Pathogenic Attacks on Host Plants Examined

نویسندگان

چکیده

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Detecting Cyber Attacks On Nuclear Power Plants

This paper proposes an unconventional anomaly detection approach that provides digital instrumentation and control (I&C) systems in a nuclear power plant (NPP) with the capability to probabilistically discern between legitimate protocol frames and attack frames. The stochastic activity network (SAN) formalism is used to model the fusion of protocol activity in each digital I&C system and the op...

متن کامل

Sympatric genetic differentiation of a generalist pathogenic fungus, Botrytis cinerea, on two different host plants, grapevine and bramble.

Prime candidates for sympatric ecological divergence include parasites that differentiate via host shifts, because different host species exert strong disruptive selection and because both hosts and parasites are continually co-evolving. Sympatric divergence may be fostered even more strongly in phytopathogenic fungi, in particular those where sex must occur on the host, which allows adaptation...

متن کامل

antimicrobial effects of medicinal plants collected in zabol, iran, on pathogenic food pathogenic bacteria

background :  a large number of plants are used for treatment of diseases because of their antimicrobial activities. this study aims to investigate the antimicrobial effects of some plants on the food pathogenic bacteria.   methods : plant extracts were obtained using the rotary system, the minimum inhibitory concentration (mic) by diluting method against bacteria was determined.   results :   ...

متن کامل

Host plasma proteins on the surface of pathogenic Trichomonas vaginalis.

Sodium dodecyl sulfate-gel electrophoresis and fluorography and fluorography technology revealed that pathogenic Trichomonas vaginalis was able to acquire numerous loosely associated plasma proteins during incubation in normal human plasma. These proteins were readily removed by repeated washing of the parasite in phosphate-buffered saline. Plasma proteins avidly bound to the surface of T. vagi...

متن کامل

Web-based Attacks on Host-Proof Encrypted Storage

Cloud-based storage services, such as Wuala, and password managers, such as LastPass, are examples of socalled host-proof web applications that aim to protect users from attacks on the servers that host their data. To this end, user data is encrypted on the client and the server is used only as a backup data store. Authorized users may access their data through client-side software, but for eas...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

ژورنال

عنوان ژورنال: Journal of Plant Sciences

سال: 2010

ISSN: 1816-4951

DOI: 10.3923/jps.2011.48.48