumor delivery of the decoy with systemic administration poses a significant challenge. We previously showed the potential for STAT3 decoy-loaded microbubbles, in conjunction with ultrasound targeted microbubble cavitation (UTMC), to decrease tumor growth in murine squamous cell ca
APA, Harvard, Vancouver, ISO, and other styles
9

Tomita, Naruya, Toshio Ogihara, and Ryuichi Morishita. "Therapeutic potential of decoy oligonucleotides strategy in cardiovascular diseases." Expert Review of Cardiovascular Therapy 1, no. 3 (2003): 463–70. http://dx.doi.org/10.1586/14779072.1.3.463.

Full text
APA, Harvard, Vancouver, ISO, and other styles
10

Jia, Dong. "Decoy oligonucleotide technology in fibrosis: Application and delivery strategy." World Chinese Journal of Digestology 23, no. 31 (2015): 4931. http://dx.doi.org/10.11569/wcjd.v23.i31.4931.

Full text
APA, Harvard, Vancouver, ISO, and other styles
11

Du, Xuancheng, Mingzhen Zhang, Huiting Zhou, et al. "Decoy Nanozymes Enable Multitarget Blockade of Proinflammatory Cascades for the Treatment of Multi-Drug-Resistant Bacterial Sepsis." Research 2022 (September 26, 2022): 1–15. http://dx.doi.org/10.34133/2022/9767643.

Full text
Abstract:
Sepsis is a life-threatening organ dysfunction characterized by severe systemic inflammatory response to infection. Effective treatment of bacterial sepsis remains a paramount clinical challenge, due to its astonishingly rapid progression and the prevalence of bacterial drug resistance. Here, we present a decoy nanozyme-enabled intervention strategy for multitarget blockade of proinflammatory cascades to treat multi-drug-resistant (MDR) bacterial sepsis. The decoy nanozymes (named MCeC@MΦ) consist mesoporous silica nanoparticle cores loaded with CeO2 nanocatalyst and Ce6 photosensitizer and bi
APA, Harvard, Vancouver, ISO, and other styles
12

Zhou, Chun, Yu Zhou, Yangbin Xu, et al. "Finite-Key Analysis of 1-Decoy Method Quantum Key Distribution with Intensity Fluctuation." Applied Sciences 12, no. 9 (2022): 4709. http://dx.doi.org/10.3390/app12094709.

Full text
Abstract:
The decoy state quantum key distribution (QKD) protocol is proven to be an effective strategy against the photon number splitting attack. It was shown that the 1-decoy state protocol, easier to implement in the practical QKD system, outperforms the 2-decoy state protocol for block sizes of up to 108 bits. How intensity fluctuations influence the performance of the 1-decoy state protocol with finite resources remains a pending issue. In this paper, we present a finite-key analysis of the 1-decoy state protocol with intensity fluctuations and obtain the secret key rate formula about intensity fl
APA, Harvard, Vancouver, ISO, and other styles
13

Li, Zhen, Xiaoyu Bao, Qingfeng Meng, Pengqun Shen, and Dimitri Volchenkov. "Research on the Complexity Mechanism of Decoy Strategies Based on Multiagent Simulation." Complexity 2020 (September 29, 2020): 1–15. http://dx.doi.org/10.1155/2020/4752986.

Full text
Abstract:
Competition and diffusion of products are of great significance to companies. In this study, various true decoy strategies are constructed using different combinations of price and quality. This paper then analyzes the performance of strategies using different product competition and diffusion scenarios. The influences of neighbor nodes, reconnection probability, and herd mentality on decoy effects are explored. The results show that setting an appropriate true decoy can enhance the competitiveness of a target product to some extent. Conversely, an inappropriate decoy strategy will play a nega
APA, Harvard, Vancouver, ISO, and other styles
14

Mantovani, Alberto, Massimo Locati, Annunciata Vecchi, Silvano Sozzani, and Paola Allavena. "Decoy receptors: a strategy to regulate inflammatory cytokines and chemokines." Trends in Immunology 22, no. 6 (2001): 328–36. http://dx.doi.org/10.1016/s1471-4906(01)01941-x.

Full text
APA, Harvard, Vancouver, ISO, and other styles
15

Tomita, Naruya, Naoki Kashihara, and Ryuichi Morishita. "Transcription factor decoy oligonucleotide-based therapeutic strategy for renal disease." Clinical and Experimental Nephrology 11, no. 1 (2007): 7–17. http://dx.doi.org/10.1007/s10157-007-0459-6.

Full text
APA, Harvard, Vancouver, ISO, and other styles
16

Li, Quancheng, Chuanxiang Zhu, Yonghua Fan, Shizheng Wan, and Jie Yan. "Study on Infrared Air-to-Air Missile Guidance Accuracy Affected by Complicated Environment." Xibei Gongye Daxue Xuebao/Journal of Northwestern Polytechnical University 37, no. 3 (2019): 457–64. http://dx.doi.org/10.1051/jnwpu/20193730457.

Full text
Abstract:
The guidance accuracy of an infrared air-to-air missile is affected by various factors such as target maneuver, interference, and the natural environment. The complicated confrontational environment posed by target maneuver and decoy launch is considered in this article. The more practical adjoint analysis model for the influence of target maneuver and decoy launch on missile guidance accuracy is established by analyzing the jamming process, motion characteristics, and the influence mechanism on the guidance system of point source decoy. By using the adjoint method, the barrel roll maneuver an
APA, Harvard, Vancouver, ISO, and other styles
17

Wang, Li Hua, Xiao Yi Yang, Robert A. Kirken, James H. Resau, and William L. Farrar. "Targeted disruption of Stat6 DNA binding activity by an oligonucleotide decoy blocks IL-4–driven TH2 cell response." Blood 95, no. 4 (2000): 1249–57. http://dx.doi.org/10.1182/blood.v95.4.1249.004k39_1249_1257.

Full text
Abstract:
The transcription factor, signal transducer and activator of transcription (Stat) 6, regulates TH2-lymphocyte activity by controlling the expression and responsiveness to interleukin (IL)–4, which plays a key role in numerous allergic maladies. Therefore, we sought to use a phosphorothiolate cis-element decoy to target disruption of Stat6 transcriptional activity. Here we showed that the Stat6 decoy potently ablated the messenger RNA expression and production of IL-4, but not of several other cytokines. The Stat6 decoy functionally disrupted IL-4–inducible cell proliferation of murine TH2 cell
APA, Harvard, Vancouver, ISO, and other styles
18

Suzuki, Jun-ichi, Mitsuaki Isobe, Ryuichi Morishita, and Ryozo Nagai. "Nucleic Acid Drugs for Prevention of Cardiac Rejection." Journal of Biomedicine and Biotechnology 2009 (2009): 1–5. http://dx.doi.org/10.1155/2009/916514.

Full text
Abstract:
Heart transplantation has been broadly performed in humans. However, occurrence of acute and chronic rejection has not yet been resolved. Several inflammatory factors, such as cytokines and adhesion molecules, enhance the rejection. The graft arterial disease (GAD), which is a type of chronic rejection, is characterized by intimal thickening comprised of proliferative smooth muscle cells. Specific treatments that target the attenuation of acute rejection and GAD formation have not been well studied in cardiac transplantation. Recent progress in the nucleic acid drugs, such as antisense oligode
APA, Harvard, Vancouver, ISO, and other styles
19

Wang, Hsiang-Ching, Peng-Nien Huang, Hui-Chen Hung, et al. "Effect of a Neuropilin-1-Derived Virus Receptor Trap on Enterovirus A71 Infection In Vitro." Antimicrobial Agents and Chemotherapy 65, no. 1 (2020): e00695-20. http://dx.doi.org/10.1128/aac.00695-20.

Full text
Abstract:
ABSTRACTWe discovered that neuropilin 1 (NRP1) is a new receptor candidate to mediate enterovirus A71 (EVA71) into cells. In the engineered form as a decoy receptor, NRP1 was able to recognize and neutralize EVA71 but not enterovirus D68 or coxsackievirus B3 (CVB3). NRP1 recognizes EVA71 through a novel domain on the VP3 capsid protein. The principle in the design, engineering, and refinement of the NRP1-based decoy receptor described in this study represents a general and well-suited antiviral strategy.
APA, Harvard, Vancouver, ISO, and other styles
20

Zaki Ahmad, Mohammad, Sohail Akhter, Neha Mallik, Mohammad Anwar, Wajda Tabassum, and Farhan Jalees Ahmad. "Application of Decoy Oligonucleotides as Novel Therapeutic Strategy: A Contemporary Overview." Current Drug Discovery Technologies 10, no. 1 (2013): 71–84. http://dx.doi.org/10.2174/157016313804998898.

Full text
APA, Harvard, Vancouver, ISO, and other styles
21

Zaki Ahmad, Mohammad, Sohail Akhter, Neha Mallik, Mohammad Anwar, Wajda Tabassum, and Farhan Jalees Ahmad. "Application of Decoy Oligonucleotides as Novel Therapeutic Strategy: A Contemporary Overview." Current Drug Discovery Technologies 10, no. 1 (2013): 71–84. http://dx.doi.org/10.2174/1570163811310010009.

Full text
APA, Harvard, Vancouver, ISO, and other styles
22

Ivanov, Mark V., Lev I. Levitsky, and Mikhail V. Gorshkov. "Adaptation of Decoy Fusion Strategy for Existing Multi-Stage Search Workflows." Journal of The American Society for Mass Spectrometry 27, no. 9 (2016): 1579–82. http://dx.doi.org/10.1007/s13361-016-1436-7.

Full text
APA, Harvard, Vancouver, ISO, and other styles
23

Lee, Sun-Jae, Young-Ah Kim, and Kwan-Kyu Park. "Anti-Fibrotic Effect of Synthetic Noncoding Decoy ODNs for TFEB in an Animal Model of Chronic Kidney Disease." International Journal of Molecular Sciences 23, no. 15 (2022): 8138. http://dx.doi.org/10.3390/ijms23158138.

Full text
Abstract:
Despite emerging evidence suggesting that autophagy occurs during renal interstitial fibrosis, the role of autophagy activation in fibrosis and the mechanism by which autophagy influences fibrosis remain controversial. Transcription factor EB (TFEB) is a master regulator of autophagy-related gene transcription, lysosomal biogenesis, and autophagosome formation. In this study, we examined the preventive effects of TFEB suppression on renal fibrosis. We injected synthesized TFEB decoy oligonucleotides (ODNs) into the tail veins of unilateral ureteral obstruction (UUO) mice to explore the regulat
APA, Harvard, Vancouver, ISO, and other styles
24

Sims, Joshua J., Sharon Lian, Rosemary L. Meggersee, Aradhana Kasimsetty, and James M. Wilson. "High activity of an affinity-matured ACE2 decoy against Omicron SARS-CoV-2 and pre-emergent coronaviruses." PLOS ONE 17, no. 8 (2022): e0271359. http://dx.doi.org/10.1371/journal.pone.0271359.

Full text
Abstract:
The viral genome of severe acute respiratory syndrome coronavirus 2 (SARS-CoV-2), particularly its cell-binding spike protein gene, has undergone rapid evolution during the coronavirus disease 2019 (COVID-19) pandemic. Variants including Omicron BA.1 and Omicron BA.2 now seriously threaten the efficacy of therapeutic monoclonal antibodies and vaccines that target the spike protein. Viral evolution over a much longer timescale has generated a wide range of genetically distinct sarbecoviruses in animal populations, including the pandemic viruses SARS-CoV-2 and SARS-CoV-1. The genetic diversity a
APA, Harvard, Vancouver, ISO, and other styles
25

van den Enden, Gitta, and Kelly Geyskens. "Attract the best: The attraction effect as an effective strategy to enhance healthy choices." PLOS ONE 16, no. 11 (2021): e0259521. http://dx.doi.org/10.1371/journal.pone.0259521.

Full text
Abstract:
Every day, people make many food decisions without thinking, repeatedly falling for the unhealthy option instead of the healthy option. While making these mindless decisions, people often rely on heuristics. In this paper, we demonstrate that these heuristics can be exploited to nudge consumers towards healthy alternatives. Specifically, we explore how the attraction effect (i.e., adding a decoy to a choice set) can nudge people to choose a healthy snack. The results of our choice experiment indicate that adding a decoy (i.e., a less attractive food alternative) to a self-control situation (i.
APA, Harvard, Vancouver, ISO, and other styles
26

Pateria, Jalaj, Laxmi Ahuja, Subhranil Som, and Ashish Seth. "Applying Clustering to Predict Attackers Trace in Deceptive Ecosystem by Harmonizing Multiple Decoys Interactions Logs." International Journal of Information Technology and Computer Science 15, no. 5 (2023): 35–44. http://dx.doi.org/10.5815/ijitcs.2023.05.04.

Full text
Abstract:
Bluff and truth are major pillars of deception technology. Deception technology majorly relies on decoy-generated data and looks for any behavior deviation to flag that interaction as an attack or not. But at times a legitimate user can also do suspicious decoy interactions due to lack of knowledge and can be categorized under the “ATTACK” category which in a true sense should not be flagged that way. Hence, there is a need of doing collaborative analysis on honeypot, which are set up to monitor and log activities of sources that compromise or probe them. This goldmine provides ample informati
APA, Harvard, Vancouver, ISO, and other styles
27

Balgley, Brian M., Tom Laudeman, Li Yang, Tao Song, and Cheng S. Lee. "Comparative Evaluation of Tandem MS Search Algorithms Using a Target-Decoy Search Strategy." Molecular & Cellular Proteomics 6, no. 9 (2007): 1599–608. http://dx.doi.org/10.1074/mcp.m600469-mcp200.

Full text
APA, Harvard, Vancouver, ISO, and other styles
28

Jiang, Xinning, Guanghui Han, Shun Feng, et al. "Automatic Validation of Phosphopeptide Identifications by the MS2/MS3 Target-Decoy Search Strategy." Journal of Proteome Research 7, no. 4 (2008): 1640–49. http://dx.doi.org/10.1021/pr700675j.

Full text
APA, Harvard, Vancouver, ISO, and other styles
29

Sakaguchi, Taichi, Yoshiki Sawa, Norihide Fukushima та ін. "A novel strategy of decoy transfection against nuclear factor-κB in myocardial preservation". Annals of Thoracic Surgery 71, № 2 (2001): 624–29. http://dx.doi.org/10.1016/s0003-4975(00)01906-8.

Full text
APA, Harvard, Vancouver, ISO, and other styles
30

Keich, Uri, Kaipo Tamura, and William Stafford Noble. "Averaging Strategy To Reduce Variability in Target-Decoy Estimates of False Discovery Rate." Journal of Proteome Research 18, no. 2 (2018): 585–93. http://dx.doi.org/10.1021/acs.jproteome.8b00802.

Full text
APA, Harvard, Vancouver, ISO, and other styles
31

Shen, Changyu, Quanhu Sheng, Jie Dai, Yixue Li, Rong Zeng, and Haixu Tang. "On the estimation of false positives in peptide identifications using decoy search strategy." PROTEOMICS 9, no. 1 (2009): 194–204. http://dx.doi.org/10.1002/pmic.200800330.

Full text
APA, Harvard, Vancouver, ISO, and other styles
32

Kandathil, Shaun M., Mario Garza-Fabre, Julia Handl, and Simon C. Lovell. "Reliable Generation of Native-Like Decoys Limits Predictive Ability in Fragment-Based Protein Structure Prediction." Biomolecules 9, no. 10 (2019): 612. http://dx.doi.org/10.3390/biom9100612.

Full text
Abstract:
Our previous work with fragment-assembly methods has demonstrated specific deficiencies in conformational sampling behaviour that, when addressed through improved sampling algorithms, can lead to more reliable prediction of tertiary protein structure when good fragments are available, and when score values can be relied upon to guide the search to the native basin. In this paper, we present preliminary investigations into two important questions arising from more difficult prediction problems. First, we investigated the extent to which native-like conformational states are generated during mul
APA, Harvard, Vancouver, ISO, and other styles
33

Lambertini, E., L. Penolazzi, V. Sollazzo, et al. "Modulation of gene expression in human osteoblasts by targeting a distal promoter region of human estrogen receptor-alpha gene." Journal of Endocrinology 172, no. 3 (2002): 683–93. http://dx.doi.org/10.1677/joe.0.1720683.

Full text
Abstract:
Estrogen receptor (ER) alpha is expressed during osteoblast differentiation; however, both its functional role in bone metabolism and its involvement in osteoporotic pathogenesis caused by estrogen deficiency are not well understood. Loss of ER alpha gene expression could be one of the mechanisms leading to osteoporosis. Therefore, we investigated a possible modulation of ER alpha gene expression in a human osteoblastic cell line and in four primary osteoblast cultures by using a decoy strategy. Double stranded DNA molecules, mimicking a regulatory region of the ER alpha gene promoter (DNA-102
APA, Harvard, Vancouver, ISO, and other styles
34

Salunke, Mangesh D., Subhash G. Rathod, Hemantkumar B. Jadhav, Meghna Yashwante, Vaibhav D. Rewaskar, and Pranjali V. Deshmukh. "Implementation of Decoy Deception based Detection System for Ransomware Attack." International Journal on Recent and Innovation Trends in Computing and Communication 11, no. 8s (2023): 714–19. http://dx.doi.org/10.17762/ijritcc.v11i8s.7673.

Full text
Abstract:
Ransomware poses a dangerous threat to cybersecurity. Data as well as rights owned by the user are adversely impacted. The situation has become considerably more critical as a result of the emergence of new ransomware varieties and Ransomware-as-a-Service. In this paper, we presented a novel deception-based and behaviour-based method for real-time ransomware detection. In order to avoid any loss before ransomware is discovered, we build pretend files and directories for nefarious behaviours. We conducted a pilot study using Locky, and the results demonstrate the effectiveness of our strategy w
APA, Harvard, Vancouver, ISO, and other styles
35

Yuan, Yichao, and Tiaojun Xiao. "Retailer's decoy strategy versus consumers' reference price effect in a retailer-Stackelberg supply chain." Journal of Retailing and Consumer Services 68 (September 2022): 103081. http://dx.doi.org/10.1016/j.jretconser.2022.103081.

Full text
APA, Harvard, Vancouver, ISO, and other styles
36

Stanley Jeremiah, Sundararaj, Kenji Ohba, and Naoki Yamamoto. "Cancellers - Exploring the Possibility of Receptor Decoy Traps As a Superior Anti-Retroviral Strategy." Current Drug Targets 17, no. 6 (2016): 678–92. http://dx.doi.org/10.2174/138945011706160324125824.

Full text
APA, Harvard, Vancouver, ISO, and other styles
37

Shieh, Chih-Hui, Yingzi Xu, and I.-Ling Ling. "How location-based advertising elicits in-store purchase." Journal of Services Marketing 33, no. 4 (2019): 380–95. http://dx.doi.org/10.1108/jsm-03-2018-0083.

Full text
Abstract:
Purpose This paper aims to investigate how location-based advertising (LBA) elicits in-store purchase intention. To deepen the understanding of LBA’s effect on consumers’ purchase decision, the research examines the role of consumers’ time consciousness in click intention in pull or opt-out LBA approaches. The study also explores how consumers react to LBA with an asymmetric dominance decoy versus a compromise decoy message. Design/methodology/approach Two field experiments were conducted, and a total of 363 volunteers within 3 km of a shopping mall participated. The participants were asked to
APA, Harvard, Vancouver, ISO, and other styles
38

Peng, Yisu, Shantanu Jain, Yong Fuga Li, et al. "New mixture models for decoy-free false discovery rate estimation in mass spectrometry proteomics." Bioinformatics 36, Supplement_2 (2020): i745—i753. http://dx.doi.org/10.1093/bioinformatics/btaa807.

Full text
Abstract:
Abstract Motivation Accurate estimation of false discovery rate (FDR) of spectral identification is a central problem in mass spectrometry-based proteomics. Over the past two decades, target-decoy approaches (TDAs) and decoy-free approaches (DFAs) have been widely used to estimate FDR. TDAs use a database of decoy species to faithfully model score distributions of incorrect peptide-spectrum matches (PSMs). DFAs, on the other hand, fit two-component mixture models to learn the parameters of correct and incorrect PSM score distributions. While conceptually straightforward, both approaches lead t
APA, Harvard, Vancouver, ISO, and other styles
39

Hernaez, Bruno, and Antonio Alcami. "New insights into the immunomodulatory properties of poxvirus cytokine decoy receptors at the cell surface." F1000Research 7 (June 11, 2018): 719. http://dx.doi.org/10.12688/f1000research.14238.1.

Full text
Abstract:
Poxviruses encode a set of secreted proteins that bind cytokines and chemokines as a strategy to modulate host defense mechanisms. These viral proteins mimic the activity of host cytokine decoy receptors but have unique properties that may enhance their activity. Here, we describe the ability of poxvirus cytokine receptors to attach to the cell surface after secretion from infected cells, and we discuss the advantages that this property may confer to these viral immunomodulatory proteins.
APA, Harvard, Vancouver, ISO, and other styles
40

Tomita, Naruya, Ryuichi Morishita, Tetsuya Tomita, Haruhito Azuma, and Toshio Ogihara. "NF-κB as a Therapeutic Target for Transcription Factor Decoy Strategy in Inflammatory Diseases." Current Medicinal Chemistry - Anti-Inflammatory & Anti-Allergy Agents 2, no. 1 (2003): 51–56. http://dx.doi.org/10.2174/1568014033355826.

Full text
APA, Harvard, Vancouver, ISO, and other styles
41

Elias, Joshua E., and Steven P. Gygi. "Target-decoy search strategy for increased confidence in large-scale protein identifications by mass spectrometry." Nature Methods 4, no. 3 (2007): 207–14. http://dx.doi.org/10.1038/nmeth1019.

Full text
APA, Harvard, Vancouver, ISO, and other styles
42

Morishita, Ryuichi. "Application of decoy strategy as a tool of gene therapy and analysis of gene regulation." Japanese Journal of Pharmacology 79 (1999): 6. http://dx.doi.org/10.1016/s0021-5198(19)30913-8.

Full text
APA, Harvard, Vancouver, ISO, and other styles
43

Jiang, Xinning, Xiaoli Dong, Mingliang Ye, and Hanfa Zou. "Instance Based Algorithm for Posterior Probability Calculation by Target−Decoy Strategy to Improve Protein Identifications." Analytical Chemistry 80, no. 23 (2008): 9326–35. http://dx.doi.org/10.1021/ac8017229.

Full text
APA, Harvard, Vancouver, ISO, and other styles
44

Sun, Weiping, Yi Liu, and Kaizhong Zhang. "An approach for N-linked glycan identification from MS/MS spectra by target-decoy strategy." Computational Biology and Chemistry 74 (June 2018): 391–98. http://dx.doi.org/10.1016/j.compbiolchem.2018.03.014.

Full text
APA, Harvard, Vancouver, ISO, and other styles
45

Chakrabarty, Paramita, Andrew Li, Thomas B. Ladd, et al. "TLR5 decoy receptor as a novel anti-amyloid therapeutic for Alzheimer’s disease." Journal of Experimental Medicine 215, no. 9 (2018): 2247–64. http://dx.doi.org/10.1084/jem.20180484.

Full text
Abstract:
There is considerable interest in harnessing innate immunity to treat Alzheimer’s disease (AD). Here, we explore whether a decoy receptor strategy using the ectodomain of select TLRs has therapeutic potential in AD. AAV-mediated expression of human TLR5 ectodomain (sTLR5) alone or fused to human IgG4 Fc (sTLR5Fc) results in robust attenuation of amyloid β (Aβ) accumulation in a mouse model of Alzheimer-type Aβ pathology. sTLR5Fc binds to oligomeric and fibrillar Aβ with high affinity, forms complexes with Aβ, and blocks Aβ toxicity. Oligomeric and fibrillar Aβ modulates flagellin-mediated acti
APA, Harvard, Vancouver, ISO, and other styles
46

Micarelli, Primo, Federico Chieppa, Antonio Pacifico, Enrico Rabboni, and Francesca Romana Reinero. "Passive Prey Discrimination in Surface Predatory Behaviour of Bait-Attracted White Sharks from Gansbaai, South Africa." Animals 11, no. 9 (2021): 2583. http://dx.doi.org/10.3390/ani11092583.

Full text
Abstract:
Between the years 2008 and 2013, six annual research expeditions were carried out at Dyer Island (Gansbaai, South Africa) to study the surface behaviour of white sharks in the presence of two passive prey: tuna bait and a seal-shaped decoy. Sightings were performed from a commercial cage-diving boat over 247 h; 250 different white sharks, with a mean total length (TL) of 308 cm, were observed. Of these, 166 performed at least one or more interactions, for a total of 240 interactions with bait and the seal-shaped decoy. In Gansbaai, there is a population of transient white sharks consisting mai
APA, Harvard, Vancouver, ISO, and other styles
47

Seo, Sang, and Dohoon Kim. "SOD2G: A Study on a Social-Engineering Organizational Defensive Deception Game Framework through Optimization of Spatiotemporal MTD and Decoy Conflict." Electronics 10, no. 23 (2021): 3012. http://dx.doi.org/10.3390/electronics10233012.

Full text
Abstract:
Existing moving target defense (MTD) and decoy systems are conceptually limited in avoiding and preventing attackers’ social-engineering real-time attacks by organization through either structural mutations or induction and isolation only using static traps. To overcome the practical limitations of existing MTD and decoy and to conduct a multi-stage deception decision-making in a real-time attack-defense competition, the current work presents a social-engineering organizational defensive deception game (SOD2G) as a framework, consi dering hierarchical topologies and fingerprint characteristics
APA, Harvard, Vancouver, ISO, and other styles
48

Pettibone, Jonathan C., and Douglas H. Wedell. "Testing alternative explanations of phantom decoy effects." Journal of Behavioral Decision Making 20, no. 3 (2007): 323–41. http://dx.doi.org/10.1002/bdm.557.

Full text
APA, Harvard, Vancouver, ISO, and other styles
49

Yao, Molly, Jalicia Sturdivant, Aren Ebrahimi, Samayita Ganguly, and Tamer Elbayoumi. "Novel Pharmaceutical Strategy for Selective Abrogation of TSP1-Induced Vascular Dysfunction by Decoy Recombinant CD47 Soluble Receptor in Prophylaxis and Treatment Models." Biomedicines 9, no. 6 (2021): 642. http://dx.doi.org/10.3390/biomedicines9060642.

Full text
Abstract:
Elevated thrombospondin 1 (TSP1) is a prevalent factor, via cognate receptor CD47, in the pathogenesis of cardiovascular conditions, including ischemia-reperfusion injury (IRI) and pulmonary arterial hypertension (PAH). Moreover, TSP1/CD47 interaction has been found to be associated with platelet hyperaggregability and impaired nitric oxide response, exacerbating progression in IRI and PAH. Pathological TSP1 in circulation arises as a target of our novel therapeutic approach. Our “proof-of-concept” pharmacological strategy relies on recombinant human CD47 peptide (rh-CD47p) as a decoy receptor
APA, Harvard, Vancouver, ISO, and other styles
50

Kim, TaeGuen. "Deception-based Method for Ransomware Detection." Journal of Internet Services and Information Security 13, no. 3 (2023): 191–201. http://dx.doi.org/10.58346/jisis.2023.i3.012.

Full text
Abstract:
Ransomware is a rapidly growing malware threat that encrypts a user's files and demands a ransom for the decryption key. It has caused significant financial harm worldwide and is difficult to detect, especially when it's a new, unknown zero-day ransomware. Most commercial antivirus software relies on signature-based detection, which can be slow and inadequate for swiftly identifying suspicious programs. To tackle these challenges, this paper presents a ransomware protection method utilizing decoy files. Our deception-based protection method enhances ransomware detection with a fair decoy deplo
APA, Harvard, Vancouver, ISO, and other styles
We offer discounts on all premium plans for authors whose works are included in thematic literature selections. Contact us to get a unique promo code!