Academic literature on the topic 'Stratégie "Cheval de Troie"'
Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles
Consult the lists of relevant articles, books, theses, conference reports, and other scholarly sources on the topic 'Stratégie "Cheval de Troie".'
Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.
You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.
Journal articles on the topic "Stratégie "Cheval de Troie""
Wenger, Stephan, and Fulvia Raiola. "Cheval de Troie." Adolescence 71, no. 1 (2010): 171. http://dx.doi.org/10.3917/ado.071.0171.
Full textLambin, Gérard. "Le Cheval de Troie." Gaia : revue interdisciplinaire sur la Grèce Archaïque 3, no. 1 (1998): 97–108. http://dx.doi.org/10.3406/gaia.1998.1342.
Full textBaquedano, Michel. "Le cheval de Troie." Empan 61, no. 1 (2006): 53. http://dx.doi.org/10.3917/empa.061.54.
Full textGrim, Olivier R. "Un nouveau cheval de Troie." Journal des anthropologues, no. 122-123 (December 1, 2010): 27–49. http://dx.doi.org/10.4000/jda.3673.
Full textGiacomo, Pierre. "Le CGS innocent Cheval de Troie." Bulletin d'histoire de l'électricité 16, no. 1 (1990): 5–8. http://dx.doi.org/10.3406/helec.1990.1123.
Full textNicaise, Ides, Luc Lauwereys, and Nick Matheus. "L'économie sociale d'insertion, cheval de bataille ou cheval de Troie ?" Reflets et perspectives de la vie économique XLI, no. 3 (2002): 77. http://dx.doi.org/10.3917/rpve.413.0077.
Full textPommier, Gérard. "Le Livre noir : un cheval de Troie." Le Journal des psychologues 235, no. 2 (2006): 18. http://dx.doi.org/10.3917/jdp.235.0018.
Full textLuyet, Pierre-Philippe, and Jean Gruenberg. "L’endocytose, cheval de Troie pour l’infection virale." médecine/sciences 21, no. 11 (November 2005): 909–10. http://dx.doi.org/10.1051/medsci/20052111909.
Full textPerez, Frédéric. "Et aussi... Le complexe du Cheval de Troie." Dialogue 190, no. 4 (2010): 135. http://dx.doi.org/10.3917/dia.190.0135.
Full textBory, Anne, and Yves Lochard. "La responsabilité sociale des entreprises : un cheval de Troie politique ?" Sociologies pratiques 18, no. 1 (2009): 39. http://dx.doi.org/10.3917/sopr.018.0039.
Full textDissertations / Theses on the topic "Stratégie "Cheval de Troie""
Sansiaume, Elodie. "Conception et élaboration de nouvelles métalloenzymes artificielles selon la stratégie du cheval de Troie." Paris 11, 2010. http://www.theses.fr/2010PA112237.
Full textThe construction of artificial métalloenzymes has appeared to be one of the most promising strategies explored to induce stereoselectivity into chemical reactions. New metalloporphyrin-estradiol conjugates and testosterone conjugates have been synthesized and fully characterized, and have been further associated respectively to a monoclonal anti-estradiol antibody 7A3 and neocarzinostatin's mutants, to generate new artificial metalloenzymes following the so-called 'Trojan Horse' strategy. The spectroscopic characteristics and dissociation constants of these complexes were similar to those obtained for the artificial metalloproteins obtained by association of cationic metalloporphyrin-estradiol conjugates to 7A3. This demonstrates that the nature of the porphyrin substituents, anionic or cationic, had little influence on the association with the antibody that is mainly driven by the tight association of the estradiol anchor with the binding pocket of the antibody. These new biocatalysts appeared to have an interesting catalytic activity in oxidation reactions. The iron(III)-anionic-porphyrin-estradiol-antibody complexes and the iron(III)-anionic-porphyrin-testosterone-neocarzinostatine's mutants complexes were found able to catalyze the chemoselective and slightly enantioselective (ee = 10 % et 24 % à 40 % respectively) sulfoxidation of sulfides by H202. The Mn(III)-porphyrin-estradiol antibody complexes were found to catalyze the oxidation of styrene by KHSO5, the Mn(III)-cationic-porphyrin-estradiol-antibody complexes even showing the highest yields so far reported for the oxidation of styrene catalyzed by artificial metalloproteins
Paulen, Aurélie. "Utilisation de la stratégie du cheval de Troie pour lutter contre Pseudomonas aeruginosa : synthèses et propriétés biologiques de conjugués sidérophores-antibiotiques." Thesis, Strasbourg, 2017. http://www.theses.fr/2017STRAJ021/document.
Full textConstant discovery of innovative therapeutic strategies against pathogenic bacteria is crucial. Iron is essential for bacterial proliferation since it is integrated in the active site of essential enzymes. Many pathogenic bacteria excrete low molecular weight secondary metabolites called siderophores in order to promote iron (III) acquisition. Transmembrane siderophore-dependent iron uptake systems can be used as gates by siderophore-antibiotic conjugates. In this context, we synthesized conjugates between analogs of pyochelin, aminochelin or azotochelin with oxazolidinones antibiotics. In this project many of the conjugation between vectors and antibiotics were the result of click chemistry reactions even the use of peptidic bonds was also explored. Synthesis and biological properties of conjugates and vectors are presented in this manuscript
Reyes, Carrillo Tatiana. "L'éco-conception dans les PME : les mécanismes du cheval de Troie méthodologique et du choix de trajectoires comme vecteurs d'intégration de l'environnement en conception." Toulon, 2007. http://tel.archives-ouvertes.fr/tel-00274389/fr/.
Full textThis research proposes a new solution to fulfill the need to develop an accessible mechanism to implement sustainable design in the long term, based on 2 axes. The first axis relies on the clear identification of integration trajectories. This allows the company to guide the integration process on the long term. The second axis is based on an ecodesign tool that is conceived and developed by all the main participants in the design. This axis enables a progressive evolution of environmental performance within an organization. An investigation work has been done, with specific experts for the first axis and with ecodesign pioneers companies for the second axis. We call this second point mechanism a "methodological Trojan horse" approach ("MTH") because the underlying strategy is to introduce an appropriate pretext that enables collaborative work (the ecodesign tool has to be co-designed) and to supply the organization with the necessary skills to develop the tool at a later stage. The "MTH" approach facilitates the propagation of sustainable design knowledge at all levels within the company and thus allows the company to progress towards complete integration (from a partial sustainable design approach to an eco-innovation approach, integrating the requirements of sustainable development). The whole concept of this MTH was tested over a period of two years in the company Transfix that manufactures transformers. It has successfully highlighted the benefits of this integrated approach based on the "MTH" mechanism and guided by the "ecodesign tools and methods" integration trajectory
Loupias, Pauline. "Synthèse et étude d'analogues de sidérophores à large spectre antibactérien." Thesis, Amiens, 2020. http://www.theses.fr/2020AMIE0032.
Full textThis work consisted in exploiting a new therapeutic strategy to fight Pseudomonas aeruginosa and Burkholderia pseudomallei, two Gram-negative bacteria particularly concerning. While P. aeruginosa, which is part of the ESKAPE bacteria, is responsible for the majority of nosocomial infections, B. pseudomallei, formerly classified in the Pseudomonas group, is involved in Whitmore's disease and is considered by the CDC as a potential bioterrorist weapon. These two pathogens have natural and acquired resistance to many antibiotics by efflux or via a lack of membrane permeability, which makes treatment difficult. Facing this health emergency, the use of the "Trojan Horse" strategy to vectorize antibiotics can help restore their activities. Iron is a micronutrient necessary for the survival of bacteria, but it is not very bioavailable due to its low solubility in water. To acquire it, many bacteria synthesize molecules of low molecular weight, called siderophores, capable of chelating the surrounding iron. The complexes formed are then recognized specifically by TonB-dependent receptors in order to transport iron within bacteria. Depending on their type, bacteria express different receptors recognizing their endogenous siderophores but also xenosiderophores or synthetic siderophores. The use of these different kinds of siderophores to carry an antibiotic or a toxic metal such as gallium into the bacteria has already led to promising results. The objectives of this PhD were to synthesize new siderophores of piperazine structure, new siderophore-antibiotic conjugates and toxic siderophore-gallium complexes. Physico-chemical and biological studies were also carried out in order to validate the interest of the structures chosen in anti-infectious chemotherapy
Pesset, Bénédicte. "Conception, synthèse et vectorisation d'inhibiteurs potentiels de la protéine bactérienne TonB." Thesis, Strasbourg, 2012. http://www.theses.fr/2012STRAJ089/document.
Full textThe increasing resistances to the current antibiotherapies, and the potential use of pathogenic bacteria as biological weapons led us to the absolute necessity of discovering new biological targets and new antibiotic strategies. In this context, iron uptake pathways of Gram negative bacteria are promising targets. Indeed, iron is an essential nutrient, but it has a low bioavailability. Bacteria have developed efficient iron uptake pathways in order to proliferate. Iron is transported in the bacterial cell by specific outer membrane transporters and thanks to the energy provided by a complex molecular machinery, called TonB. The TonB protein, which is the keystone of this machinery, is a key target for the development of new antibiotics. We would like to sequester this protein in the periplasm thanks to molecules constituted of a peptidic moiety and a heterocyclic moiety such as isoindole or 1,2,4-triazine. The conception and the synthesis of these compounds are presented in this document, as well as their possibilities to be vectorized using a “Trojan Horse” strategy. Our contribution to the development of an in vitro test of affinity is presented as well
Ba, Papa-Sidy. "Détection et prévention de Cheval de Troie Matériel (CTM) par des méthodes Orientées Test Logique." Thesis, Montpellier, 2016. http://www.theses.fr/2016MONTT271/document.
Full textIn order to reduce the production costs of integrated circuits (ICs), outsourcing the fabrication process has become a major trend in the Integrated Circuits (ICs) industry. As an inevitable unwanted side effect, this outsourcing business model increases threats to hardware products. This process raises the issue of un-trusted foundries in which, circuit descriptions can be manipulated with the aim to possibly insert malicious circuitry or alterations, referred to as Hardware Trojan Horses (HTHs). This motivates semiconductor industries and researchers to study and investigate solutions for detecting during testing and prevent during fabrication, HTH insertion.However, considering the stealthy nature of HTs, it is quite impossible to detect them with conventional testing or even with random patterns. This motivates us to make some contributions in this thesis by proposing solutions to detect and prevent HTH after fabrication (during testing).The proposed methods help to detect HTH as well during testing as during normal mode(run-time), and they are logic testing based.Furthermore, we propose prevention methods, which are also logic testing based, in order tomake harder or quasi impossible the insertion of HTH both in netlist and layout levels
Cordeau, Françoise. "Le Cheval de Troie (roman) suivi de : L'expression du sentiment d'abandon chez Anne Hébert, Louise Desjardins, Bruno Roy et Björn Larsson." Thesis, Université Laval, 2011. http://www.theses.ulaval.ca/2011/28293/28293.pdf.
Full textReyes, Carillo Tatiana. "L'éco-conception dans les PME : les mécanismes du cheval de Troie méthodologique et du choix de trajectoires comme vecteurs d'intégration de l'environnement en conception." Phd thesis, Université du Sud Toulon Var, 2007. http://tel.archives-ouvertes.fr/tel-00274389.
Full textReyes, Carrillo Tatiana Millet Dominique Brissaud Daniel. "L' éco-conception dans les PME les mécanismes du cheval de Troie méthodologique et du choix de trajectoires comme vecteurs d'intégration de l'environnement en conception /." [S.l.] : [s.n.], 2007. http://tel.archives-ouvertes.fr/tel-00274389/fr.
Full textBoos, Romain. "La lutte contre la cybercriminalité au regard de l’action des États." Thesis, Université de Lorraine, 2016. http://www.theses.fr/2016LORR0158/document.
Full textThe twenty-first century sees the consecration of digital technologies just as the end of the Middle-Ages saw the creation of printing.Henceforth, the digital era has no limits. It gives access to culture and knowledge, encourages the exchanges between people.It allows the constitution of an economy online and brings citizens closer to their adminitration. Digital technologies generate innovation and growth, and can help or accelerate the development of the emergent countries as well. But a certain pessimism moderates this idealistic approach.All these advances also generate new fragilities and vulnerabilities propicious to threats or risks, as they stimulate the criminals' imagination.Now , cybercriminality has become reality.It is all the more dangerous as it penetrates within families , where ordinary delinquency didn't exist until now. From now on, this new kind of criminality made it obvious that the judicial system had to be adapted. Indeed , faced with these violations , there are of course laws that are applied here and now to the Internet.But , are they really efficient? In the same way, is the intersate cooperation also sufficient to fight against cybercriminality? So , it is important to wonder whether , in our modern society , the legislative framework and the institutional cooperation , both european and international , are sufficient and efficient to penalize the cybercriminal offences
Books on the topic "Stratégie "Cheval de Troie""
Jacques, Martin. Le cheval de Troie. Tournai, Belgique: Casterman, 1988.
Find full textMal-Maeder, D. van. Le cheval de Troie: Variations autour d'une guerre. Gollion: Infolio, 2007.
Find full textValle, Alexandre del. La Turquie dans l'Europe: Un cheval de Troie islamiste? Paris: Editions des Syrtes, 2004.
Find full textLittle, Emily. Le cheval de Troie: Comment les Grecs ont gagne la guerre. Saint-Lambert: Heritage, 1990.
Find full textVolkoff, Vladimir. Petite histoire de la désinformation: Du Cheval de Troie à Internet. Monaco: Rocher, 1999.
Find full textJoel, Surnow, and Cochran Robert, eds. 24 heures chrono: Cheval de Troie : [une aventure inédite de Jack Bauer]. Paris: Fleuve noir, 2007.
Find full textGenève, Max. Jeune homme assis dans la neige, ou, Le cheval de Troie: Roman. Paris: Barrault, 1985.
Find full textJeune homme assis dans la neige, ou, Le cheval de Troie: Roman. Paris: Barrault, 1985.
Find full textDreyer, Dominique. Réglementation professionnelle et marché intérieur: Une loi fédérale, Cheval de Troie du droit européen. Genève: Helbing & Lichtenhahn, 2003.
Find full textLe Cheval de Troie. Le Livre de Poche, 2001.
Find full textBook chapters on the topic "Stratégie "Cheval de Troie""
"4. Politics And The Novel: Le Cheval De Troie." In Paul Nizan: Committed Literature in a Conspiratorial World, 119–50. Princeton: Princeton University Press, 2015. http://dx.doi.org/10.1515/9781400870837-006.
Full textMangin, David, and Sylvain Allemand. "IV. L’économie présentielle, cheval de Troie de l’urbanisme de zoning." In Cultures et créations dans les métropoles-monde, 315–26. Hermann, 2016. http://dx.doi.org/10.3917/herm.lussa.2016.01.0315.
Full textButon, Philippe. "Nous les Garçons et les Filles ou le cheval de Troie communiste." In Le photojournalisme des années 1930 à nos jours, 109–20. Presses universitaires de Rennes, 2014. http://dx.doi.org/10.4000/books.pur.50376.
Full textde Nadaï, Anne. "La description géographique, un cheval de Troie de la géographicité sur le terrain des classes de lycée." In Acteurs et action, 87–100. Presses universitaires de Caen, 2016. http://dx.doi.org/10.4000/books.puc.12934.
Full textBourque, Dominique. "Un Cheval de Troie nommé dé-marquage : la neutralisation des catégories de sexe dans l’œuvre de Monique Wittig." In Lire Monique Wittig aujourd’hui, 67–87. Presses universitaires de Lyon, 2012. http://dx.doi.org/10.4000/books.pul.4224.
Full text