To see the other types of publications on this topic, follow the link: Decoy Strategy.

Journal articles on the topic 'Decoy Strategy'

Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles

Select a source type:

Consult the top 50 journal articles for your research on the topic 'Decoy Strategy.'

Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.

You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.

Browse journal articles on a wide variety of disciplines and organise your bibliography correctly.

1

Seo, Sang, and Dohoon Kim. "OSINT-Based LPC-MTD and HS-Decoy for Organizational Defensive Deception." Applied Sciences 11, no. 8 (April 10, 2021): 3402. http://dx.doi.org/10.3390/app11083402.

Full text
Abstract:
This study aimed to alleviate the theoretical limitations of existing moving target defense (MTD) and decoy concepts and improve the efficiency of defensive deception technology within an organization. We present the concept of an open-source intelligence (OSINT)-based hierarchical social engineering decoy (HS-Decoy) strategy while considering the actual fingerprint of each organization. In addition, we propose a loosely proactive control-based MTD strategy that is based on the intended competitive exposure of OSINT between defenders and attackers. Existing MTDs and decoys are biased toward proactive prevention, in that they only perform structural mutation-based attack avoidance or induce static traps. They also have practical limitations, e.g., they do not consider security characterization of each organizational social engineering attack and related utilization plans, no quantitative deception modeling is performed for the attenuation of the attack surface through exposure to OSINT, and there is no operational plan for optimal MTD and decoy application within the organization. Through the applied deception concepts proposed here, the total attack efficiency was reduced by 287% compared to the existing MTD and decoys, while the artificial deception efficiency dominated by defenders was improved by 382%. In addition, the increase rate of deception overhead was also reduced by 174%, and an optimized deceptive trade-off was also presented. In order to enable an organization to utilize the OSINT concept, statistical error reduction, and MTD mutation cycle-based deceptive selectivity, it was introduced as a loose adaptive mutation rather than a preferential avoidance strategy, and an organization-specific optimization direction was introduced through a combination of HS-Decoy and LPC-MTD. In the future, in order to improve the operational reliability of the HS-Decoy and LPC-MTD-based combined model and standardize threat information for each organization, we intend to advance it into an international standard-based complex architecture and characterize it as game theory.
APA, Harvard, Vancouver, ISO, and other styles
2

Linsky, Thomas W., Renan Vergara, Nuria Codina, Jorgen W. Nelson, Matthew J. Walker, Wen Su, Christopher O. Barnes, et al. "De novo design of potent and resilient hACE2 decoys to neutralize SARS-CoV-2." Science 370, no. 6521 (November 5, 2020): 1208–14. http://dx.doi.org/10.1126/science.abe0075.

Full text
Abstract:
We developed a de novo protein design strategy to swiftly engineer decoys for neutralizing pathogens that exploit extracellular host proteins to infect the cell. Our pipeline allowed the design, validation, and optimization of de novo human angiotensin-converting enzyme 2 (hACE2) decoys to neutralize severe acute respiratory syndrome coronavirus 2 (SARS-CoV-2). The best monovalent decoy, CTC-445.2, bound with low nanomolar affinity and high specificity to the receptor-binding domain (RBD) of the spike protein. Cryo–electron microscopy (cryo-EM) showed that the design is accurate and can simultaneously bind to all three RBDs of a single spike protein. Because the decoy replicates the spike protein target interface in hACE2, it is intrinsically resilient to viral mutational escape. A bivalent decoy, CTC-445.2d, showed ~10-fold improvement in binding. CTC-445.2d potently neutralized SARS-CoV-2 infection of cells in vitro, and a single intranasal prophylactic dose of decoy protected Syrian hamsters from a subsequent lethal SARS-CoV-2 challenge.
APA, Harvard, Vancouver, ISO, and other styles
3

Huang, Hesong, Zhongxiang Tong, Taorui Li, Lintong Jia, and Shenbo Li. "Defense Strategy of Aircraft Confronted with IR Guided Missile." Mathematical Problems in Engineering 2017 (2017): 1–9. http://dx.doi.org/10.1155/2017/9070412.

Full text
Abstract:
Surface-type infrared (IR) decoy can simulate the IR characteristics of the target aircraft, which is one of the most effective equipment to confront IR guided missile. In the air combat, the IR guided missile poses a serious threat to the aircraft when it comes from the front of target aircraft. In this paper, firstly, the model of aircraft and surface-type IR decoy is established. To ensure their authenticity, the aircraft maneuver and radiation models based on real data of flight and exhaust system radiation in the state of different heights and different speeds are established. Secondly, the most effective avoidance maneuver is simulated when the missile comes from the front of the target aircraft. Lastly, combining maneuver with decoys, the best defense strategy is analysed when the missile comes from the front of aircraft. The result of simulation, which is authentic, is propitious to avoid the missile and improve the survivability of aircraft.
APA, Harvard, Vancouver, ISO, and other styles
4

Ackerman, Joshua T., John M. Eadie, and Thomas G. Moore. "Does Life History Predict Risk-Taking Behavior of Wintering Dabbling Ducks?" Condor 108, no. 3 (August 1, 2006): 530–46. http://dx.doi.org/10.1093/condor/108.3.530.

Full text
Abstract:
AbstractLife-history theory predicts that longer-lived, less fecund species should take fewer risks when exposed to predation than shorter-lived, more fecund species. We tested this prediction for seven species of dabbling ducks (Anas) by measuring the approach behavior (behavior of ducks when approaching potential landing sites) of 1099 duck flocks during 37 hunting trials and 491 flocks during 13 trials conducted immediately after the 1999–2000 waterfowl hunting season in California, USA. We also experimentally manipulated the attractiveness of the study site by using two decoy treatments: (1) traditional, stationary decoys only, and (2) traditional decoys in conjunction with a mechanical spinning-wing decoy. Approach behavior of ducks was strongly correlated with their life history. Minimum approach distance was negatively correlated with reproductive output during each decoy treatment and trial type. Similarly, the proportion of flocks taking risk (approaching landing sites to within 45 m) was positively correlated with reproductive output. We found similar patterns of approach behavior in relation to other life-history parameters (i.e., adult female body mass and annual adult female survival rate). Thus, species characterized by a slower life-history strategy (e.g., Northern Pintail [A. acuta]) were more risk-averse than species with a faster life-history strategy (e.g., Cinnamon Teal [A. cyanoptera]). Furthermore, although we were able to reduce risk-averseness using the spinning-wing decoy, we were unable to override the influence of life history on risk-taking behavior. Alternative explanations did not account for the observed correlation between approach behavior and life-history parameters. These results suggest that life history influences the risk-taking behavior of dabbling ducks and provide an explanation for the differential vulnerability of waterfowl to harvest.
APA, Harvard, Vancouver, ISO, and other styles
5

Kato, K., K. Akeda, S. Miyazaki, J. Yamada, C. Muehleman, K. Miyamoto, YA Asanuma, et al. "NF-kB decoy oligodeoxynucleotide preserves disc height in a rabbit anular-puncture model and reduces pain induction in a rat xenograft-radiculopathy model." European Cells and Materials 42 (July 20, 2021): 90–109. http://dx.doi.org/10.22203/ecm.v042a07.

Full text
Abstract:
While it is known that the degenerated intervertebral disc (IVD) is one of the primary reasons for low-back pain and subsequent need for medical care, there are currently no established effective methods for direct treatment. Nuclear factor-κB (NF-κB) is a transcription factor that regulates various genes’ expression, among which are inflammatory cytokines, in many tissues including the IVD. NF-κB decoy is an oligodeoxynucleotide containing the NF-κB binding site that entraps NF-κB subunits, resulting in suppression of NF-κB activity. In the present preclinical study, NF-κB decoy was injected into degenerated IVDs using the rabbit anular-puncture model. In terms of distribution, NF-κB decoy persisted in the IVDs up to at least 4 weeks after injection. The remaining amount of NF-κB decoy indicated that it fit a double-exponential-decay equation. Investigation of puncture-caused degeneration of IVDs showed that NF-κB decoy injection recovered, dose-dependently, the reduced disc height that was associated with reparative cell cloning and morphological changes, as assessed through histology. Gene expression, by quantitative real-time polymerase chain reaction (qRT-PCR), showed that NF-κB decoy attenuated inflammatory gene expression, such as that of interleukin-1 and tumor necrosis factor-α, in rabbit degenerated IVDs. NF-κB decoy also reduced the pain response as seen using the “pain sensor” nude rat xenograft-radiculopathy model. This is the first report demonstrating that NF-κB decoy suppresses the inflammatory response in degenerated IVDs and restores IVD disc height loss. Therefore, the intradiscal injection of NF-κB decoy may have the potential as an effective therapeutic strategy for discogenic pain associated with degenerated IVDs.
APA, Harvard, Vancouver, ISO, and other styles
6

Bern, Marshall W., and Yong J. Kil. "Two-Dimensional Target Decoy Strategy for Shotgun Proteomics." Journal of Proteome Research 10, no. 12 (December 2, 2011): 5296–301. http://dx.doi.org/10.1021/pr200780j.

Full text
APA, Harvard, Vancouver, ISO, and other styles
7

Burri Naresh, Et al. "Integrating Enhanced Decoy Technology and User Behavior Profiling for Strengthening Cloud Server Security." International Journal on Recent and Innovation Trends in Computing and Communication 11, no. 8 (September 20, 2023): 401–8. http://dx.doi.org/10.17762/ijritcc.v11i8.9082.

Full text
Abstract:
Information technology improvements have improved things but also caused security issues, particularly with regard to password file security. Strong security measures are needed for cloud computing, which holds massive amounts of data. This study investigates the possibility of Enhanced Decoy technology and User Behaviour Profiling as a combined strategy to improve cloud server security. Although there are algorithms for both strategies, after recognizing anonymous user behaviour, effectively providing Enhanced Decoy files without raising suspicion is still difficult. In order to provide a complete security solution, a proposed system blends user behaviour profiling and Enhanced Decoy technology. While Enhanced Decoy technology diverts attackers and reveals information about their strategies, User Behaviour Profiling identifies suspicious activity. The suggested approach seeks to enhance cloud-based data security by integrating these techniques. The integration of user behaviour profiling with Enhanced Decoy technology is presented in this study as a viable strategy to address security issues in cloud computing, leading to increased effectiveness and improved data protection.
APA, Harvard, Vancouver, ISO, and other styles
8

Ramasamy, Thiruganesh, Xucai Chen, Bin Qin, Daniel E. Johnson, Jennifer R. Grandis, and Flordeliza S. Villanueva. "STAT3 decoy oligonucleotide-carrying microbubbles with pulsed ultrasound for enhanced therapeutic effect in head and neck tumors." PLOS ONE 15, no. 11 (November 18, 2020): e0242264. http://dx.doi.org/10.1371/journal.pone.0242264.

Full text
Abstract:
Signal transducer and activator of transcription-3 (STAT3) is an oncogenic transcription factor implicated in carcinogenesis, tumor progression, and drug resistance in head and neck squamous cell carcinoma (HNSCC). A decoy oligonucleotide targeting STAT3 offers a promising anti-tumor strategy, but achieving targeted tumor delivery of the decoy with systemic administration poses a significant challenge. We previously showed the potential for STAT3 decoy-loaded microbubbles, in conjunction with ultrasound targeted microbubble cavitation (UTMC), to decrease tumor growth in murine squamous cell carcinoma. As a next step towards clinical translation, we sought to determine the anti-tumor efficacy of our STAT3 decoy delivery platform against human HNSCC and the effect of higher STAT3 decoy microbubble loading on tumor cell inhibition. STAT3 decoy was loaded on cationic lipid microbubbles (STAT3-MB) or loaded on liposome-conjugated lipid microbubbles to form STAT3-loaded liposome-microbubble complexes (STAT3-LPX). UTMC treatment efficacy with these two formulations was evaluated in vitro using viability and apoptosis assays in CAL33 (human HNSCC) cells. Anti-cancer efficacy in vivo was performed in a CAL33 tumor murine xenograft model. UTMC with STAT3-MB caused significantly lower CAL33 cell viability compared to UTMC with STAT3-LPX (56.8±8.4% vs 84.5±8.8%, respectively, p<0.05). In vivo, UTMC with STAT3-MB had strong anti-tumor effects, with significantly less tumor burden and greater survival compared to that of UTMC with microbubbles loaded with a mutant control decoy and untreated control groups (p<0.05). UTMC with STAT3 decoy-loaded microbubbles significantly decreases human HNSSC tumor progression. These data set the stage for clinical translation of our microbubble platform as an imaged-guided, targeted delivery strategy for STAT3 decoy, or other nucleotide-based therapeutics, in human cancer treatment.
APA, Harvard, Vancouver, ISO, and other styles
9

Tomita, Naruya, Toshio Ogihara, and Ryuichi Morishita. "Therapeutic potential of decoy oligonucleotides strategy in cardiovascular diseases." Expert Review of Cardiovascular Therapy 1, no. 3 (October 2003): 463–70. http://dx.doi.org/10.1586/14779072.1.3.463.

Full text
APA, Harvard, Vancouver, ISO, and other styles
10

Jia, Dong. "Decoy oligonucleotide technology in fibrosis: Application and delivery strategy." World Chinese Journal of Digestology 23, no. 31 (2015): 4931. http://dx.doi.org/10.11569/wcjd.v23.i31.4931.

Full text
APA, Harvard, Vancouver, ISO, and other styles
11

Du, Xuancheng, Mingzhen Zhang, Huiting Zhou, Weijie Wang, Chengmei Zhang, Lei Zhang, Yuanyuan Qu, et al. "Decoy Nanozymes Enable Multitarget Blockade of Proinflammatory Cascades for the Treatment of Multi-Drug-Resistant Bacterial Sepsis." Research 2022 (September 26, 2022): 1–15. http://dx.doi.org/10.34133/2022/9767643.

Full text
Abstract:
Sepsis is a life-threatening organ dysfunction characterized by severe systemic inflammatory response to infection. Effective treatment of bacterial sepsis remains a paramount clinical challenge, due to its astonishingly rapid progression and the prevalence of bacterial drug resistance. Here, we present a decoy nanozyme-enabled intervention strategy for multitarget blockade of proinflammatory cascades to treat multi-drug-resistant (MDR) bacterial sepsis. The decoy nanozymes (named MCeC@MΦ) consist mesoporous silica nanoparticle cores loaded with CeO2 nanocatalyst and Ce6 photosensitizer and biomimetic shells of macrophage membrane. By acting as macrophage decoys, MCeC@MΦ allow targeted photodynamic eradication of MDR bacteria and realize simultaneous endotoxin/proinflammatory cytokine neutralization. Meanwhile, MCeC@MΦ possess intriguing superoxide dismutase and catalase-like activities as well as hydroxyl radical antioxidant capacity and enable catalytic scavenging of multiple reactive oxygen species (ROS). These unique capabilities make MCeC@MΦ to collaboratively address the issues of bacterial infection, endotoxin/proinflammatory cytokine secretion, and ROS burst, fully cutting off the path of proinflammatory cascades to reverse the progression of bacterial sepsis. In vivo experiments demonstrate that MCeC@MΦ considerably attenuate systemic hyperinflammation and rapidly rescue organ damage within 1 day to confer higher survival rates (>75%) to mice with progressive MDR Escherichia coli bacteremia. The proposed decoy nanozyme-enabled multitarget collaborative intervention strategy offers a powerful modality for bacterial sepsis management and opens up possibilities for the treatment of cytokine storm in the COVID-19 pandemic and immune-mediated inflammation diseases.
APA, Harvard, Vancouver, ISO, and other styles
12

Zhou, Chun, Yu Zhou, Yangbin Xu, Yang Wang, Yifei Lu, Musheng Jiang, Xiaoxu Zhang, and Wansu Bao. "Finite-Key Analysis of 1-Decoy Method Quantum Key Distribution with Intensity Fluctuation." Applied Sciences 12, no. 9 (May 7, 2022): 4709. http://dx.doi.org/10.3390/app12094709.

Full text
Abstract:
The decoy state quantum key distribution (QKD) protocol is proven to be an effective strategy against the photon number splitting attack. It was shown that the 1-decoy state protocol, easier to implement in the practical QKD system, outperforms the 2-decoy state protocol for block sizes of up to 108 bits. How intensity fluctuations influence the performance of the 1-decoy state protocol with finite resources remains a pending issue. In this paper, we present a finite-key analysis of the 1-decoy state protocol with intensity fluctuations and obtain the secret key rate formula about intensity fluctuations. Our numerical simulation results show that the stronger the intensity fluctuations, the lower the secret key rate for a small data block size of a few bits. Our research can provide theoretical implications for the selection of data size in the QKD system with intensity fluctuations.
APA, Harvard, Vancouver, ISO, and other styles
13

Li, Zhen, Xiaoyu Bao, Qingfeng Meng, Pengqun Shen, and Dimitri Volchenkov. "Research on the Complexity Mechanism of Decoy Strategies Based on Multiagent Simulation." Complexity 2020 (September 29, 2020): 1–15. http://dx.doi.org/10.1155/2020/4752986.

Full text
Abstract:
Competition and diffusion of products are of great significance to companies. In this study, various true decoy strategies are constructed using different combinations of price and quality. This paper then analyzes the performance of strategies using different product competition and diffusion scenarios. The influences of neighbor nodes, reconnection probability, and herd mentality on decoy effects are explored. The results show that setting an appropriate true decoy can enhance the competitiveness of a target product to some extent. Conversely, an inappropriate decoy strategy will play a negative role, encroaching on market share. In terms of effects, changes in neighbor nodes, reconnection probability, and herd mentality will not influence the direction of the evolution of a product for the same true decoy strategies. However, the speed of evolution will be affected. These findings provide a theoretical basis for enterprises taking action to enhance product competitiveness in the market.
APA, Harvard, Vancouver, ISO, and other styles
14

Mantovani, Alberto, Massimo Locati, Annunciata Vecchi, Silvano Sozzani, and Paola Allavena. "Decoy receptors: a strategy to regulate inflammatory cytokines and chemokines." Trends in Immunology 22, no. 6 (June 2001): 328–36. http://dx.doi.org/10.1016/s1471-4906(01)01941-x.

Full text
APA, Harvard, Vancouver, ISO, and other styles
15

Tomita, Naruya, Naoki Kashihara, and Ryuichi Morishita. "Transcription factor decoy oligonucleotide-based therapeutic strategy for renal disease." Clinical and Experimental Nephrology 11, no. 1 (March 28, 2007): 7–17. http://dx.doi.org/10.1007/s10157-007-0459-6.

Full text
APA, Harvard, Vancouver, ISO, and other styles
16

Li, Quancheng, Chuanxiang Zhu, Yonghua Fan, Shizheng Wan, and Jie Yan. "Study on Infrared Air-to-Air Missile Guidance Accuracy Affected by Complicated Environment." Xibei Gongye Daxue Xuebao/Journal of Northwestern Polytechnical University 37, no. 3 (June 2019): 457–64. http://dx.doi.org/10.1051/jnwpu/20193730457.

Full text
Abstract:
The guidance accuracy of an infrared air-to-air missile is affected by various factors such as target maneuver, interference, and the natural environment. The complicated confrontational environment posed by target maneuver and decoy launch is considered in this article. The more practical adjoint analysis model for the influence of target maneuver and decoy launch on missile guidance accuracy is established by analyzing the jamming process, motion characteristics, and the influence mechanism on the guidance system of point source decoy. By using the adjoint method, the barrel roll maneuver angular rate, the numble of simultaneous decoy launch, the ignition time, the interval between launches and the strategy influence on the miss distance of the missile are analyzed in detail, which will provide strategic references for the aircraft to fight against the infrared air-to-air missiles.
APA, Harvard, Vancouver, ISO, and other styles
17

Wang, Li Hua, Xiao Yi Yang, Robert A. Kirken, James H. Resau, and William L. Farrar. "Targeted disruption of Stat6 DNA binding activity by an oligonucleotide decoy blocks IL-4–driven TH2 cell response." Blood 95, no. 4 (February 15, 2000): 1249–57. http://dx.doi.org/10.1182/blood.v95.4.1249.004k39_1249_1257.

Full text
Abstract:
The transcription factor, signal transducer and activator of transcription (Stat) 6, regulates TH2-lymphocyte activity by controlling the expression and responsiveness to interleukin (IL)–4, which plays a key role in numerous allergic maladies. Therefore, we sought to use a phosphorothiolate cis-element decoy to target disruption of Stat6 transcriptional activity. Here we showed that the Stat6 decoy potently ablated the messenger RNA expression and production of IL-4, but not of several other cytokines. The Stat6 decoy functionally disrupted IL-4–inducible cell proliferation of murine TH2 cells and primary human CD4+ T lymphocytes. Specificity of the decoy was demonstrated by its ability to directly block Stat6 binding to a cis-element probe and transactivation, but not affect Stat6 tyrosine phosphorylation or expression of the IL-4 receptor chains. Moreover, the decoy failed to inhibit non–Stat6-dependent signaling pathways since IL-2 was competent to induce cell proliferation and activation of Stats 1, 3, and 5a/b. With the use of laser scanning confocal microscopy, fluorescently tagged Stat6 decoy was detectable in the cytoplasm and nucleus; however, greater levels of oligonucleotide were present in the latter following IL-4 treatment. Taken together, these data suggest that IL-4–driven TH2 cell activity can be preferentially restricted via targeted disruption of Stat6 by a novel and specific decoy strategy that may possess gene therapeutic potential.
APA, Harvard, Vancouver, ISO, and other styles
18

Suzuki, Jun-ichi, Mitsuaki Isobe, Ryuichi Morishita, and Ryozo Nagai. "Nucleic Acid Drugs for Prevention of Cardiac Rejection." Journal of Biomedicine and Biotechnology 2009 (2009): 1–5. http://dx.doi.org/10.1155/2009/916514.

Full text
Abstract:
Heart transplantation has been broadly performed in humans. However, occurrence of acute and chronic rejection has not yet been resolved. Several inflammatory factors, such as cytokines and adhesion molecules, enhance the rejection. The graft arterial disease (GAD), which is a type of chronic rejection, is characterized by intimal thickening comprised of proliferative smooth muscle cells. Specific treatments that target the attenuation of acute rejection and GAD formation have not been well studied in cardiac transplantation. Recent progress in the nucleic acid drugs, such as antisense oligodeoxynucleotides (ODNs) to regulate the transcription of disease-related genes, has important roles in therapeutic applications. Transfection of cis-element double-stranded DNA, named as “decoy,” has been also reported to be a useful nucleic acid drug. This decoy strategy has been not only a useful method for the experimental studies of gene regulation but also a novel clinical strategy. In this paper, we reviewed the experimental results ofNF-κB, E2F, AP-1, and STAT-1 decoy and other ODNs using the experimental heart transplant models.
APA, Harvard, Vancouver, ISO, and other styles
19

Wang, Hsiang-Ching, Peng-Nien Huang, Hui-Chen Hung, Sung-Nien Tseng, Chia-Chia Chang, Ya-Ru Tsai, Yun-Ming Wang, Shin-Ru Shih, and John Tsu-An Hsu. "Effect of a Neuropilin-1-Derived Virus Receptor Trap on Enterovirus A71 Infection In Vitro." Antimicrobial Agents and Chemotherapy 65, no. 1 (November 2, 2020): e00695-20. http://dx.doi.org/10.1128/aac.00695-20.

Full text
Abstract:
ABSTRACTWe discovered that neuropilin 1 (NRP1) is a new receptor candidate to mediate enterovirus A71 (EVA71) into cells. In the engineered form as a decoy receptor, NRP1 was able to recognize and neutralize EVA71 but not enterovirus D68 or coxsackievirus B3 (CVB3). NRP1 recognizes EVA71 through a novel domain on the VP3 capsid protein. The principle in the design, engineering, and refinement of the NRP1-based decoy receptor described in this study represents a general and well-suited antiviral strategy.
APA, Harvard, Vancouver, ISO, and other styles
20

Zaki Ahmad, Mohammad, Sohail Akhter, Neha Mallik, Mohammad Anwar, Wajda Tabassum, and Farhan Jalees Ahmad. "Application of Decoy Oligonucleotides as Novel Therapeutic Strategy: A Contemporary Overview." Current Drug Discovery Technologies 10, no. 1 (March 1, 2013): 71–84. http://dx.doi.org/10.2174/157016313804998898.

Full text
APA, Harvard, Vancouver, ISO, and other styles
21

Zaki Ahmad, Mohammad, Sohail Akhter, Neha Mallik, Mohammad Anwar, Wajda Tabassum, and Farhan Jalees Ahmad. "Application of Decoy Oligonucleotides as Novel Therapeutic Strategy: A Contemporary Overview." Current Drug Discovery Technologies 10, no. 1 (January 16, 2013): 71–84. http://dx.doi.org/10.2174/1570163811310010009.

Full text
APA, Harvard, Vancouver, ISO, and other styles
22

Ivanov, Mark V., Lev I. Levitsky, and Mikhail V. Gorshkov. "Adaptation of Decoy Fusion Strategy for Existing Multi-Stage Search Workflows." Journal of The American Society for Mass Spectrometry 27, no. 9 (June 27, 2016): 1579–82. http://dx.doi.org/10.1007/s13361-016-1436-7.

Full text
APA, Harvard, Vancouver, ISO, and other styles
23

Lee, Sun-Jae, Young-Ah Kim, and Kwan-Kyu Park. "Anti-Fibrotic Effect of Synthetic Noncoding Decoy ODNs for TFEB in an Animal Model of Chronic Kidney Disease." International Journal of Molecular Sciences 23, no. 15 (July 23, 2022): 8138. http://dx.doi.org/10.3390/ijms23158138.

Full text
Abstract:
Despite emerging evidence suggesting that autophagy occurs during renal interstitial fibrosis, the role of autophagy activation in fibrosis and the mechanism by which autophagy influences fibrosis remain controversial. Transcription factor EB (TFEB) is a master regulator of autophagy-related gene transcription, lysosomal biogenesis, and autophagosome formation. In this study, we examined the preventive effects of TFEB suppression on renal fibrosis. We injected synthesized TFEB decoy oligonucleotides (ODNs) into the tail veins of unilateral ureteral obstruction (UUO) mice to explore the regulation of autophagy in UUO-induced renal fibrosis. The expression of interleukin (IL)-1β, tumor necrosis factor-α (TNF-α), and collagen was decreased by TFEB decoy ODN. Additionally, TEFB ODN administration inhibited the expression of microtubule-associated protein light chain 3 (LC3), Beclin1, and hypoxia-inducible factor-1α (HIF-1α). We confirmed that TFEB decoy ODN inhibited fibrosis and autophagy in a UUO mouse model. The TFEB decoy ODNs also showed anti-inflammatory effects. Collectively, these results suggest that TFEB may be involved in the regulation of autophagy and fibrosis and that regulating TFEB activity may be a promising therapeutic strategy against kidney diseases.
APA, Harvard, Vancouver, ISO, and other styles
24

Sims, Joshua J., Sharon Lian, Rosemary L. Meggersee, Aradhana Kasimsetty, and James M. Wilson. "High activity of an affinity-matured ACE2 decoy against Omicron SARS-CoV-2 and pre-emergent coronaviruses." PLOS ONE 17, no. 8 (August 25, 2022): e0271359. http://dx.doi.org/10.1371/journal.pone.0271359.

Full text
Abstract:
The viral genome of severe acute respiratory syndrome coronavirus 2 (SARS-CoV-2), particularly its cell-binding spike protein gene, has undergone rapid evolution during the coronavirus disease 2019 (COVID-19) pandemic. Variants including Omicron BA.1 and Omicron BA.2 now seriously threaten the efficacy of therapeutic monoclonal antibodies and vaccines that target the spike protein. Viral evolution over a much longer timescale has generated a wide range of genetically distinct sarbecoviruses in animal populations, including the pandemic viruses SARS-CoV-2 and SARS-CoV-1. The genetic diversity and widespread zoonotic potential of this group complicates current attempts to develop drugs in preparation for the next sarbecovirus pandemic. Receptor-based decoy inhibitors can target a wide range of viral strains with a common receptor and may have intrinsic resistance to escape mutant generation and antigenic drift. We previously generated an affinity-matured decoy inhibitor based on the receptor target of the SARS-CoV-2 spike protein, angiotensin-converting enzyme 2 (ACE2), and deployed it in a recombinant adeno-associated virus vector (rAAV) for intranasal delivery and passive prophylaxis against COVID-19. Here, we demonstrate the exceptional binding and neutralizing potency of this ACE2 decoy against SARS-CoV-2 variants including Omicron BA.1 and Omicron BA.2. Tight decoy binding tracks with human ACE2 binding of viral spike receptor-binding domains across diverse clades of coronaviruses. Furthermore, in a coronavirus that cannot bind human ACE2, a variant that acquired human ACE2 binding was bound by the decoy with nanomolar affinity. Considering these results, we discuss a strategy of decoy-based treatment and passive protection to mitigate the ongoing COVID-19 pandemic and future airway virus threats.
APA, Harvard, Vancouver, ISO, and other styles
25

van den Enden, Gitta, and Kelly Geyskens. "Attract the best: The attraction effect as an effective strategy to enhance healthy choices." PLOS ONE 16, no. 11 (November 4, 2021): e0259521. http://dx.doi.org/10.1371/journal.pone.0259521.

Full text
Abstract:
Every day, people make many food decisions without thinking, repeatedly falling for the unhealthy option instead of the healthy option. While making these mindless decisions, people often rely on heuristics. In this paper, we demonstrate that these heuristics can be exploited to nudge consumers towards healthy alternatives. Specifically, we explore how the attraction effect (i.e., adding a decoy to a choice set) can nudge people to choose a healthy snack. The results of our choice experiment indicate that adding a decoy (i.e., a less attractive food alternative) to a self-control situation (i.e., choosing between a healthy and an unhealthy food alternative) can help people maintain self-control and choose the healthy option. This mixed choice set thus nudges people towards the healthy option. Moreover, our results show differential effects of the attraction effect depending on the (un)healthiness of the products in the choice set. Specifically, the attraction effect is prominent when the choice set consists of unhealthy products only (i.e., the unhealthy choice set), but not in the choice set that consists of only healthy products (i.e., healthy choice set). Importantly, our results indicate when the attraction effect can exploit consumers’ heuristics to help them make better, healthier food choices.
APA, Harvard, Vancouver, ISO, and other styles
26

Pateria, Jalaj, Laxmi Ahuja, Subhranil Som, and Ashish Seth. "Applying Clustering to Predict Attackers Trace in Deceptive Ecosystem by Harmonizing Multiple Decoys Interactions Logs." International Journal of Information Technology and Computer Science 15, no. 5 (October 8, 2023): 35–44. http://dx.doi.org/10.5815/ijitcs.2023.05.04.

Full text
Abstract:
Bluff and truth are major pillars of deception technology. Deception technology majorly relies on decoy-generated data and looks for any behavior deviation to flag that interaction as an attack or not. But at times a legitimate user can also do suspicious decoy interactions due to lack of knowledge and can be categorized under the “ATTACK” category which in a true sense should not be flagged that way. Hence, there is a need of doing collaborative analysis on honeypot, which are set up to monitor and log activities of sources that compromise or probe them. This goldmine provides ample information about the attacker intent and target, how it is moving forward in the kill chain as this information can be used to enhance threat intelligence and upgrade behaviors analysis rules. In this paper, decoys which are strategically placed in the network pointing to various databases, services, and Ips are used providing information of interactions made. This data is analyzed to understand underlying facts which can help in strengthening defense strategy, it also enhances confidence on the findings as analysis is not restricted to single decoy interaction which could be false positive or un-intentional in nature but analyzing holistically to conclude on the exact attack patten and progression. With experiment we have highlighted is reconciling various honeypots data and weighing IP visits and Honeypot interaction counts against scores and then using KNN and Weightage KNN to derive inclination of target IP against Source IP which can also be summarized as direction of Attack and count/frequency of interaction from highlights criticality of the interactions. Used KNN and W-KNN have shown approx. 94% accuracy which is best in class, also silhouette score highlighted high cohesion of data points in the experiment. Moreover, this was also analyzed that increasing the number of decoys in the analysis helps in getting better confidence on attack probability and direction.
APA, Harvard, Vancouver, ISO, and other styles
27

Balgley, Brian M., Tom Laudeman, Li Yang, Tao Song, and Cheng S. Lee. "Comparative Evaluation of Tandem MS Search Algorithms Using a Target-Decoy Search Strategy." Molecular & Cellular Proteomics 6, no. 9 (May 28, 2007): 1599–608. http://dx.doi.org/10.1074/mcp.m600469-mcp200.

Full text
APA, Harvard, Vancouver, ISO, and other styles
28

Jiang, Xinning, Guanghui Han, Shun Feng, Xiaogang Jiang, Mingliang Ye, Xuebiao Yao, and Hanfa Zou. "Automatic Validation of Phosphopeptide Identifications by the MS2/MS3 Target-Decoy Search Strategy." Journal of Proteome Research 7, no. 4 (April 2008): 1640–49. http://dx.doi.org/10.1021/pr700675j.

Full text
APA, Harvard, Vancouver, ISO, and other styles
29

Sakaguchi, Taichi, Yoshiki Sawa, Norihide Fukushima, Motonobu Nishimura, Hajime Ichikawa, Yasufumi Kaneda, and Hikaru Matsuda. "A novel strategy of decoy transfection against nuclear factor-κB in myocardial preservation." Annals of Thoracic Surgery 71, no. 2 (February 2001): 624–29. http://dx.doi.org/10.1016/s0003-4975(00)01906-8.

Full text
APA, Harvard, Vancouver, ISO, and other styles
30

Keich, Uri, Kaipo Tamura, and William Stafford Noble. "Averaging Strategy To Reduce Variability in Target-Decoy Estimates of False Discovery Rate." Journal of Proteome Research 18, no. 2 (December 18, 2018): 585–93. http://dx.doi.org/10.1021/acs.jproteome.8b00802.

Full text
APA, Harvard, Vancouver, ISO, and other styles
31

Shen, Changyu, Quanhu Sheng, Jie Dai, Yixue Li, Rong Zeng, and Haixu Tang. "On the estimation of false positives in peptide identifications using decoy search strategy." PROTEOMICS 9, no. 1 (January 2009): 194–204. http://dx.doi.org/10.1002/pmic.200800330.

Full text
APA, Harvard, Vancouver, ISO, and other styles
32

Kandathil, Shaun M., Mario Garza-Fabre, Julia Handl, and Simon C. Lovell. "Reliable Generation of Native-Like Decoys Limits Predictive Ability in Fragment-Based Protein Structure Prediction." Biomolecules 9, no. 10 (October 15, 2019): 612. http://dx.doi.org/10.3390/biom9100612.

Full text
Abstract:
Our previous work with fragment-assembly methods has demonstrated specific deficiencies in conformational sampling behaviour that, when addressed through improved sampling algorithms, can lead to more reliable prediction of tertiary protein structure when good fragments are available, and when score values can be relied upon to guide the search to the native basin. In this paper, we present preliminary investigations into two important questions arising from more difficult prediction problems. First, we investigated the extent to which native-like conformational states are generated during multiple runs of our search protocols. We determined that, in cases of difficult prediction, native-like decoys are rarely or never generated. Second, we developed a scheme for decoy retention that balances the objectives of retaining low-scoring structures and retaining conformationally diverse structures sampled during the course of the search. Our method succeeds at retaining more diverse sets of structures, and, for a few targets, more native-like solutions are retained as compared to our original, energy-based retention scheme. However, in general, we found that the rate at which native-like structural states are generated has a much stronger effect on eventual distributions of predictive accuracy in the decoy sets, as compared to the specific decoy retention strategy used. We found that our protocols show differences in their ability to access native-like states for some targets, and this may explain some of the differences in predictive performance seen between these methods. There appears to be an interaction between fragment sets and move operators, which influences the accessibility of native-like structures for given targets. Our results point to clear directions for further improvements in fragment-based methods, which are likely to enable higher accuracy predictions.
APA, Harvard, Vancouver, ISO, and other styles
33

Lambertini, E., L. Penolazzi, V. Sollazzo, F. Pezzetti, M. de Mattei, L. del Senno, GC Traina, and R. Piva. "Modulation of gene expression in human osteoblasts by targeting a distal promoter region of human estrogen receptor-alpha gene." Journal of Endocrinology 172, no. 3 (March 1, 2002): 683–93. http://dx.doi.org/10.1677/joe.0.1720683.

Full text
Abstract:
Estrogen receptor (ER) alpha is expressed during osteoblast differentiation; however, both its functional role in bone metabolism and its involvement in osteoporotic pathogenesis caused by estrogen deficiency are not well understood. Loss of ER alpha gene expression could be one of the mechanisms leading to osteoporosis. Therefore, we investigated a possible modulation of ER alpha gene expression in a human osteoblastic cell line and in four primary osteoblast cultures by using a decoy strategy. Double stranded DNA molecules, mimicking a regulatory region of the ER alpha gene promoter (DNA-102) and acting as a 'silencer' in breast cancer cells, were introduced into osteoblasts as 'decoy' cis-elements to bind and functionally inactivate a putative negative transcription factor, and thus to induce ER alpha gene expression. We found that the DNA-102 molecule was able to specifically bind osteoblast nuclear proteins. Before decoy treatment, absence or variable low levels of ER alpha RNAs in the different cultures were detected. When the cells were transfected with the DNA-102 decoy, an increase in expression of ER alpha and osteoblastic markers, such as osteopontin, was observed, indicating a more differentiated osteoblastic phenotype both in the cell line and in primary cultures. These results showed that the DNA-102 sequence competes with endogenous specific negative transcription factors that may be critical for a decrease in or lack of ER alpha gene transcription. Therefore, osteoblastic transfection with the DNA-102 decoy molecule may be considered a tempting model in a putative therapeutic approach for those pathologies, such as osteoporosis, in which the decrease or loss of ER alpha expression plays a critical role in bone function.
APA, Harvard, Vancouver, ISO, and other styles
34

Salunke, Mangesh D., Subhash G. Rathod, Hemantkumar B. Jadhav, Meghna Yashwante, Vaibhav D. Rewaskar, and Pranjali V. Deshmukh. "Implementation of Decoy Deception based Detection System for Ransomware Attack." International Journal on Recent and Innovation Trends in Computing and Communication 11, no. 8s (August 18, 2023): 714–19. http://dx.doi.org/10.17762/ijritcc.v11i8s.7673.

Full text
Abstract:
Ransomware poses a dangerous threat to cybersecurity. Data as well as rights owned by the user are adversely impacted. The situation has become considerably more critical as a result of the emergence of new ransomware varieties and Ransomware-as-a-Service. In this paper, we presented a novel deception-based and behaviour-based method for real-time ransomware detection. In order to avoid any loss before ransomware is discovered, we build pretend files and directories for nefarious behaviours. We conducted a pilot study using Locky, and the results demonstrate the effectiveness of our strategy with little system resource usage and geographical cost.
APA, Harvard, Vancouver, ISO, and other styles
35

Yuan, Yichao, and Tiaojun Xiao. "Retailer's decoy strategy versus consumers' reference price effect in a retailer-Stackelberg supply chain." Journal of Retailing and Consumer Services 68 (September 2022): 103081. http://dx.doi.org/10.1016/j.jretconser.2022.103081.

Full text
APA, Harvard, Vancouver, ISO, and other styles
36

Stanley Jeremiah, Sundararaj, Kenji Ohba, and Naoki Yamamoto. "Cancellers - Exploring the Possibility of Receptor Decoy Traps As a Superior Anti-Retroviral Strategy." Current Drug Targets 17, no. 6 (March 24, 2016): 678–92. http://dx.doi.org/10.2174/138945011706160324125824.

Full text
APA, Harvard, Vancouver, ISO, and other styles
37

Shieh, Chih-Hui, Yingzi Xu, and I.-Ling Ling. "How location-based advertising elicits in-store purchase." Journal of Services Marketing 33, no. 4 (August 12, 2019): 380–95. http://dx.doi.org/10.1108/jsm-03-2018-0083.

Full text
Abstract:
Purpose This paper aims to investigate how location-based advertising (LBA) elicits in-store purchase intention. To deepen the understanding of LBA’s effect on consumers’ purchase decision, the research examines the role of consumers’ time consciousness in click intention in pull or opt-out LBA approaches. The study also explores how consumers react to LBA with an asymmetric dominance decoy versus a compromise decoy message. Design/methodology/approach Two field experiments were conducted, and a total of 363 volunteers within 3 km of a shopping mall participated. The participants were asked to turn on their global positioning system and then informed that a convenience store was planning to launch a mobile coupon subscription service. Data collected were analysed using analysis of variance, regression analysis, bootstrapping and spotlight tests. Findings The results demonstrate that consumers had a higher intention to click pull LBA than to click opt-out push LBA. Consumers with high time-consciousness had greater click intentions for pull LBA than for opt-out push LBA. Consumers with low time-consciousness, however, showed no difference in click intention for either LBA approach. Further, click intention mediates the effect of LBA on in-store purchase intention, and the asymmetric dominance decoy message is a more powerful strategy for LBA to increase the likelihood of in-store purchase. Originality/value This research provides insight into location-based services marketing by revealing how time-consciousness and decoy promotional messages affect consumers’ reaction to LBA and in-store purchase intentions. The findings offer practical suggestions for retailers on how to reach and engage with consumers more effectively through the use of LBA.
APA, Harvard, Vancouver, ISO, and other styles
38

Peng, Yisu, Shantanu Jain, Yong Fuga Li, Michal Greguš, Alexander R. Ivanov, Olga Vitek, and Predrag Radivojac. "New mixture models for decoy-free false discovery rate estimation in mass spectrometry proteomics." Bioinformatics 36, Supplement_2 (December 2020): i745—i753. http://dx.doi.org/10.1093/bioinformatics/btaa807.

Full text
Abstract:
Abstract Motivation Accurate estimation of false discovery rate (FDR) of spectral identification is a central problem in mass spectrometry-based proteomics. Over the past two decades, target-decoy approaches (TDAs) and decoy-free approaches (DFAs) have been widely used to estimate FDR. TDAs use a database of decoy species to faithfully model score distributions of incorrect peptide-spectrum matches (PSMs). DFAs, on the other hand, fit two-component mixture models to learn the parameters of correct and incorrect PSM score distributions. While conceptually straightforward, both approaches lead to problems in practice, particularly in experiments that push instrumentation to the limit and generate low fragmentation-efficiency and low signal-to-noise-ratio spectra. Results We introduce a new decoy-free framework for FDR estimation that generalizes present DFAs while exploiting more search data in a manner similar to TDAs. Our approach relies on multi-component mixtures, in which score distributions corresponding to the correct PSMs, best incorrect PSMs and second-best incorrect PSMs are modeled by the skew normal family. We derive EM algorithms to estimate parameters of these distributions from the scores of best and second-best PSMs associated with each experimental spectrum. We evaluate our models on multiple proteomics datasets and a HeLa cell digest case study consisting of more than a million spectra in total. We provide evidence of improved performance over existing DFAs and improved stability and speed over TDAs without any performance degradation. We propose that the new strategy has the potential to extend beyond peptide identification and reduce the need for TDA on all analytical platforms. Availabilityand implementation https://github.com/shawn-peng/FDR-estimation. Supplementary information Supplementary data are available at Bioinformatics online.
APA, Harvard, Vancouver, ISO, and other styles
39

Hernaez, Bruno, and Antonio Alcami. "New insights into the immunomodulatory properties of poxvirus cytokine decoy receptors at the cell surface." F1000Research 7 (June 11, 2018): 719. http://dx.doi.org/10.12688/f1000research.14238.1.

Full text
Abstract:
Poxviruses encode a set of secreted proteins that bind cytokines and chemokines as a strategy to modulate host defense mechanisms. These viral proteins mimic the activity of host cytokine decoy receptors but have unique properties that may enhance their activity. Here, we describe the ability of poxvirus cytokine receptors to attach to the cell surface after secretion from infected cells, and we discuss the advantages that this property may confer to these viral immunomodulatory proteins.
APA, Harvard, Vancouver, ISO, and other styles
40

Tomita, Naruya, Ryuichi Morishita, Tetsuya Tomita, Haruhito Azuma, and Toshio Ogihara. "NF-κB as a Therapeutic Target for Transcription Factor Decoy Strategy in Inflammatory Diseases." Current Medicinal Chemistry - Anti-Inflammatory & Anti-Allergy Agents 2, no. 1 (March 1, 2003): 51–56. http://dx.doi.org/10.2174/1568014033355826.

Full text
APA, Harvard, Vancouver, ISO, and other styles
41

Elias, Joshua E., and Steven P. Gygi. "Target-decoy search strategy for increased confidence in large-scale protein identifications by mass spectrometry." Nature Methods 4, no. 3 (February 27, 2007): 207–14. http://dx.doi.org/10.1038/nmeth1019.

Full text
APA, Harvard, Vancouver, ISO, and other styles
42

Morishita, Ryuichi. "Application of decoy strategy as a tool of gene therapy and analysis of gene regulation." Japanese Journal of Pharmacology 79 (1999): 6. http://dx.doi.org/10.1016/s0021-5198(19)30913-8.

Full text
APA, Harvard, Vancouver, ISO, and other styles
43

Jiang, Xinning, Xiaoli Dong, Mingliang Ye, and Hanfa Zou. "Instance Based Algorithm for Posterior Probability Calculation by Target−Decoy Strategy to Improve Protein Identifications." Analytical Chemistry 80, no. 23 (December 2008): 9326–35. http://dx.doi.org/10.1021/ac8017229.

Full text
APA, Harvard, Vancouver, ISO, and other styles
44

Sun, Weiping, Yi Liu, and Kaizhong Zhang. "An approach for N-linked glycan identification from MS/MS spectra by target-decoy strategy." Computational Biology and Chemistry 74 (June 2018): 391–98. http://dx.doi.org/10.1016/j.compbiolchem.2018.03.014.

Full text
APA, Harvard, Vancouver, ISO, and other styles
45

Chakrabarty, Paramita, Andrew Li, Thomas B. Ladd, Michael R. Strickland, Emily J. Koller, Jeremy D. Burgess, Cory C. Funk, et al. "TLR5 decoy receptor as a novel anti-amyloid therapeutic for Alzheimer’s disease." Journal of Experimental Medicine 215, no. 9 (August 29, 2018): 2247–64. http://dx.doi.org/10.1084/jem.20180484.

Full text
Abstract:
There is considerable interest in harnessing innate immunity to treat Alzheimer’s disease (AD). Here, we explore whether a decoy receptor strategy using the ectodomain of select TLRs has therapeutic potential in AD. AAV-mediated expression of human TLR5 ectodomain (sTLR5) alone or fused to human IgG4 Fc (sTLR5Fc) results in robust attenuation of amyloid β (Aβ) accumulation in a mouse model of Alzheimer-type Aβ pathology. sTLR5Fc binds to oligomeric and fibrillar Aβ with high affinity, forms complexes with Aβ, and blocks Aβ toxicity. Oligomeric and fibrillar Aβ modulates flagellin-mediated activation of human TLR5 but does not, by itself, activate TLR5 signaling. Genetic analysis shows that rare protein coding variants in human TLR5 may be associated with a reduced risk of AD. Further, transcriptome analysis shows altered TLR gene expression in human AD. Collectively, our data suggest that TLR5 decoy receptor–based biologics represent a novel and safe Aβ-selective class of biotherapy in AD.
APA, Harvard, Vancouver, ISO, and other styles
46

Micarelli, Primo, Federico Chieppa, Antonio Pacifico, Enrico Rabboni, and Francesca Romana Reinero. "Passive Prey Discrimination in Surface Predatory Behaviour of Bait-Attracted White Sharks from Gansbaai, South Africa." Animals 11, no. 9 (September 3, 2021): 2583. http://dx.doi.org/10.3390/ani11092583.

Full text
Abstract:
Between the years 2008 and 2013, six annual research expeditions were carried out at Dyer Island (Gansbaai, South Africa) to study the surface behaviour of white sharks in the presence of two passive prey: tuna bait and a seal-shaped decoy. Sightings were performed from a commercial cage-diving boat over 247 h; 250 different white sharks, with a mean total length (TL) of 308 cm, were observed. Of these, 166 performed at least one or more interactions, for a total of 240 interactions with bait and the seal-shaped decoy. In Gansbaai, there is a population of transient white sharks consisting mainly of immature specimens throughout the year. Both mature and immature sharks preferred to prey on the seal-shaped decoy, probably due to the dietary shift that occurs in white sharks whose TL varies between 200 cm and 340 cm. As it is widely confirmed that white sharks change their diet from a predominantly piscivorous juvenile diet to a mature marine mammalian diet, it is possible that Gansbaai may be a hunting training area and that sharks show a discriminate food choice, a strategy that was adopted by the majority of specimens thanks to their ability to visualize energetically richer prey, after having been attracted by the odorous source represented by the tuna bait.
APA, Harvard, Vancouver, ISO, and other styles
47

Seo, Sang, and Dohoon Kim. "SOD2G: A Study on a Social-Engineering Organizational Defensive Deception Game Framework through Optimization of Spatiotemporal MTD and Decoy Conflict." Electronics 10, no. 23 (December 2, 2021): 3012. http://dx.doi.org/10.3390/electronics10233012.

Full text
Abstract:
Existing moving target defense (MTD) and decoy systems are conceptually limited in avoiding and preventing attackers’ social-engineering real-time attacks by organization through either structural mutations or induction and isolation only using static traps. To overcome the practical limitations of existing MTD and decoy and to conduct a multi-stage deception decision-making in a real-time attack-defense competition, the current work presents a social-engineering organizational defensive deception game (SOD2G) as a framework, consi dering hierarchical topologies and fingerprint characteristics by organization. The present work proposed and applied deception concepts and zero-sum-based two-player game models as well as attacker and defender decision-making process based on deceivable organizational environments and vulnerability information. They were designed in consideration of limited organizational resources so that they could converge in the positive direction to secure organizational defender dominant share and optimal values of the defender deception formulated by both scenario and attribute. This framework could handle incomplete private information better than existing models and non-sequentially stratified, and also contributed to the configuration of the optimal defender deception strategy. As the experimental results, they could increase the deception efficiency within an organization by about 40% compared to existing models. Also, in the sensitivity analysis, the proposed MTD and decoy yielded improvements of at least 60% and 30% in deception efficiency, respectively, compared to the existing works.
APA, Harvard, Vancouver, ISO, and other styles
48

Pettibone, Jonathan C., and Douglas H. Wedell. "Testing alternative explanations of phantom decoy effects." Journal of Behavioral Decision Making 20, no. 3 (2007): 323–41. http://dx.doi.org/10.1002/bdm.557.

Full text
APA, Harvard, Vancouver, ISO, and other styles
49

Yao, Molly, Jalicia Sturdivant, Aren Ebrahimi, Samayita Ganguly, and Tamer Elbayoumi. "Novel Pharmaceutical Strategy for Selective Abrogation of TSP1-Induced Vascular Dysfunction by Decoy Recombinant CD47 Soluble Receptor in Prophylaxis and Treatment Models." Biomedicines 9, no. 6 (June 3, 2021): 642. http://dx.doi.org/10.3390/biomedicines9060642.

Full text
Abstract:
Elevated thrombospondin 1 (TSP1) is a prevalent factor, via cognate receptor CD47, in the pathogenesis of cardiovascular conditions, including ischemia-reperfusion injury (IRI) and pulmonary arterial hypertension (PAH). Moreover, TSP1/CD47 interaction has been found to be associated with platelet hyperaggregability and impaired nitric oxide response, exacerbating progression in IRI and PAH. Pathological TSP1 in circulation arises as a target of our novel therapeutic approach. Our “proof-of-concept” pharmacological strategy relies on recombinant human CD47 peptide (rh-CD47p) as a decoy receptor protein (DRP) to specifically bind TSP1 and neutralize TSP1-impaired vasorelaxation, strongly implicated in IRI and PAH. The binding of rh-CD47p and TSP1 was first verified as the primary mechanism via Western blotting and further quantified with modified ELISA, which also revealed a linear molar dose-dependent interaction. Ex vivo, pretreatment protocol with rh-CD47p (rh-CD47p added prior to TSP1 incubation) demonstrated a prophylactic effect against TSP1-impairment of endothelium-dependent vasodilation. Post-treatment set-up (TSP1 incubation prior to rh-CD47p addition), mimicking pre-existing excessive TSP1 in PAH, reversed TSP1-inhibited vasodilation back to control level. Dose titration identified an effective molar dose range (approx. ≥1:3 of tTSP1:rh-CD47p) for prevention of/recovery from TSP1-induced vascular dysfunction. Our results indicate the great potential for proposed novel decoy rh-CD47p-therapy to abrogate TSP1-associated cardiovascular complications, such as PAH.
APA, Harvard, Vancouver, ISO, and other styles
50

Kim, TaeGuen. "Deception-based Method for Ransomware Detection." Journal of Internet Services and Information Security 13, no. 3 (August 30, 2023): 191–201. http://dx.doi.org/10.58346/jisis.2023.i3.012.

Full text
Abstract:
Ransomware is a rapidly growing malware threat that encrypts a user's files and demands a ransom for the decryption key. It has caused significant financial harm worldwide and is difficult to detect, especially when it's a new, unknown zero-day ransomware. Most commercial antivirus software relies on signature-based detection, which can be slow and inadequate for swiftly identifying suspicious programs. To tackle these challenges, this paper presents a ransomware protection method utilizing decoy files. Our deception-based protection method enhances ransomware detection with a fair decoy deployment strategy. Our method offers the advantage of robustly detecting ransomware compared to existing deception-based methods. Furthermore, it can effectively address ransomware that employs random access attacks, thereby bypassing deception-based detection techniques. In the evaluation, we provide a comprehensive analysis of our experimental results to vividly demonstrate the efficacy of our proposed method. Specifically, we introduce a random-access attack scenario that could potentially circumvent deception-based protection mechanisms. Furthermore, we assess the resilience of our method against such random-access attacks.
APA, Harvard, Vancouver, ISO, and other styles
We offer discounts on all premium plans for authors whose works are included in thematic literature selections. Contact us to get a unique promo code!

To the bibliography