Academic literature on the topic 'Trojan horse strategy'

Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles

Select a source type:

Consult the lists of relevant articles, books, theses, conference reports, and other scholarly sources on the topic 'Trojan horse strategy.'

Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.

You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.

Journal articles on the topic "Trojan horse strategy"

1

Mammas, Ioannis N., George Sourvinos, and Demetrios A. Spandidos. "The ‘Trojan horse’ oncogenic strategy of HPVs in childhood." Future Virology 8, no. 8 (August 2013): 801–8. http://dx.doi.org/10.2217/fvl.13.57.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Ovrutsky, Alida R., Marinka Kartalija, Xiyuan Bai, and Edward D. Chan. "A Trojan Horse Strategy to Deliver Amikacin to Mycobacterial Granulomas." American Journal of Respiratory and Critical Care Medicine 184, no. 7 (October 2011): 860. http://dx.doi.org/10.1164/ajrccm.184.7.860.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Montes-Worboys, Ana, Scott Brown, and Veena B. Antony. "A Trojan Horse Strategy to Deliver Amikacin to Mycobacterial Granulomas." American Journal of Respiratory and Critical Care Medicine 184, no. 7 (October 2011): 860–61. http://dx.doi.org/10.1164/ajrccm.184.7.860a.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Larkin, Marilynn. "“Trojan horse” strategy enters phase I trial for breast cancer." Lancet Oncology 4, no. 11 (November 2003): 650. http://dx.doi.org/10.1016/s1470-2045(03)01262-2.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

Djamei, A., A. Pitzschke, H. Nakagami, I. Rajh, and H. Hirt. "Trojan Horse Strategy in Agrobacterium Transformation: Abusing MAPK Defense Signaling." Science 318, no. 5849 (October 19, 2007): 453–56. http://dx.doi.org/10.1126/science.1148110.

Full text
APA, Harvard, Vancouver, ISO, and other styles
6

Mislin, Gaëtan L. A., and Isabelle J. Schalk. "Siderophore-dependent iron uptake systems as gates for antibiotic Trojan horse strategies against Pseudomonas aeruginosa." Metallomics 6, no. 3 (2014): 408–20. http://dx.doi.org/10.1039/c3mt00359k.

Full text
APA, Harvard, Vancouver, ISO, and other styles
7

Górska, Agnieszka, Anna Sloderbach, and Michał Piotr Marszałł. "Siderophore–drug complexes: potential medicinal applications of the ‘Trojan horse’ strategy." Trends in Pharmacological Sciences 35, no. 9 (September 2014): 442–49. http://dx.doi.org/10.1016/j.tips.2014.06.007.

Full text
APA, Harvard, Vancouver, ISO, and other styles
8

Wec, Anna Z., Elisabeth K. Nyakatura, Andrew S. Herbert, Katie A. Howell, Frederick W. Holtsberg, Russell R. Bakken, Eva Mittler, et al. "A “Trojan horse” bispecific-antibody strategy for broad protection against ebolaviruses." Science 354, no. 6310 (September 8, 2016): 350–54. http://dx.doi.org/10.1126/science.aag3267.

Full text
APA, Harvard, Vancouver, ISO, and other styles
9

Möllmann, Ute, Lothar Heinisch, Adolf Bauernfeind, Thilo Köhler, and Dorothe Ankel-Fuchs. "Siderophores as drug delivery agents: application of the “Trojan Horse” strategy." BioMetals 22, no. 4 (February 12, 2009): 615–24. http://dx.doi.org/10.1007/s10534-009-9219-2.

Full text
APA, Harvard, Vancouver, ISO, and other styles
10

Emde, Sebastian, Sonja Rueckert, Judith Kochmann, Klaus Knopf, Bernd Sures, and Sven Klimpel. "Nematode eel parasite found inside acanthocephalan cysts ¿ a ¿Trojan horse¿ strategy?" Parasites & Vectors 7, no. 1 (2014): 504. http://dx.doi.org/10.1186/preaccept-2046834240132835.

Full text
APA, Harvard, Vancouver, ISO, and other styles
More sources

Dissertations / Theses on the topic "Trojan horse strategy"

1

Paulen, Aurélie. "Utilisation de la stratégie du cheval de Troie pour lutter contre Pseudomonas aeruginosa : synthèses et propriétés biologiques de conjugués sidérophores-antibiotiques." Thesis, Strasbourg, 2017. http://www.theses.fr/2017STRAJ021/document.

Full text
Abstract:
La découverte de stratégies thérapeutiques innovantes contre les bactéries pathogènes est cruciale. Le fer est essentiel pour la prolifération bactérienne et les bactéries pathogènes excrètent des molécules organiques de faible poids moléculaire, appelées sidérophores, pour acquérir le fer(III). Les systèmes d’acquisition de fer sidérophores-dépendants sont transmembranaires et peuvent être utilisés comme des portes d’entrée pour faire pénétrer des conjugués sidérophores-antibiotiques dans la bactérie dans le cadre d’une stratégie dite du cheval de Troie. Nous avons synthétisé des conjugués constitués d’analogues des sidérophores pyochéline, aminochéline ou azotochéline couplés à des oxazolidinones antibiotiques. Dans la majorité de nos approches la liaison entre le sidérophore et l’antibiotique est le résultat d’une réaction de chimie click. La synthèse et les propriétés biologiques des vecteurs et des conjugués synthétisés sont présentées dans ce manuscrit
Constant discovery of innovative therapeutic strategies against pathogenic bacteria is crucial. Iron is essential for bacterial proliferation since it is integrated in the active site of essential enzymes. Many pathogenic bacteria excrete low molecular weight secondary metabolites called siderophores in order to promote iron (III) acquisition. Transmembrane siderophore-dependent iron uptake systems can be used as gates by siderophore-antibiotic conjugates. In this context, we synthesized conjugates between analogs of pyochelin, aminochelin or azotochelin with oxazolidinones antibiotics. In this project many of the conjugation between vectors and antibiotics were the result of click chemistry reactions even the use of peptidic bonds was also explored. Synthesis and biological properties of conjugates and vectors are presented in this manuscript
APA, Harvard, Vancouver, ISO, and other styles
2

Loupias, Pauline. "Synthèse et étude d'analogues de sidérophores à large spectre antibactérien." Thesis, Amiens, 2020. http://www.theses.fr/2020AMIE0032.

Full text
Abstract:
Ce travail de thèse a consisté à exploiter une nouvelle stratégie thérapeutique pour lutter contre Pseudomonas aeruginosa et Burkholderia pseudomallei, deux bactéries à Gram-négatif particulièrement préoccupantes. Alors que P. aeruginosa qui fait partie des bactéries ESKAPE est responsable de la majorité des infections nosocomiales, B. pseudomallei, anciennement classifiée dans le groupe de Pseudomonas, est impliquée dans la maladie de Whitmore et est considérée par les CDC comme une arme bioterroriste potentielle. Ces deux pathogènes possèdent des résistances naturelles et acquises à de nombreux antibiotiques par efflux ou via un défaut de perméabilité membranaire, ce qui rend les traitements difficiles. Devant cette urgence sanitaire, l'exploitation de la stratégie "Cheval de Troie", pour vectoriser les antibiotiques, peut permettre de restaurer leurs activités. Le fer constitue un micronutriment nécessaire à la survie des bactéries mais il est peu biodisponible du fait de sa faible solubilité dans l'eau. Pour l'acquérir, de nombreuses bactéries synthétisent des molécules de faible poids moléculaire, appelés sidérophores, capables de chélater le fer environnant. Les complexes formés sont alors reconnus spécifiquement par des récepteurs dépendants de TonB afin de transporter le fer au sein des bactéries. Selon leur type, les bactéries expriment différents récepteurs reconnaissant leurs sidérophores endogènes mais aussi des xénosidérophores ou des sidérophores synthétiques. L'utilisation de ces différents types sidérophores pour véhiculer un antibiotique ou un métal toxique tel que le gallium dans la bactérie a déjà conduit à des résultats prometteurs. Les objectifs de cette thèse étaient de synthétiser de nouveaux sidérophores de structure pipérazinique, de nouveaux conjugués sidérophore-antibiotiques et des complexes toxiques sidérophore-gallium. Des études physico-chimique et biologique ont aussi été menée afin de valider l'intérêt des structures choisies dans la chimiothérapie anti-infectieuse
This work consisted in exploiting a new therapeutic strategy to fight Pseudomonas aeruginosa and Burkholderia pseudomallei, two Gram-negative bacteria particularly concerning. While P. aeruginosa, which is part of the ESKAPE bacteria, is responsible for the majority of nosocomial infections, B. pseudomallei, formerly classified in the Pseudomonas group, is involved in Whitmore's disease and is considered by the CDC as a potential bioterrorist weapon. These two pathogens have natural and acquired resistance to many antibiotics by efflux or via a lack of membrane permeability, which makes treatment difficult. Facing this health emergency, the use of the "Trojan Horse" strategy to vectorize antibiotics can help restore their activities. Iron is a micronutrient necessary for the survival of bacteria, but it is not very bioavailable due to its low solubility in water. To acquire it, many bacteria synthesize molecules of low molecular weight, called siderophores, capable of chelating the surrounding iron. The complexes formed are then recognized specifically by TonB-dependent receptors in order to transport iron within bacteria. Depending on their type, bacteria express different receptors recognizing their endogenous siderophores but also xenosiderophores or synthetic siderophores. The use of these different kinds of siderophores to carry an antibiotic or a toxic metal such as gallium into the bacteria has already led to promising results. The objectives of this PhD were to synthesize new siderophores of piperazine structure, new siderophore-antibiotic conjugates and toxic siderophore-gallium complexes. Physico-chemical and biological studies were also carried out in order to validate the interest of the structures chosen in anti-infectious chemotherapy
APA, Harvard, Vancouver, ISO, and other styles
3

Pesset, Bénédicte. "Conception, synthèse et vectorisation d'inhibiteurs potentiels de la protéine bactérienne TonB." Thesis, Strasbourg, 2012. http://www.theses.fr/2012STRAJ089/document.

Full text
Abstract:
La multiplication des résistances aux antibiothérapies actuelles et l’utilisation potentielle de bactéries pathogènes dans le cadre d’attentats bioterroristes rendent nécessaire la recherche de nouvelles cibles biologiques et la découverte de nouvelles stratégies antibiotiques. Dans ce contexte, les mécanismes d’assimilation du fer chez les bactéries à Gram négatif sont des cibles particulièrement prometteuses. Le fer est en effet un élément essentiel à la vie, mais peu biodisponible. Les bactéries ont donc développé des mécanismes efficaces pour subvenir à leurs besoins en fer. Ces mécanismes de transport nécessitent un apport d’énergie fourni par une machinerie bactérienne complexe, la machinerie TonB. La protéine TonB, qui joue un rôle central dans le fonctionnement de cette machinerie, est la cible de notre approche. Nous souhaitons séquestrer cette protéine dans le périplasme grâce à des composés peptidiques fonctionnalisés par des hétérocycles de type isoindole ou 1,2,4-triazine. La conception et la synthèse de ces molécules sont présentées dans ce manuscrit, ainsi que leurs perspectives de vectorisation en utilisant une stratégie dite du "cheval de Troie". Notre contribution à la mise au point d’un test d’affinité in vitro est également abordée
The increasing resistances to the current antibiotherapies, and the potential use of pathogenic bacteria as biological weapons led us to the absolute necessity of discovering new biological targets and new antibiotic strategies. In this context, iron uptake pathways of Gram negative bacteria are promising targets. Indeed, iron is an essential nutrient, but it has a low bioavailability. Bacteria have developed efficient iron uptake pathways in order to proliferate. Iron is transported in the bacterial cell by specific outer membrane transporters and thanks to the energy provided by a complex molecular machinery, called TonB. The TonB protein, which is the keystone of this machinery, is a key target for the development of new antibiotics. We would like to sequester this protein in the periplasm thanks to molecules constituted of a peptidic moiety and a heterocyclic moiety such as isoindole or 1,2,4-triazine. The conception and the synthesis of these compounds are presented in this document, as well as their possibilities to be vectorized using a “Trojan Horse” strategy. Our contribution to the development of an in vitro test of affinity is presented as well
APA, Harvard, Vancouver, ISO, and other styles

Book chapters on the topic "Trojan horse strategy"

1

Peng, Jinye, Guangqiang He, Jin Xiong, and Guihua Zeng. "Trojan Horse Attack Strategy on Quantum Private Communication." In Information Security Practice and Experience, 177–86. Berlin, Heidelberg: Springer Berlin Heidelberg, 2006. http://dx.doi.org/10.1007/11689522_17.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

"The Convoy to Nîmes." In An Old French Trilogy, translated by Catherine M. Jones, William W. Kibler, and Logan E. Whalen, 98–141. University Press of Florida, 2020. http://dx.doi.org/10.5744/florida/9780813066462.003.0003.

Full text
Abstract:
King Louis distributes fiefs to his barons but neglects William, his most loyal knight. Rejecting Louis’s subsequent offers, all of which would be detrimental to worthy families or the monarchy itself, William proposes to take Nîmes from the Saracens and hold it as Louis’s vassal. Employing a strategy reminiscent of the Trojan horse, William and his men fill barrels with knights and weapons, and prepare to smuggle them into Nîmes on carts. Disguised as a merchant, William tricks the Saracens and leads the convoy into the city, where he and his men defeat the Saracens and assume control of Nîmes. In this poem, the portrait of King Louis is increasingly unflattering, while his vassal gains in heroic stature. Despite the seriousness of its territorial and spiritual concerns, The Convoy to Nîmes contains a strong dose of the humor that permeates the cycle as a whole.
APA, Harvard, Vancouver, ISO, and other styles
3

Muthukrishnan, Lakshmipathy. "Encountering the Survival Strategies Using Various Nano Assemblages." In Handbook of Research on Nano-Strategies for Combatting Antimicrobial Resistance and Cancer, 159–87. IGI Global, 2021. http://dx.doi.org/10.4018/978-1-7998-5049-6.ch007.

Full text
Abstract:
The technological advancements have not only made humans more civilized but have also caused the micro-organisms to develop several survival strategies via antimicrobial resistance to keep pace. Such highly developed microbial systems have been classified as superbugs, exhibiting Trojan-horse mechanism. This uncertain behaviour in microbes has challenged humans to scour around novel moiety to shield themselves from the detrimental effects. One such natural phenomenon that has drawn the attention of researchers is the metal-microbe interaction where microbes were found to be controlled during their interaction with metals. Fine tuning could bestow them with enhanced physico-chemical properties capable of controlling life-threatening micro-organisms. Nano forms of metals (nanoparticles, quantum dots, polymeric nanostructures) exhibiting medicinal properties have been implied toward biomedical theranostics. This chapter highlights the mechanistic antimicrobial resistance and the containment strategy using various nano assemblage highlighting its fabrication and bio-molecular interaction.
APA, Harvard, Vancouver, ISO, and other styles
4

Nash, Alan. "Breach, Bridgehead, or Trojan Horse? An Exploration of the Role of Food Trucks in Montreal’s Changing Foodscape." In Food Trucks, Cultural Identity, and Social Justice. The MIT Press, 2017. http://dx.doi.org/10.7551/mitpress/9780262036573.003.0012.

Full text
Abstract:
After a seventy-year ban, the Canadian city of Montreal began a pilot program in 2013 that permitted a limited number of food trucks back onto its streets. Such an experiment offers opportunities to re-evaluate the “traditional view” that food trucks are part of an informal economy in which new arrivals to a city can create jobs for themselves, and the contrary positions that newer “foodie” food trucks have either opened a “breach” with that informal economy by catering only to the more affluent, or offer instead a “bridgehead” by bringing newer cuisines to the street where everyone can experience them. This paper explores the merits of these viewpoints through analysis of the long-running debate over Montreal’s ban on food trucks; the pilot program’s regulations permitting such trucks back into the city; a survey of the goals of the trucks’ operators; and, fourthly, an analysis of customer reviews on the social media site Yelp. This evaluation concludes that Montreal’s food truck experiment should not be interpreted as either a “breach” or a “bridgehead” – rather, it represents the use of food trucks as a pawn (or “Trojan horse”), in a much larger strategy by city planners to promote Montreal through “place branding”.
APA, Harvard, Vancouver, ISO, and other styles
5

McFate, Montgomery. "Jomo Kenyatta, Louis Leakey, and the Counter-Insurgency System." In Military Anthropology, 239–78. Oxford University Press, 2018. http://dx.doi.org/10.1093/oso/9780190680176.003.0007.

Full text
Abstract:
Jomo Kenyatta, who held a PhD in Anthropology from the London School of Economics, became the first president of Kenya. Kenyatta successfully employed his knowledge of anthropology – the so-called ‘handmaiden of colonialism’ – against a colonial regime, using that knowledge to pinpoint British political weaknesses, unify the Kikuyu and other tribes of Kenya, and construct an ethnographic Trojan Horse that undermined the British edifice upon which colonial law had been built. On the other side, the British counterinsurgency against the Mau Mau also utilized anthropology, both in theory and in practice. As this chapter describes, Louis Leakey’s conceptualization of Kikuyu culture influenced how the British fought the war and demonstrates how elements of the host nation culture – in this case, the Kikuyu practice of oathing and counter-oathing – may be employed in a security strategy. In this intersection of two lives – Jomo Kenyatta and Louis Leakey – many of the themes of this book become apparent, including the danger of fantasy ideologies, the limits of anthropological knowledge, and the asymmetry of cultural knowledge.
APA, Harvard, Vancouver, ISO, and other styles
6

Rowe, Neil C. "The Ethics of Deception in Cyberspace." In Handbook of Research on Technoethics, 529–41. IGI Global, 2009. http://dx.doi.org/10.4018/978-1-60566-022-6.ch034.

Full text
Abstract:
We examine the main ethical issues concerning deception in cyberspace. We first discuss the concept of deception and survey ethical theories applicable to cyberspace. We then examine deception for commercial gain such as spam, phishing, spyware, deceptive commercial software, and dishonest games. We next examine deception used in attacks on computer systems, including identity deception, Trojan horses, denial of service, eavesdropping, record manipulation, and social engineering. We then consider several types of deception for defensive purposes, less well known, including honeypots, honeytokens, defensive obstructionism, false excuses, deceptive intelligence collection, and strategic deception. In each case we assess the ethical issues pro and con for the use of deception. We argue that sometimes deception in cyberspace is unethical and sometimes it is ethical.
APA, Harvard, Vancouver, ISO, and other styles
7

Hayashi, Brian Masaru. "Introduction." In Asian American Spies, 9–16. Oxford University Press, 2021. http://dx.doi.org/10.1093/oso/9780195338850.003.0002.

Full text
Abstract:
The OSS did not use race in their recruitment of Asian Americans. Instead, they used loyalty to determine which Asian American with the necessary linguistic and cultural skills could join the agency. But to understand why the OSS leaders took the risk in bringing in a potential Asian American Trojan Horse one must see race and loyalty as not fixed but fluid social constructions. Using a wide variety of sources scattered across the globe, this chapter shows that Asian Americans had broken through racial barriers as they were tasked with gathering, translating, and analyzing intelligence data, creating propaganda pamphlets and radio programs, conducting hit-and-run operations miles behind enemy lines, and hunting for enemy spies behind Allied lines. Their roles, salaries, and military rank all point to how rapidly loyalty and not race became the primary determinant of employment with and treatment in the Office of Strategic Services during World War II.
APA, Harvard, Vancouver, ISO, and other styles
8

Myers, Tobias. "‘Many Contests of the Trojans and Achaeans’: The Iliad’s Battle Books." In Homer's Divine Audience, 141–78. Oxford University Press, 2019. http://dx.doi.org/10.1093/oso/9780198842354.003.0004.

Full text
Abstract:
Chapter 4 charts the continued use of the divine perspective to shape and reflect upon the dynamics of performance between Books 8 and 22. In these books, Homer continues to draw on the duel, daïs, and funerary paradigms to construct the battlefield contests as a live event commanding audience participation. The chapter’s first section examines patterns of divine and poetic ‘staging’, to demonstrate that the next three days of battle (in Books 8, 11–18, and 19–22 respectively), like the first day’s battle, are not only viewed from Zeus’ house on Olympus, but also closely patterned on the formal duel. The second section considers the significance of this strategy for the listening audience whom the poet is attempting to engage: they are invited to participate vicariously in the fighting, and also to reflect on their responses to the figure pulling the strings. The chapter’s third section focuses on the poet’s use of Zeus, primarily, to develop a perspective from which the contests trigger associations with funerary ritual. The chapter concludes with a metaperformative reading of the theomachia (‘battle of the gods’): the theomachia draws in new ways on both the duel and daïs paradigms, to present a provocative dramatization of poet-audience dynamics.
APA, Harvard, Vancouver, ISO, and other styles

Conference papers on the topic "Trojan horse strategy"

1

ZENG, GUIHUA. "TROJAN HORSE ATTACKING STRATEGY ON QUANTUM CRYPTOGRAPHY." In Proceedings of the XXII Solvay Conference on Physics. WORLD SCIENTIFIC, 2003. http://dx.doi.org/10.1142/9789812704634_0032.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Loupias, Pauline, Alexandra Dassonville-Klimpt, Elodie Lohou, Nicolas Taudon, and Pascal Sonnet. "Trojan horse strategy: synthesis of piperazine-based siderophores." In 4th International Electronic Conference on Medicinal Chemistry. Basel, Switzerland: MDPI, 2018. http://dx.doi.org/10.3390/ecmc-4-05579.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Sur, Surojit, Julius Chapiro, Lynn J. Savic, Ganapathy S. Kaniappan, Juvenal Reyes, Raphael Duran, Sivarajan C. Thiruganasambandam, et al. "Abstract NG06: The Trojan Horse Strategy: Packaging chemotherapeutics can help alleviate toxicity." In Proceedings: AACR 106th Annual Meeting 2015; April 18-22, 2015; Philadelphia, PA. American Association for Cancer Research, 2015. http://dx.doi.org/10.1158/1538-7445.am2015-ng06.

Full text
APA, Harvard, Vancouver, ISO, and other styles
We offer discounts on all premium plans for authors whose works are included in thematic literature selections. Contact us to get a unique promo code!

To the bibliography