期刊文献+
共找到20,414篇文章
< 1 2 250 >
每页显示 20 50 100
An Active Deception Defense Model Based on Address Mutation and Fingerprint Camouflage
1
作者 Wang Shuo Chu Jiang +3 位作者 Pei Qingqi Shao Feng Yuan Shuai Zhong Xiaoge 《China Communications》 SCIE CSCD 2024年第7期212-223,共12页
The static and predictable characteristics of cyber systems give attackers an asymmetric advantage in gathering useful information and launching attacks.To reverse this asymmetric advantage,a new defense idea,called M... The static and predictable characteristics of cyber systems give attackers an asymmetric advantage in gathering useful information and launching attacks.To reverse this asymmetric advantage,a new defense idea,called Moving Target Defense(MTD),has been proposed to provide additional selectable measures to complement traditional defense.However,MTD is unable to defeat the sophisticated attacker with fingerprint tracking ability.To overcome this limitation,we go one step beyond and show that the combination of MTD and Deception-based Cyber Defense(DCD)can achieve higher performance than either of them.In particular,we first introduce and formalize a novel attacker model named Scan and Foothold Attack(SFA)based on cyber kill chain.Afterwards,we develop probabilistic models for SFA defenses to provide a deeper analysis of the theoretical effect under different defense strategies.These models quantify attack success probability and the probability that the attacker will be deceived under various conditions,such as the size of address space,and the number of hosts,attack analysis time.Finally,the experimental results show that the actual defense effect of each strategy almost perfectly follows its probabilistic model.Also,the defense strategy of combining address mutation and fingerprint camouflage can achieve a better defense effect than the single address mutation. 展开更多
关键词 address mutation deception defense fingerprint camouflage moving target defense probabilistic model
下载PDF
Plant Chemical Defenses against Insect Herbivores—Using theWild Tobacco as a Model
2
作者 Guangwei Sun Xuanhao Zhang +4 位作者 Yi Liu Liguang Chai Daisong Liu Zhenguo Chen Shiyou Lü 《Phyton-International Journal of Experimental Botany》 SCIE 2024年第4期641-659,共19页
The Nicotiana genus, commonly known as tobacco, holds significant importance as a crucial economic crop. Confrontedwith an abundance of herbivorous insects that pose a substantial threat to yield, tobacco has develope... The Nicotiana genus, commonly known as tobacco, holds significant importance as a crucial economic crop. Confrontedwith an abundance of herbivorous insects that pose a substantial threat to yield, tobacco has developed adiverse and sophisticated array of mechanisms, establishing itself as a model of plant ecological defense. Thisreview provides a concise overview of the current understanding of tobacco’s defense strategies against herbivores.Direct defenses, exemplified by its well-known tactic of secreting the alkaloid nicotine, serve as a potent toxinagainst a broad spectrum of herbivorous pests. Moreover, in response to herbivore attacks, tobacco enhancesthe discharge of volatile compounds, harnessing an indirect strategy that attracts the predators of the herbivores.The delicate balance between defense and growth leads to the initiation of most defense strategies only after aherbivore attack. Among plant hormones, notably jasmonic acid (JA), play central roles in coordinating thesedefense processes. JA signaling interacts with other plant hormone signaling pathways to facilitate the extensivetranscriptional and metabolic adjustments in plants following herbivore assault. By shedding light on these ecologicaldefense strategies, this review emphasizes not only tobacco’s remarkable adaptability in its natural habitatbut also offers insights beneficial for enhancing the resilience of current crops. 展开更多
关键词 TOBACCO HERBIVORE chemical defense jasmonic acid REGULATION
下载PDF
A shield of defense:Developing ballistic composite panels with effective electromagnetic interference shielding absorption
3
作者 Nisrin Rizek Abdelal 《Defence Technology(防务技术)》 SCIE EI CAS CSCD 2024年第5期123-136,共14页
The primary goal of this study is to develop cost-effective shield materials that offer effective protection against high-velocity ballistic impact and electromagnetic interference(EMI)shielding capabilities through a... The primary goal of this study is to develop cost-effective shield materials that offer effective protection against high-velocity ballistic impact and electromagnetic interference(EMI)shielding capabilities through absorption.Six fiber-reinforced epoxy composite panels,each with a different fabric material and stacking sequence,have been fabricated using a hand-layup vacuum bagging process.Two panels made of Kevlar and glass fibers,referred to as(K-NIJ)and(G-NIJ),have been tested according to the National Institute of Justice ballistic resistance protective materials test NIJ 0108.01 Standard-Level IIIA(9 mm×19 mm FMJ 124 g)test.Three panels,namely,a hybrid of Kevlar and glass(H-S),glass with ceramic particles(C-S),and glass with recycled rubber(R-S)have been impacted by the bullet at the center,while the fourth panel made of glass fiber(G-S)has been impacted at the side.EMI shielding properties have been measured in the X-band frequency range via the reflection-transmission method.Results indicate that four panels(K-NIJ,G-NIJ,H-S,and G-S)are capable of withstanding high-velocity impact by stopping the bullet from penetrating through the panels while maintaining their structural integrity.However,under such conditions,these panels may experience localized delamination with variable severity.The EMI measurements reveal that the highest absorptivity observed is 88% for the KNIJ panel at 10.8 GHz,while all panels maintain an average absorptivity above 65%.All panels act as a lossy medium with a peak absorptivity at different frequencies,with K-NIJ and H-S panels demonstrating the highest absorptivity.In summary,the study results in the development of a novel,costeffective,multifunctional glass fiber epoxy composite that combines ballistic and electromagnetic interference shielding properties.The material has been developed using a simple manufacturing method and exhibits remarkable ballistic protection that outperforms Kevlar in terms of shielding efficiency;no bullet penetration or back face signature is observed,and it also demonstrates high EMI shielding absorption.Overall,the materials developed show great promise for various applications,including the military and defense. 展开更多
关键词 BALLISTIC FRP composite EMI shielding ABSORPTIVITY CT-SCAN NIJ test BULLET defense
下载PDF
Seasonal increase in nest defense,but not egg rejection,in a cuckoo host
4
作者 Bo Zhou Wei Liang 《Avian Research》 SCIE CSCD 2024年第1期50-54,共5页
The interactions between avian brood parasites and their hosts provide an informative and easy-to-handle system for studying coevolution.Avian brood parasitism reduces the reproductive success of hosts,and thus,hosts ... The interactions between avian brood parasites and their hosts provide an informative and easy-to-handle system for studying coevolution.Avian brood parasitism reduces the reproductive success of hosts,and thus,hosts have evolved anti-parasitic strategies,such as rejecting parasitic eggs and adopting aggressive nest defense strategies,to avoid the cost brought on by brood parasitism.To test whether host anti-parasitic strategies are adjusted with the risk of being parasitized when the breeding seasons of brood parasites and hosts are not synchronous,we conducted a field experiment assessing nest defense and egg recognition behaviors of the Isabelline Shrike(Lanius isabellinus),a host of the Common Cuckoo(Cuculus canorus).In the local area,the host Isabelline Shrike begins to breed in April,whereas the summer migratory Common Cuckoo migrates to the local area in May and begins to lay parasitic eggs.Results showed that nest defense behaviors of the Isabelline Shrike increases significantly after cuckoo arrival,showing higher aggressiveness to cuckoo dummies,with no significant difference in attack rates among cuckoo,sparrowhawk and dove dummies,but their egg rejection did not change significantly.These results imply that Isabelline Shrikes may adjust their nest defense behavior,but not egg rejection behavior,with seasonality. 展开更多
关键词 AGGRESSION Anti-parasite strategy Egg rejection Mismatch cuckoo parasitism Nest defense
下载PDF
Two intestinal microbiota-derived metabolites, deoxycholic acid and butyrate, synergize to enhance host defense peptide synthesis and alleviate necrotic enteritis
5
作者 Dohyung M.Kim Jing Liu +3 位作者 Melanie A.Whitmore Isabel Tobin Zijun Zhao Guolong Zhang 《Journal of Animal Science and Biotechnology》 SCIE CAS CSCD 2024年第3期1158-1172,共15页
Background Necrotic enteritis(NE)is a major enteric disease in poultry,yet effective mitigation strategies remain elusive.Deoxycholic acid(DCA)and butyrate,two major metabolites derived from the intestinal microbiota,... Background Necrotic enteritis(NE)is a major enteric disease in poultry,yet effective mitigation strategies remain elusive.Deoxycholic acid(DCA)and butyrate,two major metabolites derived from the intestinal microbiota,have independently been shown to induce host defense peptide(HDP)synthesis.However,the potential synergy between these two compounds remains unexplored.Methods To investigate the possible synergistic effect between DCA and butyrate in regulating HDP synthesis and barrier function,we treated chicken HD11 macrophage cells and jejunal explants with DCA and sodium butyrate(NaB),either individually or in combination,for 24 h.Subsequently,we performed RNA isolation and reverse transcrip-tion-quantitative PCR to analyze HDP genes as well as the major genes associated with barrier function.To further determine the synergy between DCA and NaB in enhancing NE resistance,we conducted two independent trials with Cobb broiler chicks.In each trial,the diet was supplemented with DCA or NaB on the day-of-hatch,followed by NE induction through sequential challenges with Eimeria maxima and Clostridium perfringens on d 10 and 14,respectively.We recorded animal mortality after infection and assessed intestinal lesions on d 17.The impact of DCA and NaB on the microbiota in the ileum and cecum was evaluated through bacterial 16S rRNA gene sequencing.Results We found that the combination of DCA and NaB synergistically induced multiple HDP genes in both chicken HD11 cells and jejunal explants.Additionally,the gene for claudin-1,a major tight junction protein,also exhibited synergistic induction in response to DCA and NaB.Furthermore,dietary supplementation with a combination of 0.75 g/kg DCA and 1 g/kg NaB led to a significant improvement in animal survival and a reduction in intestinal lesions compared to either compound alone in a chicken model of NE.Notably,the cecal microbiota of NE-infected chickens showed a marked decrease in SCFA-producing bacteria such as Bacteroides,Faecalibacterium,and Cuneatibacter,with lactobacilli becoming the most dominant species.However,supplementation with DCA and NaB largely restored the intestinal microbiota to healthy levels.Conclusions DCA synergizes with NaB to induce HDP and claudin-1 expression and enhance NE resistance,with potential for further development as cost-effective antibiotic alternatives. 展开更多
关键词 Bile acids Host defense peptides METABOLITES MICROBIOME Necrotic enteritis Short-chain fatty acids
下载PDF
Machine Learning Security Defense Algorithms Based on Metadata Correlation Features
6
作者 Ruchun Jia Jianwei Zhang Yi Lin 《Computers, Materials & Continua》 SCIE EI 2024年第2期2391-2418,共28页
With the popularization of the Internet and the development of technology,cyber threats are increasing day by day.Threats such as malware,hacking,and data breaches have had a serious impact on cybersecurity.The networ... With the popularization of the Internet and the development of technology,cyber threats are increasing day by day.Threats such as malware,hacking,and data breaches have had a serious impact on cybersecurity.The network security environment in the era of big data presents the characteristics of large amounts of data,high diversity,and high real-time requirements.Traditional security defense methods and tools have been unable to cope with the complex and changing network security threats.This paper proposes a machine-learning security defense algorithm based on metadata association features.Emphasize control over unauthorized users through privacy,integrity,and availability.The user model is established and the mapping between the user model and the metadata of the data source is generated.By analyzing the user model and its corresponding mapping relationship,the query of the user model can be decomposed into the query of various heterogeneous data sources,and the integration of heterogeneous data sources based on the metadata association characteristics can be realized.Define and classify customer information,automatically identify and perceive sensitive data,build a behavior audit and analysis platform,analyze user behavior trajectories,and complete the construction of a machine learning customer information security defense system.The experimental results show that when the data volume is 5×103 bit,the data storage integrity of the proposed method is 92%.The data accuracy is 98%,and the success rate of data intrusion is only 2.6%.It can be concluded that the data storage method in this paper is safe,the data accuracy is always at a high level,and the data disaster recovery performance is good.This method can effectively resist data intrusion and has high air traffic control security.It can not only detect all viruses in user data storage,but also realize integrated virus processing,and further optimize the security defense effect of user big data. 展开更多
关键词 Data-oriented architecture METADATA correlation features machine learning security defense data source integration
下载PDF
Adaptive Network Sustainability and Defense Based on Artificial Bees Colony Optimization Algorithm for Nature Inspired Cyber Security
7
作者 Chirag Ganguli Shishir Kumar Shandilya +1 位作者 Michal Gregus Oleh Basystiuk 《Computer Systems Science & Engineering》 2024年第3期739-758,共20页
Cyber Defense is becoming a major issue for every organization to keep business continuity intact.The presented paper explores the effectiveness of a meta-heuristic optimization algorithm-Artificial Bees Colony Algori... Cyber Defense is becoming a major issue for every organization to keep business continuity intact.The presented paper explores the effectiveness of a meta-heuristic optimization algorithm-Artificial Bees Colony Algorithm(ABC)as an Nature Inspired Cyber Security mechanism to achieve adaptive defense.It experiments on the Denial-Of-Service attack scenarios which involves limiting the traffic flow for each node.Businesses today have adapted their service distribution models to include the use of the Internet,allowing them to effectively manage and interact with their customer data.This shift has created an increased reliance on online services to store vast amounts of confidential customer data,meaning any disruption or outage of these services could be disastrous for the business,leaving them without the knowledge to serve their customers.Adversaries can exploit such an event to gain unauthorized access to the confidential data of the customers.The proposed algorithm utilizes an Adaptive Defense approach to continuously select nodes that could present characteristics of a probable malicious entity.For any changes in network parameters,the cluster of nodes is selected in the prepared solution set as a probable malicious node and the traffic rate with the ratio of packet delivery is managed with respect to the properties of normal nodes to deliver a disaster recovery plan for potential businesses. 展开更多
关键词 Artificial bee colonization adaptive defense cyber attack nature inspired cyber security cyber security cyber physical infrastructure
下载PDF
Effective Utilization of Government-Provided CTI by Small Businesses within the Defense Industrial Base
8
作者 Josiah Dykstra Lawrence A. Gordon +2 位作者 Martin P. Loeb Benjamin Wall Lei Zhou 《Journal of Information Security》 2024年第2期196-217,共22页
There are two broad objectives of the research reported in this paper. First, we assess whether government-provided cyber threat intelligence (CTI) is helpful in preventing, or responding to, cyber-attacks among small... There are two broad objectives of the research reported in this paper. First, we assess whether government-provided cyber threat intelligence (CTI) is helpful in preventing, or responding to, cyber-attacks among small businesses within the U.S. Defense Industrial Base (DIB). Second, we identify ways of improving the effectiveness of government-provided CTI to small businesses within the DIB. Based on a questionnaire-based survey, our findings suggest that government-provided CTI helps businesses within the DIB in preventing, or responding to, cyber-attacks providing a firm is familiar with the CTI. Unfortunately, a large percentage of small firms are not familiar with the government-provided CTI feeds and consequently are not utilizing the CTI. This latter situation is largely due to financial constraints confronting small businesses that prevent firms from having the wherewithal necessary to effectively utilize the government-provided CTI. However, we found a significant positive association between a firm’s familiarity with the government-provided CTI and whether a firm is being periodically reviewed by the Defense Counterintelligence and Security Agency (DCSA) or is compliant with the Cybersecurity Maturity Model Certification (CMMC) program. The findings from our study also show that the participating firms believe that external cyber threats are more likely to be the cause of a future cybersecurity breach than internal cybersecurity threats. Finally, our study found that the portion of the IT budget that small businesses within the DIB spend on cybersecurity-related activities is dependent on the perception that a firm would be the target of an external cyber-attack. 展开更多
关键词 Government-Provided CTI Small Businesses defense Industrial Base
下载PDF
Beyond Defense: Proactive Approaches to Disaster Recovery and Threat Intelligence in Modern Enterprises
9
作者 Meysam Tahmasebi 《Journal of Information Security》 2024年第2期106-133,共28页
As cyber threats keep changing and business environments adapt, a comprehensive approach to disaster recovery involves more than just defensive measures. This research delves deep into the strategies required to respo... As cyber threats keep changing and business environments adapt, a comprehensive approach to disaster recovery involves more than just defensive measures. This research delves deep into the strategies required to respond to threats and anticipate and mitigate them proactively. Beginning with understanding the critical need for a layered defense and the intricacies of the attacker’s journey, the research offers insights into specialized defense techniques, emphasizing the importance of timely and strategic responses during incidents. Risk management is brought to the forefront, underscoring businesses’ need to adopt mature risk assessment practices and understand the potential risk impact areas. Additionally, the value of threat intelligence is explored, shedding light on the importance of active engagement within sharing communities and the vigilant observation of adversary motivations. “Beyond Defense: Proactive Approaches to Disaster Recovery and Threat Intelligence in Modern Enterprises” is a comprehensive guide for organizations aiming to fortify their cybersecurity posture, marrying best practices in proactive and reactive measures in the ever-challenging digital realm. 展开更多
关键词 Advanced Persistent Threats (APT) Attack Phases Attack Surface defense-IN-DEPTH Disaster Recovery (DR) Incident Response Plan (IRP) Intrusion Detection Systems (IDS) Intrusion Prevention System (IPS) Key Risk Indicator (KRI) Layered defense Lockheed Martin Kill Chain Proactive defense Redundancy Risk Management Threat Intelligence
下载PDF
GUARDIAN: A Multi-Tiered Defense Architecture for Thwarting Prompt Injection Attacks on LLMs
10
作者 Parijat Rai Saumil Sood +1 位作者 Vijay K. Madisetti Arshdeep Bahga 《Journal of Software Engineering and Applications》 2024年第1期43-68,共26页
This paper introduces a novel multi-tiered defense architecture to protect language models from adversarial prompt attacks. We construct adversarial prompts using strategies like role emulation and manipulative assist... This paper introduces a novel multi-tiered defense architecture to protect language models from adversarial prompt attacks. We construct adversarial prompts using strategies like role emulation and manipulative assistance to simulate real threats. We introduce a comprehensive, multi-tiered defense framework named GUARDIAN (Guardrails for Upholding Ethics in Language Models) comprising a system prompt filter, pre-processing filter leveraging a toxic classifier and ethical prompt generator, and pre-display filter using the model itself for output screening. Extensive testing on Meta’s Llama-2 model demonstrates the capability to block 100% of attack prompts. The approach also auto-suggests safer prompt alternatives, thereby bolstering language model security. Quantitatively evaluated defense layers and an ethical substitution mechanism represent key innovations to counter sophisticated attacks. The integrated methodology not only fortifies smaller LLMs against emerging cyber threats but also guides the broader application of LLMs in a secure and ethical manner. 展开更多
关键词 Large Language Models (LLMs) Adversarial Attack Prompt Injection Filter defense Artificial Intelligence Machine Learning CYBERSECURITY
下载PDF
Chained Dual-Generative Adversarial Network:A Generalized Defense Against Adversarial Attacks 被引量:1
11
作者 Amitoj Bir Singh Lalit Kumar Awasthi +3 位作者 Urvashi Mohammad Shorfuzzaman Abdulmajeed Alsufyani Mueen Uddin 《Computers, Materials & Continua》 SCIE EI 2023年第2期2541-2555,共15页
Neural networks play a significant role in the field of image classification.When an input image is modified by adversarial attacks,the changes are imperceptible to the human eye,but it still leads to misclassificatio... Neural networks play a significant role in the field of image classification.When an input image is modified by adversarial attacks,the changes are imperceptible to the human eye,but it still leads to misclassification of the images.Researchers have demonstrated these attacks to make production self-driving cars misclassify StopRoad signs as 45 Miles Per Hour(MPH)road signs and a turtle being misclassified as AK47.Three primary types of defense approaches exist which can safeguard against such attacks i.e.,Gradient Masking,Robust Optimization,and Adversarial Example Detection.Very few approaches use Generative Adversarial Networks(GAN)for Defense against Adversarial Attacks.In this paper,we create a new approach to defend against adversarial attacks,dubbed Chained Dual-Generative Adversarial Network(CD-GAN)that tackles the defense against adversarial attacks by minimizing the perturbations of the adversarial image using iterative oversampling and undersampling using GANs.CD-GAN is created using two GANs,i.e.,CDGAN’s Sub-ResolutionGANandCDGAN’s Super-ResolutionGAN.The first is CDGAN’s Sub-Resolution GAN which takes the original resolution input image and oversamples it to generate a lower resolution neutralized image.The second is CDGAN’s Super-Resolution GAN which takes the output of the CDGAN’s Sub-Resolution and undersamples,it to generate the higher resolution image which removes any remaining perturbations.Chained Dual GAN is formed by chaining these two GANs together.Both of these GANs are trained independently.CDGAN’s Sub-Resolution GAN is trained using higher resolution adversarial images as inputs and lower resolution neutralized images as output image examples.Hence,this GAN downscales the image while removing adversarial attack noise.CDGAN’s Super-Resolution GAN is trained using lower resolution adversarial images as inputs and higher resolution neutralized images as output images.Because of this,it acts as an Upscaling GAN while removing the adversarial attak noise.Furthermore,CD-GAN has a modular design such that it can be prefixed to any existing classifier without any retraining or extra effort,and 2542 CMC,2023,vol.74,no.2 can defend any classifier model against adversarial attack.In this way,it is a Generalized Defense against adversarial attacks,capable of defending any classifier model against any attacks.This enables the user to directly integrate CD-GANwith an existing production deployed classifier smoothly.CD-GAN iteratively removes the adversarial noise using a multi-step approach in a modular approach.It performs comparably to the state of the arts with mean accuracy of 33.67 while using minimal compute resources in training. 展开更多
关键词 Adversarial attacks GAN-based adversarial defense image classification models adversarial defense
下载PDF
Novel 18β-glycyrrhetinic acid amide derivatives show dual-acting capabilities for controlling plant bacterial diseases through ROS-mediated antibacterial efficiency and activating plant defense responses 被引量:2
12
作者 SONG Ying-lian LIU Hong-wu +7 位作者 YANG Yi-hong HE Jing-jing YANG Bin-xin YANG Lin-li ZHOU Xiang LIU Li-wei WANG Pei-yi YANG Song 《Journal of Integrative Agriculture》 SCIE CAS CSCD 2023年第9期2759-2771,共13页
Natural products have long been a crucial source of,or provided inspiration for new agrochemical discovery.Naturally occurring 18β-glycyrrhetinic acid shows broad-spectrum bioactivities and is a potential skeleton fo... Natural products have long been a crucial source of,or provided inspiration for new agrochemical discovery.Naturally occurring 18β-glycyrrhetinic acid shows broad-spectrum bioactivities and is a potential skeleton for novel drug discovery.To extend the utility of 18β-glycyrrhetinic acid for agricultural uses,a series of novel 18β-glycyrrhetinic acid amide derivatives were prepared and evaluated for their antibacterial potency.Notably,compound 5k showed good antibacterial activity in vitro against Xanthomonas oryzae pv.oryzae(Xoo,EC50=3.64 mg L–1),and excellent protective activity(54.68%)against Xoo in vivo.Compound 5k induced excessive production and accumulation of reactive oxygen species in the tested pathogens,resulting in damaging the bacterial cell envelope.More interestingly,compound 5k could increase the activities of plant defense enzymes including catalase,superoxide dismutase,peroxidase,and phenylalanine ammonia lyase.Taken together,these enjoyable results suggested that designed compounds derived from 18β-glycyrrhetinic acid showed potential for controlling intractable plant bacterial diseases by disturbing the balance of the phytopathogen’s redox system and activating the plant defense system. 展开更多
关键词 18β-glycyrrhetinic acid antibacterial activities defense enzyme activity reactive oxygen species
下载PDF
The dual antimicrobial and immunomodulatory roles of host defense peptides and their applications in animal production 被引量:1
13
作者 Di Wu Linglong Fu +1 位作者 Weizhang Wen Na Dong 《Journal of Animal Science and Biotechnology》 SCIE CAS CSCD 2023年第2期501-514,共14页
Host defense peptides(HDPs)are small molecules with broad-spectrum antimicrobial activities against infectious bacteria,viruses,and fungi.Increasing evidence suggests that HDPs can also indirectly protect hosts by mod... Host defense peptides(HDPs)are small molecules with broad-spectrum antimicrobial activities against infectious bacteria,viruses,and fungi.Increasing evidence suggests that HDPs can also indirectly protect hosts by modulating their immune responses.Due to these dual roles,HDPs have been considered one of the most promising antibiotic substitutes to improve growth performance,intestinal health,and immunity in farm animals.This review describes the antimicrobial and immunomodulatory roles of host defense peptides and their recent applications in animal production. 展开更多
关键词 Antimicrobials Host defense peptides IMMUNOMODULATION POULTRY RUMINANTS SWINE
下载PDF
Blockchain Security Threats and Collaborative Defense:A Literature Review 被引量:1
14
作者 Xiulai Li Jieren Cheng +5 位作者 Zhaoxin Shi Jingxin Liu Bin Zhang Xinbing Xu Xiangyan Tang Victor S.Sheng 《Computers, Materials & Continua》 SCIE EI 2023年第9期2597-2629,共33页
As a distributed database,the system security of the blockchain is of great significance to prevent tampering,protect privacy,prevent double spending,and improve credibility.Due to the decentralized and trustless natu... As a distributed database,the system security of the blockchain is of great significance to prevent tampering,protect privacy,prevent double spending,and improve credibility.Due to the decentralized and trustless nature of blockchain,the security defense of the blockchain system has become one of the most important measures.This paper comprehensively reviews the research progress of blockchain security threats and collaborative defense,and we first introduce the overview,classification,and threat assessment process of blockchain security threats.Then,we investigate the research status of single-node defense technology and multi-node collaborative defense technology and summarize the blockchain security evaluation indicators and evaluation methods.Finally,we discuss the challenges of blockchain security and future research directions,such as parallel detection and federated learning.This paper aims to stimulate further research and discussion on blockchain security,providing more reliable security guarantees for the use and development of blockchain technology to face changing threats and challenges through continuous updating and improvement of defense technologies. 展开更多
关键词 Blockchain threat assessment collaborative defense security evaluation
下载PDF
Alu antisense RNA ameliorates methylglyoxal-induced human lens epithelial cell apoptosis by enhancing antioxidant defense 被引量:1
15
作者 Pei-Yuan Wu Ning Ji +8 位作者 Chong-Guang Wu Xiao-Die Wang Xin Liu Zhi-Xue Song Murad Khan Suleman Shah Ying-Hua Du Xiu-Fang Wang Li-Fang Yan 《International Journal of Ophthalmology(English edition)》 SCIE CAS 2023年第2期178-190,共13页
AIM:To determine whether an antisense RNA corresponding to the human Alu transposable element(Aluas RNA)can protect human lens epithelial cells(HLECs)from methylglyoxal-induced apoptosis.METHODS:Cell counting kit-8(CC... AIM:To determine whether an antisense RNA corresponding to the human Alu transposable element(Aluas RNA)can protect human lens epithelial cells(HLECs)from methylglyoxal-induced apoptosis.METHODS:Cell counting kit-8(CCK-8)and 3-(4,5-Dimethylthiazol-2-yl)-2,5-diphenyltetrazolium bromide(MTT)assays were used to assess HLEC viability.HLEC viability/death was detected using a Calcein-AM/PI double staining kit;the annexin V-FITC method was used to detect HLEC apoptosis.The cytosolic reactive oxygen species(ROS)levels in HLECs were determined using a reactive species assay kit.The levels of malondialdehyde(MDA)and the antioxidant activities of total-superoxide dismutase(T-SOD)and glutathione peroxidase(GSH-Px)were assessed in HLECs using their respective kits.RT-q PCR and Western blotting were used to measure m RNA and protein expression levels of the genes.RESULTS:Aluas RNA rescued methylglyoxal-induced apoptosis in HLECs and ameliorated both the methylglyoxalinduced decrease in Bcl-2 m RNA and the methylglyoxalinduced increase in Bax m RNA.In addition,Aluas RNA inhibited the methylglyoxal-induced increase in Alu sense RNA expression.Aluas RNA inhibited the production of ROS induced by methylglyoxal,restored T-SOD and GSHPx activity,and moderated the increase in MDA content after treatment with methylglyoxal.Aluas RNA significantly restored the methylglyoxal-induced down-regulation of Nrf2 gene and antioxidant defense genes,including glutathione peroxidase,heme oxygenase 1,γ-glutamylcysteine synthetase and quinone oxidoreductase 1.Aluas RNA ameliorated methylglyoxal-induced increases of the m RNA and protein expression of Keap1 that is the negative regulator of Nrf2.CONCLUSION:Aluas RNA reduces apoptosis induced by methylglyoxal by enhancing antioxidant defense. 展开更多
关键词 human Alu antisense RNA human lens epithelial cells methylglyoxal toxicity antioxidant defense apoptosis
下载PDF
Plant N-acylethanolamines play a crucial role in defense and its variation in response to elevated CO_(2) and temperature in tomato
16
作者 Zhangjian Hu Junying Shi +3 位作者 Shuxian Feng Xiaodan Wu Shujun Shao Kai Shi 《Horticulture Research》 SCIE CSCD 2023年第1期207-219,共13页
The ubiquitous lipid-derived molecules N-acylethanolamines(NAEs)have multiple immune functions in mammals,but their roles and mechanisms in plant defense response during changing environment remain largely unclear.Her... The ubiquitous lipid-derived molecules N-acylethanolamines(NAEs)have multiple immune functions in mammals,but their roles and mechanisms in plant defense response during changing environment remain largely unclear.Here,we found that exogenous NAE18:0 and NAE18:2 promoted defense against the necrotrophic pathogen Botrytis cinerea but suppressed defense to the hemi-biotrophic pathogen Pseudomonas syringae pv.tomato(Pst)DC3000 in tomato.The knocking-down and overexpression function analysis of the pathogen-responsive NAE synthetic gene PHOSPHOLIPASE Dγ(PLDγ)and hydrolytic gene FATTY ACID AMID HYDROLASE 1(FAAH1)revealed that the NAE pathway is crucial for plant defense response.Using exogenous applications and SA-abolished NahG plants,we unveiled the antagonistic relationship between NAE and SA in plant defense response.Elevated CO_(2) and temperature significantly changed the NAE pathway in response to pathogens,while inhibition of the NAE pathway led to the alternation of environment-mediated defense variations against Pst DC3000 in tomato,indicating that NAE pathway is associated with plant defense variations in response to elevated CO_(2) and temperature.The results herein reveal a new function of NAE in plant defense,and its involvement in environment-mediated defense variation in tomato.These findings shed light on the NAE-based plant defense,which may have relevance to crop disease management in future changing climate. 展开更多
关键词 ELEVATED defense PLANT
下载PDF
Effects of Plant Extracts and Beauveria bassiana on the Activity of Defense-Related Enzymes in Solanum lycopersicum L.during Interaction with Fusarium oxysporum f.sp.lycopersici
17
作者 JoséAdrian Perez-Robles Carlos Alberto Lecona-Guzmán +1 位作者 Víctor Manuel Ruíz-Valdiviezo Joaquín Adolfo Montes-Molina 《Phyton-International Journal of Experimental Botany》 SCIE 2023年第9期2503-2518,共16页
The objective to this work was to evaluate the enzymatic activity in the culture of Solanum lycopersicum L.infected with Fusarium oxysporum after the combined application of Beauveria bassiana and plant extracts.Solan... The objective to this work was to evaluate the enzymatic activity in the culture of Solanum lycopersicum L.infected with Fusarium oxysporum after the combined application of Beauveria bassiana and plant extracts.Solanum lycopersicum plantlets were transplanted 15 days after the emergency.Five days after transplanting,Beauveria bassiana spores were applied at a concentration of 1×10^(7)spores mL^(−1)onto soil(along with A.indica(N)and P.auritum(H)leaf extracts)where S.lycopersicum plants were planted.Eight days after transplanting,spores of F.oxysporum strain were applied at a concentration of 1×10^(6)spores mL^(−1)to soil where S.lycopersicum plants were growing.The development of S.lycopersicum plants was monitored for 114 days,whereby a randomized complete block treatment design was used,the roots of the plants were crushed with liquid nitrogen,after which UV/VIS spectrophotometry was used to determine protein concentration,as well as the activity ofβ-1,3-glucanases,peroxidases(POX,EC1.11.1.7),catalase and chitinases.The treatments combining B.bassiana and A.indica and P.auritum extracts,had a significant difference in enzymatic activity levels,thus contributing to better defense mechanisms and a greater protection to S.lycopersicum plants in the presence of F.oxysporum.The application of B.bassiana and plant extracts to the ground mitigated damage caused by F.oxysporum on S.lycopersicum plants. 展开更多
关键词 Glucanases CHITINASES PEROXIDASES CATALASE defense mechanisms
下载PDF
An Air Defense Weapon Target Assignment Method Based on Multi-Objective Artificial Bee Colony Algorithm
18
作者 Huaixi Xing Qinghua Xing 《Computers, Materials & Continua》 SCIE EI 2023年第9期2685-2705,共21页
With the advancement of combat equipment technology and combat concepts,new requirements have been put forward for air defense operations during a group target attack.To achieve high-efficiency and lowloss defensive o... With the advancement of combat equipment technology and combat concepts,new requirements have been put forward for air defense operations during a group target attack.To achieve high-efficiency and lowloss defensive operations,a reasonable air defense weapon assignment strategy is a key step.In this paper,a multi-objective and multi-constraints weapon target assignment(WTA)model is established that aims to minimize the defensive resource loss,minimize total weapon consumption,and minimize the target residual effectiveness.An optimization framework of air defense weapon mission scheduling based on the multiobjective artificial bee colony(MOABC)algorithm is proposed.The solution for point-to-point saturated attack targets at different operational scales is achieved by encoding the nectar with real numbers.Simulations are performed for an imagined air defense scenario,where air defense weapons are saturated.The non-dominated solution sets are obtained by the MOABC algorithm to meet the operational demand.In the case where there are more weapons than targets,more diverse assignment schemes can be selected.According to the inverse generation distance(IGD)index,the convergence and diversity for the solutions of the non-dominated sorting genetic algorithm III(NSGA-III)algorithm and the MOABC algorithm are compared and analyzed.The results prove that the MOABC algorithm has better convergence and the solutions are more evenly distributed among the solution space. 展开更多
关键词 Weapon target assignment multi-objective artificial bee colony air defense defensive resource loss total weapon consumption target residual effectiveness
下载PDF
GhWRKY33 negatively regulates jasmonate-mediated plant defense to Verticillium dahliae
19
作者 Yunrui Ji Minghui Mou +7 位作者 Huimin Zhang Ruling Wang Songguo Wu Yifen Jing Haiyan Zhang Lanxin Li Zhifang Li Ligang Chen 《Plant Diversity》 SCIE CAS CSCD 2023年第3期337-346,共10页
Verticillium wilt,caused by Verticillium dahliae,seriously restricts the yield and quality improvement of cotton.Previous studies have revealed the involvement of WRKY members in plant defense against V.dahliae,but th... Verticillium wilt,caused by Verticillium dahliae,seriously restricts the yield and quality improvement of cotton.Previous studies have revealed the involvement of WRKY members in plant defense against V.dahliae,but the underlying mechanisms involved need to be further elucidated.Here,we demonstrated that Gossypium hirsutum WRKY DNA-binding protein 33(GhWRKY33) functions as a negative regulator in plant defense against V.dahliae.GhWRKY33 expression is induced rapidly by V.dahliae and methyl jasmonate,and overexpression of GhWRKY33 reduces plant tolerance to V.dahliae in Arabidopsis.Quantitative RT-PCR analysis revealed that expression of several JA-associated genes was significantly repressed in GhWRKY33 overexpressing transgenic plants.Yeast one-hybrid analysis revealed that GhWRKY33 may repress the transcription of both AtERF1 and GhERF2 through its binding to their promoters.Protein-protein interaction analysis suggested that GhWRKY33 interacts with G.hirsutum JASMONATE ZIM-domain protein 3(GhJAZ3).Similarly,overexpression of GhJAZ3 also decreases plant tolerance to V.dahliae.Furthermore,GhJAZ3 acts synergistically with GhWRKY33 to suppress both AtERF1 and GhERF2 expression.Our results imply that GhWRKY33 may negatively regulate plant tolerance to V.dahliae via the JA-mediated signaling pathway. 展开更多
关键词 GhWRKY33 Verticillium dahliae Jasmonate acid GhJAZ3 defense response
下载PDF
ZmDRR206 functions in maintaining cell wall integrity during maize seedling growth and defense response to external stresses
20
作者 Tao Zhong Suining Deng +3 位作者 Mang Zhu Xingming Fan Mingliang Xu Jianrong Ye 《The Crop Journal》 SCIE CSCD 2023年第6期1649-1664,共16页
Plants adaptively change their cell wall composition and structure during their growth,development,and interactions with environmental stresses.Dirigent proteins(DIRs)contribute to environmental adaptations by dynamic... Plants adaptively change their cell wall composition and structure during their growth,development,and interactions with environmental stresses.Dirigent proteins(DIRs)contribute to environmental adaptations by dynamically reorganizing the cell wall and/or by generating defense compounds.A maize DIR,ZmDRR206,was previously reported to play a dominant role in regulation of storage nutrient accumulation in endosperm during maize kernel development.Here we show that ZmDRR206 mediates maize seedling growth and disease resistance by coordinately regulating biosynthesis of cell wall components for cell-wall integrity(CWI)maintenance.Expression of ZmDRR206 was induced in maize seedlings upon pathogen infection.ZmDRR206 overexpression in maize resulted in reduced seedling growth and photosynthetic activity but increased disease resistance and drought tolerance,revealing a tradeoff between growth and defense.Consistently,ZmDRR206 overexpression reduced the contents of primary metabolites and down-regulated genes involved in photosynthesis,while increasing the contents of major cell wall components,defense phytohormones,and defense metabolites,and up-regulated genes involved in defense and cell-wall biosynthesis in seedlings.ZmDRR206-overexpressing seedlings were resistant to cell-wall stress imposed by isoxaben,and ZmDRR206 physically interacted with ZmCesA10,which is a cellulose synthase unit.Our findings suggest a mechanism by which ZmDRR206 coordinately regulates biosynthesis of cell-wall components for CWI maintenance during maize seedling growth,and might be exploited for breeding strong disease resistance in maize. 展开更多
关键词 Cell-wall integrity Cell-wall biosynthesis Dirigent protein ZmDRR206 defense response Seedling growth
下载PDF
上一页 1 2 250 下一页 到第
使用帮助 返回顶部