-
1
-
2
The “Trojan Horse” Approach to Tumor Immunotherapy: Targeting the Tumor Microenvironment
Published 2014-01-01“…Most anticancer therapies including immunotherapies are given systemically; yet therapies given directly into tumors may be more effective, particularly those that overcome natural suppressive factors in the tumor microenvironment. The “Trojan Horse” approach of intratumoural delivery aims to promote immune-mediated destruction by inducing microenvironmental changes within the tumour at the same time as avoiding the systemic toxicity that is often associated with more “full frontal” treatments such as transfer of large numbers of laboratory-expanded tumor-specific cytotoxic T lymphocytes or large intravenous doses of cytokine. …”
Get full text
Article -
3
Human parietal epithelial cells as Trojan horses in albumin overload
Published 2025-01-01Get full text
Article -
4
Trojan Horses and Friendly Faces: Irish Gaelic Typography as Propaganda
Published 2005-01-01Get full text
Article -
5
Endoscopic Vein Harvesting for Coronary Bypass Grafting: A Blessing or a Trojan Horse?
Published 2011-01-01Get full text
Article -
6
Multicast communication protocol based on quantum key distribution against trojan horse attacking
Published 2014-07-01Subjects: Get full text
Article -
7
Research on Clue Mining in Criminal Cases of Smart Phone Trojan Horse under the Background of Information Security
Published 2022-01-01“…At the same time, the basic principles and implementation methods of mobile phone Trojan horse hiding are also studied. Through the research of the broadcast receiver model of the Android platform, the background monitoring principle and implementation technology of the mobile phone Trojan horse are analyzed, and the theoretical foundation and technical support are provided for the implementation of the Trojan horse background monitoring program in this article. …”
Get full text
Article -
8
Trojan-horse silk fibroin nanocarriers loaded with a re-call antigen to redirect immunity against cancer
Published 2023-01-01“…Since tumor immune escape mechanisms do not impact pre-existing and consolidated immune responses, we tested the hypothesis of redirecting a pregenerated immunity to cancer: to recall a non-tumor antigen response against the tumor, silk fibroin nanoparticles (SFNs) have been selected as ‘Trojan-horse’ carriers, promoting the antigen uptake by the tumor cells.Methods SFNs have been loaded with either ovalbumin (OVA) or CpG oligonucleotide (CpG) as antigen or adjuvant, respectively. …”
Get full text
Article -
9
Defense of hidden backdoor technology for Web
Published 2020-05-01“…Rootkit is a set of persistent and undetectable attack technologies,which can hide their attack behavior and backdoor trace by modifying software or kernel in operating system and changing execution path of instruction.Firstly,the basic definition and evolution of Rootkit were introduced,then the operating principle,current mainstream technology and detection methods of Rootkit were discussed.Then,through comparative experiments on performance and security,the application of mimic defense system was described for Web based on dynamic,heterogeneous,redundant structure under Trojan Horse attack.Experiments show that mimic defense system can effectively defend against Trojan Horse in tests in the premise of low overhead.At last,the opportunities and challenges of the DHR system were summarized.…”
Get full text
Article -
10
A novel Alteromonas phage with tail fiber containing six potential iron-binding domains
Published 2025-01-01“…This finding provides further insights into the Trojan Horse hypothesis, suggesting that alterophages may act as natural iron-binding ligands in the marine environment.…”
Get full text
Article -
11
The Theatre of Revolution Transforms Spectators into Political Actors: Performance as Political Engagement in the Transnational Counterculture
Published 2019-12-01“…From the San Francisco Diggers, the theory and techniques of transforming passive spectators into political life actors were carried to England though the pages of popular reporting on the counterculture. Like a Trojan horse in popular culture, these techniques for activism were smuggled under what appeared to be a passive, voyeuristic gaze upon youth culture. …”
Get full text
Article -
12
Dynamic hierarchical quantum secret sharing protocol based on high-dimensional GHZ state
Published 2024-10-01“…In addition, security analysis results showed that the proposed protocol could resist intercept-and-resend attack, measure-and-resend attack, entangle-and-measure attack, Trojan horse attack, as well as collusion attacks from internal participants.…”
Get full text
Article -
13
Escherichia coli growing under antimicrobial gallium nitrate stress reveals new processes of tolerance and toxicity
Published 2025-01-01“…Although its main toxicity mechanisms have focused on oxidative stress and its “trojan horse” iron mimetic strategy, there are still many knowledge gaps in the full-systems response elicited to counteract its toxic effects, especially in non-acute toxicity models that evaluate longer exposure times. …”
Get full text
Article -
14
Persistence of Brucella abortus in the Bone Marrow of Infected Mice
Published 2018-01-01“…We propose that the BM is an essential niche for the bacterium to establish long-lasting infections and that infected PMNs may serve as vehicles for dispersion of Brucella organisms, following the Trojan horse hypothesis. Monocytes are solid candidates for Brucella reservoirs in the BM.…”
Get full text
Article -
15
Ethno-cultural particularity of English, French and Russian phrasiological units with components of names of domestic animals
Published 2018-12-01“…The conclusion is made that in these three languages universal meanings are set expressions with the components of «horse» (Trojan Horse, carthorse) and «cow» (milk cow), and that the comparative analysis of P.U. demonstrates difference in linguistic pictures of the world and sheds light on ethnic logic…”
Get full text
Article -
16
Synergistic effects of PS-NPs and Cd on ovarian toxicity in adolescent rats: Ferroptosis by induction of mitochondrial redox imbalance via the SIRT3-SOD2/Gpx4 pathway
Published 2025-01-01“…They can act as a“Trojan horse” to change the bioavailability and toxicity of heavy metals in the environment. …”
Get full text
Article -
17
Stochastic Stabilization of Malware Propagation in Wireless Sensor Network via Aperiodically Intermittent White Noise
Published 2020-01-01“…In this paper, we propose a novel heterogeneous model to describe the propagation dynamics of malware (viruses, worms, Trojan horses, etc.) in wireless sensor networks. Our model takes into consideration different battery-level sensor nodes contrary to existing models. …”
Get full text
Article -
18
Receptor-Mediated Endocytosis and Brain Delivery of Therapeutic Biologics
Published 2013-01-01“…This review is focused on the current knowledge of receptor-mediated endocytosis/transcytosis and brain delivery using the Angiopep-2-conjugated system and the molecular Trojan horses. In addition, the role of neonatal Fc receptor (FcRn) in regulating the efflux of Immunoglobulin G (IgG) from brain to blood, and approaches to improve the pharmacokinetics of therapeutic biologics by generating Fc fusion proteins, and increasing the pH dependent binding affinity between Fc and FcRn, are discussed.…”
Get full text
Article -
19
Urinary bacteriophage cooperation with bacterial pathogens during human urinary tract infections supports lysogenic phage therapy
Published 2025-02-01“…These findings support the use of lysogenic phages as therapeutic Trojan Horses.…”
Get full text
Article