When defense turns into attack
نویسندگان
چکیده
The APOBEC3 cytidine deaminases play an important role in innate immunity but have also emerged as mediators of somatic mutations in human cancer. We recently reported a high incidence of APOBEC-mediated driver mutations in human papillomavirus-associated cancer, suggesting a key role for these enzymes in the development of such tumors.
منابع مشابه
Spectrum Sensing Data Falsification Attack in Cognitive Radio Networks: An Analytical Model for Evaluation and Mitigation of Performance Degradation
Cognitive Radio (CR) networks enable dynamic spectrum access and can significantly improve spectral efficiency. Cooperative Spectrum Sensing (CSS) exploits the spatial diversity between CR users to increase sensing accuracy. However, in a realistic scenario, the trustworthy of CSS is vulnerable to Spectrum Sensing Data Falsification (SSDF) attack. In an SSDF attack, some malicious CR users deli...
متن کاملMobile Cloud Computing Network Attack and Defense Learning System Based on Fuzzy Soft Sets
In this paper, we propose a new decision-making system ranking method for the virtual machine startup problems by introducing the concept of fuzzy soft sets. Then this method is used for virtual machine management by AMCCM way. It turns the management of a network attack and defense learning system from semi-automatic to fully automatic. Based on the functional and structural design of mobile c...
متن کاملA Review of Intrusion Detection Defense Solutions Based on Software Defined Network
Most networks without fixed infrastructure are based on cloud computing face various challenges. In recent years, different methods have been used to distribute software defined network to address these challenges. This technology, while having many capabilities, faces some vulnerabilities in the face of some common threats and destructive factors such as distributed Denial of Service. A review...
متن کاملEvaluation of Attributes on Attack–Defense Trees
Consequently, an ADTree has nodes of two opposite types: attack nodes and defense nodes. The root of an ADTree represents the main goal of the attacker. Every node of an ADTree may have one or more children of the same type representing a refinement into sub-goals of the node’s goal. The refinement of a node can be either disjunctive or conjunctive. The goal of a disjunctively refined node is a...
متن کاملAttack-Defense Trees and Two-Player Binary Zero-Sum Extensive Form Games Are Equivalent
Attack–defense trees are used to describe security weaknesses of a system and possible countermeasures. In this paper, the connection between attack–defense trees and game theory is made explicit. We show that attack–defense trees and binary zero-sum two-player extensive form games have equivalent expressive power when considering satisfiability, in the sense that they can be converted into eac...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
عنوان ژورنال:
دوره 1 شماره
صفحات -
تاریخ انتشار 2014