Showing 1 - 19 results of 19 for search '"Trojan Horse"', query time: 0.06s Refine Results
  1. 1
  2. 2

    The “Trojan Horse” Approach to Tumor Immunotherapy: Targeting the Tumor Microenvironment by Delia Nelson, Scott Fisher, Bruce Robinson

    Published 2014-01-01
    “…Most anticancer therapies including immunotherapies are given systemically; yet therapies given directly into tumors may be more effective, particularly those that overcome natural suppressive factors in the tumor microenvironment. The “Trojan Horse” approach of intratumoural delivery aims to promote immune-mediated destruction by inducing microenvironmental changes within the tumour at the same time as avoiding the systemic toxicity that is often associated with more “full frontal” treatments such as transfer of large numbers of laboratory-expanded tumor-specific cytotoxic T lymphocytes or large intravenous doses of cytokine. …”
    Get full text
    Article
  3. 3
  4. 4
  5. 5
  6. 6
  7. 7

    Research on Clue Mining in Criminal Cases of Smart Phone Trojan Horse under the Background of Information Security by Li Gang, Yong Wen

    Published 2022-01-01
    “…At the same time, the basic principles and implementation methods of mobile phone Trojan horse hiding are also studied. Through the research of the broadcast receiver model of the Android platform, the background monitoring principle and implementation technology of the mobile phone Trojan horse are analyzed, and the theoretical foundation and technical support are provided for the implementation of the Trojan horse background monitoring program in this article. …”
    Get full text
    Article
  8. 8

    Trojan-horse silk fibroin nanocarriers loaded with a re-call antigen to redirect immunity against cancer by Luca Mastracci, Patrizio Castagnola, Elia Bari, Francesca Ferrera, Tiziana Altosole, Sara Perteghella, Pierluigi Mauri, Rossana Rossi, Giulia Passignani, Martina Galati, Giuseppina Iliana Astone, Maddalena Mastrogiacomo, Daniela Fenoglio, Dario Di Silvestre, Maria Luisa Torre, Gilberto Filaci

    Published 2023-01-01
    “…Since tumor immune escape mechanisms do not impact pre-existing and consolidated immune responses, we tested the hypothesis of redirecting a pregenerated immunity to cancer: to recall a non-tumor antigen response against the tumor, silk fibroin nanoparticles (SFNs) have been selected as ‘Trojan-horse’ carriers, promoting the antigen uptake by the tumor cells.Methods SFNs have been loaded with either ovalbumin (OVA) or CpG oligonucleotide (CpG) as antigen or adjuvant, respectively. …”
    Get full text
    Article
  9. 9

    Defense of hidden backdoor technology for Web by Liyue CHEN, Xin SUN, Tiansheng CHENG, Chunming WU, Shuangxi CHEN

    Published 2020-05-01
    “…Rootkit is a set of persistent and undetectable attack technologies,which can hide their attack behavior and backdoor trace by modifying software or kernel in operating system and changing execution path of instruction.Firstly,the basic definition and evolution of Rootkit were introduced,then the operating principle,current mainstream technology and detection methods of Rootkit were discussed.Then,through comparative experiments on performance and security,the application of mimic defense system was described for Web based on dynamic,heterogeneous,redundant structure under Trojan Horse attack.Experiments show that mimic defense system can effectively defend against Trojan Horse in tests in the premise of low overhead.At last,the opportunities and challenges of the DHR system were summarized.…”
    Get full text
    Article
  10. 10

    A novel Alteromonas phage with tail fiber containing six potential iron-binding domains by Chen Yu, Meishun Yu, Ruijie Ma, Shuzhen Wei, Min Jin, Nianzhi Jiao, Qiang Zheng, Rui Zhang, Xuejin Feng

    Published 2025-01-01
    “…This finding provides further insights into the Trojan Horse hypothesis, suggesting that alterophages may act as natural iron-binding ligands in the marine environment.…”
    Get full text
    Article
  11. 11

    The Theatre of Revolution Transforms Spectators into Political Actors: Performance as Political Engagement in the Transnational Counterculture by Andrew Hannon

    Published 2019-12-01
    “…From the San Francisco Diggers, the theory and techniques of transforming passive spectators into political life actors were carried to England though the pages of popular reporting on the counterculture. Like a Trojan horse in popular culture, these techniques for activism were smuggled under what appeared to be a passive, voyeuristic gaze upon youth culture. …”
    Get full text
    Article
  12. 12

    Dynamic hierarchical quantum secret sharing protocol based on high-dimensional GHZ state by CHEN Keqin, ZOU Zheng, CAI Binbin, LIN Song

    Published 2024-10-01
    “…In addition, security analysis results showed that the proposed protocol could resist intercept-and-resend attack, measure-and-resend attack, entangle-and-measure attack, Trojan horse attack, as well as collusion attacks from internal participants.…”
    Get full text
    Article
  13. 13

    Escherichia coli growing under antimicrobial gallium nitrate stress reveals new processes of tolerance and toxicity by Daniel A. Salazar-Alemán, Raymond J. Turner

    Published 2025-01-01
    “…Although its main toxicity mechanisms have focused on oxidative stress and its “trojan horse” iron mimetic strategy, there are still many knowledge gaps in the full-systems response elicited to counteract its toxic effects, especially in non-acute toxicity models that evaluate longer exposure times. …”
    Get full text
    Article
  14. 14

    Persistence of Brucella abortus in the Bone Marrow of Infected Mice by Cristina Gutiérrez-Jiménez, Lisiena Hysenaj, Alejandro Alfaro-Alarcón, Ricardo Mora-Cartín, Vilma Arce-Gorvel, Edgardo Moreno, Jean Pierre Gorvel, Elías Barquero-Calvo

    Published 2018-01-01
    “…We propose that the BM is an essential niche for the bacterium to establish long-lasting infections and that infected PMNs may serve as vehicles for dispersion of Brucella organisms, following the Trojan horse hypothesis. Monocytes are solid candidates for Brucella reservoirs in the BM.…”
    Get full text
    Article
  15. 15

    Ethno-cultural particularity of English, French and Russian phrasiological units with components of names of domestic animals by E. N. Belaya

    Published 2018-12-01
    “…The conclusion is made that in these three languages universal meanings are set expressions with the components of «horse» (Trojan Horse, carthorse) and «cow» (milk cow), and that the comparative analysis of P.U. demonstrates difference in linguistic pictures of the world and sheds light on ethnic logic…”
    Get full text
    Article
  16. 16

    Synergistic effects of PS-NPs and Cd on ovarian toxicity in adolescent rats: Ferroptosis by induction of mitochondrial redox imbalance via the SIRT3-SOD2/Gpx4 pathway by Hua Wu, Lihua Feng, Huang Wu, Lihong Wang, Hengyi Xu, Fen Fu

    Published 2025-01-01
    “…They can act as a“Trojan horse” to change the bioavailability and toxicity of heavy metals in the environment. …”
    Get full text
    Article
  17. 17

    Stochastic Stabilization of Malware Propagation in Wireless Sensor Network via Aperiodically Intermittent White Noise by Xiaojing Zhong, Baihao Peng, Feiqi Deng, Guiyun Liu

    Published 2020-01-01
    “…In this paper, we propose a novel heterogeneous model to describe the propagation dynamics of malware (viruses, worms, Trojan horses, etc.) in wireless sensor networks. Our model takes into consideration different battery-level sensor nodes contrary to existing models. …”
    Get full text
    Article
  18. 18

    Receptor-Mediated Endocytosis and Brain Delivery of Therapeutic Biologics by Guangqing Xiao, Liang-Shang Gan

    Published 2013-01-01
    “…This review is focused on the current knowledge of receptor-mediated endocytosis/transcytosis and brain delivery using the Angiopep-2-conjugated system and the molecular Trojan horses. In addition, the role of neonatal Fc receptor (FcRn) in regulating the efflux of Immunoglobulin G (IgG) from brain to blood, and approaches to improve the pharmacokinetics of therapeutic biologics by generating Fc fusion proteins, and increasing the pH dependent binding affinity between Fc and FcRn, are discussed.…”
    Get full text
    Article
  19. 19