Results 41 to 50 of about 156,609 (316)
Infection Models for Pine Wilt Disease on the Basis of Vector Behaviors
Infection models for pine wilt disease without vector density were built to estimate the transmission coefficient of the pathogenic nematode. The models successfully simulated the annual change in the density of infected trees for four pine stands. ABSTRACT Pine wilt disease is caused by the pinewood nematode (Bursaphelenchus xylophilus Steiner et ...
Katsumi Togashi
wiley +1 more source
Interaction extracellular vesicles (iEVs) are hybrid vesicles formed through host‐pathogen communication. They facilitate immune evasion, transfer pathogens' molecules, increase host cell uptake, and enhance virulence. This Perspective article illustrates the multifunctional roles of iEVs and highlights their emerging relevance in infection dynamics ...
Bruna Sabatke+2 more
wiley +1 more source
IOT-Based Farmland Intrusion Detection System
As crop vandalization with conflicts between farmers and herdsmen become recurrent in Nigeria, existing farm intrusion prevention methods such as fence mounting and placement of farm guards can no longer guarantee farm security. This is because intruders
Emmanuel Ibam+2 more
doaj +1 more source
Rapid Prototyping of Intrusion Detection Systems [PDF]
Designing security softwares that evolve as quickly as threats is a truthful challenge. In addition, current software becomes increasingly more complex and difficult to handle even for security experts. Intrusion Detection Softwares (IDS) represent a solution that can alleviate these concerns.
Kordon, Fabrice+2 more
openaire +2 more sources
A stepwise emergence of evolution in the RNA world
How did biological evolution emerge from chemical reactions? This perspective proposes a gradual scenario of self‐organization among RNA molecules, where catalytic feedback on random mixtures plays the central role. Short oligomers cross‐ligate, and self‐assembly enables heritable variations. An event of template‐externalization marks the transition to
Philippe Nghe
wiley +1 more source
INTRUSION DETECTION SYSTEMS IN A HETEROGENOUS NETWORK ENVIRONMENT [PDF]
This paper deals with a design and implementation of an intrusion detection system in heterogeneous network environment. The work includes work out characteristics of Intrusion detection systems, it`s base classification, development of problematic ...
Martin ŠTANCEL+2 more
doaj +1 more source
A consensus based network intrusion detection system
Network intrusion detection is the process of identifying malicious behaviors that target a network and its resources. Current systems implementing intrusion detection processes observe traffic at several data collecting points in the network but ...
Curtis, Philip+2 more
core +1 more source
An overview of recent advances in intrusion detection [PDF]
The intrusion detection system is one of the security defense tools for computer networks. In recent years this research has lacked in direction and focus.
Cornforth, David+2 more
core +1 more source
Evolutionary interplay between viruses and R‐loops
Viruses interact with specialized nucleic acid structures called R‐loops to influence host transcription, epigenetic states, latency, and immune evasion. This Perspective examines the roles of R‐loops in viral replication, integration, and silencing, and how viruses co‐opt or avoid these structures.
Zsolt Karányi+4 more
wiley +1 more source
An overview to Software Architecture in Intrusion Detection System [PDF]
Today by growing network systems, security is a key feature of each network infrastructure. Network Intrusion Detection Systems (IDS) provide defense model for all security threats which are harmful to any network.
Bahrami, Mehdi, Bahrami, Mohammad
core +1 more source