نتایج جستجو برای: hijack
تعداد نتایج: 677 فیلتر نتایج به سال:
Unconventional Use of LC3 by Coronaviruses through the Alleged Subversion of the ERAD Tuning Pathway
Pathogens of bacterial and viral origin hijack pathways operating in eukaryotic cells in many ways in order to gain access into the host, to establish themselves and to eventually produce their progeny. The detailed molecular characterization of the subversion mechanisms devised by pathogens to infect host cells is crucial to generate targets for therapeutic intervention. Here we review recent ...
Since IP Prefix Hijacking is a major threat for every Autonomous System in the Internet, this paper tries to give an understanding of IP prefix hijacking and some of their detection methods. This may rise attention and awareness for that topic among the readers. If a malicious attacker would hijack an IP and use it for committing serious crimes, the original owner of the IP address would eventu...
The sensing of stress signals and their transduction into appropriate responses is crucial for the adaptation and survival of plants. Kinase cascades of the mitogen-activated protein kinase (MAPK) class play a remarkably important role in plant signalling of a variety of abiotic and biotic stresses. MAPK cascade-mediated signalling is an essential step in the establishment of resistance to path...
The nuclear pore complex (NPC) acts as a selective barrier between the nucleus and the cytoplasm and is responsible for mediating communication by regulating the transport of RNA and proteins. Numerous viral pathogens have evolved different mechanisms to hijack the NPC in order to regulate trafficking of viral proteins, genomes and even capsids into and out of the nucleus thus promoting virus r...
This paper describes a pair of virtual Supervisory Control and Data Acquisition (SCADA) systems. These virtual simulations were built using virtual devices that simulate industrial processes, emulate control system ladder logic functionality, utilize control system communication protocols, and implement industrial Human Machine Interfaces (HMI). The first of these focuses on a comprehensive vir...
As obligate intracellular parasites, viruses need to hijack their cellular hosts and reprogram their machineries in order to replicate their genomes and produce new virions. For the direct visualization of the different steps of a viral life cycle (attachment, entry, replication, assembly and egress) electron microscopy (EM) methods are extremely helpful. While conventional EM has given importa...
Cable networks are complex systems that have evolved over years and in which new features like Internet access and Voice over IP (VoIP) have been integrated. We argue that threat models must evolve together with such systems and show that inadequate threat models can be used to explain known and unknown vulnerabilities in today’s cable networks. We do this by demonstating an attack on the DOCSI...
نمودار تعداد نتایج جستجو در هر سال
با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید