Reviving the attack against HIV
نویسنده
چکیده
local autoreactive T cells that had previously ignored epithelial self-antigens. IFNand RbAp48 were also found in epithelial cells of patients with Sjögren’s syndrome. Professional APCs seem to be required to start or maintain autoimmunity when estrogen levels are normal, as transferring T cells from transgenic lymph nodes into nontransgenic mice initiated gland cell destruction only if APCs were included. But epithelial cells may be selfsufficient APCs in the absence of estrogen; T cells from the transgenic mice were enough to cause disease in mice whose ovaries had been removed. NL
منابع مشابه
Spectrum Sensing Data Falsification Attack in Cognitive Radio Networks: An Analytical Model for Evaluation and Mitigation of Performance Degradation
Cognitive Radio (CR) networks enable dynamic spectrum access and can significantly improve spectral efficiency. Cooperative Spectrum Sensing (CSS) exploits the spatial diversity between CR users to increase sensing accuracy. However, in a realistic scenario, the trustworthy of CSS is vulnerable to Spectrum Sensing Data Falsification (SSDF) attack. In an SSDF attack, some malicious CR users deli...
متن کاملAnalysis and Improving the Security of the Scalar Costa Scheme against Known Message Attack
Unintentional attacks on watermarking schemes lead to degrade the watermarking channel, while intentional attacks try to access the watermarking channel. Therefore, watermarking schemes should be robust and secure against unintentional and intentional attacks respectively. Usual security attack on watermarking schemes is the Known Message Attack (KMA). Most popular watermarking scheme with stru...
متن کاملCyber Threats Foresight Against Iran Based on Attack Vector
Cyber threats have been extraordinary increased in recent years. Cyber attackers, including government agencies or hackers, have made significant advances in the use of various tools for attacking target systems in some countries particularly on Islamic republic of Iran. The complexity of cyber threats and the devastating effects of them on critical systems highlights necessity of cyber thr...
متن کاملA Shot at Dendritic Cell-Based Vaccine Strategy against HIV-1
Introduction: Despite considerable efforts to control AIDS pandemic, it is still one of the significant infectious concerns worldwide. The advance in medical research has led to the development of highly active antiretroviral therapy with a considerable effect to suppress the disease. However, an effective vaccine capable of eradication the HIV pandemic is not available yet. Failure to develop ...
متن کاملRandom Key Pre-Distribution Techniques against Sybil Attacks
Sybil attacks pose a serious threat for Wireless Sensor Networks (WSN) security. They can create problems in routing, voting schemes, decision making, distributed storage and sensor re-programming. In a Sybil attack, the attacker masquerades as multiple sensor identities that are actually controlled by one or a few existing attacker nodes. Sybil identities are fabricated out of stolen keys, obt...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
عنوان ژورنال:
- The Journal of Experimental Medicine
دوره 205 شماره
صفحات -
تاریخ انتشار 2008