Search results for "attack"
showing 10 items of 221 documents
Volatile-mediated foraging behaviour of three parasitoid species under conditions of dual insect herbivore attack
2016
Infochemicals play an important role in structuring intra-and interspecific interactions. Many parasitoid wasp species rely on herbivory or oviposition-induced plant volatiles (HIPVs/OIPVs) to locate their herbivorous hosts, and must cope with variation in the volatile blends due to factors such as plant/host species, herbivore density or attack by several herbivores. However, little is known about how dual herbivory or changes in herbivore density affect multiple parasitoid species, each attacking a different herbivore, in the same system. In a natural system, we investigated the effect of dual attack on the ability of three parasitoid species to differentiate between volatiles induced by …
An invasive insect herbivore disrupts plant volatile-mediated tritrophic signalling
2017
Plants respond to insect attack by emission of volatile organic compounds, which recruit natural enemies of the attacking herbivore, constituting an indirect plant defence strategy. In this context, the egg parasitoid Trissolcus basalis is attracted by oviposition-induced plant volatiles emitted by Vicia faba plants as a consequence of feeding and oviposition by the pentatomid host Nezara viridula. However, this local tritrophic web could be affected by the recent invasion by the alien pentatomid bug Halyomorpha halys, an herbivore that shares the same environments as native pentatomid pests. Therefore, we investigated in laboratory conditions the possible impact of H. halys on the plant vo…
Specifications for carbonate content quantification in recent marine sediments using Rock-Eval pyrolysis
2019
11 pages; International audience; The amount of CaCO3 in sediments and/or sedimentary rocks is usually measured by calcimetry while the nature of the carbonates is determined by X-ray diffraction. Recently, a carbonate recognition method based on the results of Rock-Eval pyrolysis was proposed in 2014 by Pillot et al. [1]. Rock-Eval pyrolysis is also widely used for the characterization of recent sediments. However, later in 2015 Baudin et al. [2] noticed that some of the characteristics of recent sediments tended to produce different results from those of more classical Rock-Eval analyses, causing bias in interpretations.In this study, the thermal stability of fossil and recent marine carb…
Aircraft wing rock oscillations suppression by simple adaptive control
2020
Abstract Roll angular motion of the modern aircraft operating in non-linear flight modes with a high angle of attack often demonstrates the limit cycle oscillations, which is commonly known as the wing rock phenomenon. Wing rock dynamics are represented by a substantially non-linear model, with parameters varying over a wide range, depending on the flight conditions (altitude, Mach number, payload mass, etc.) and angle of attack. A perspective approach of the wing rock suppression lies in the adaptation methods. In the present paper an application of the simple adaptive control approach with the Implicit Reference Model (IRM) is proposed and numerically studied. The IRM adaptive controller …
Secure and efficient verification for data aggregation in wireless sensor networks
2017
Summary The Internet of Things (IoT) concept is, and will be, one of the most interesting topics in the field of Information and Communications Technology. Covering a wide range of applications, wireless sensor networks (WSNs) can play an important role in IoT by seamless integration among thousands of sensors. The benefits of using WSN in IoT include the integrity, scalability, robustness, and easiness in deployment. In WSNs, data aggregation is a famous technique, which, on one hand, plays an essential role in energy preservation and, on the other hand, makes the network prone to different kinds of attacks. The detection of false data injection and impersonation attacks is one of the majo…
HyperWall: A Hypervisor for Detection and Prevention of Malicious Communication
2020
Malicious programs vary widely in their functionality, from key-logging to disk encryption. However, most malicious programs communicate with their operators, thus revealing themselves to various security tools. The security tools incorporated within an operating system are vulnerable to attacks due to the large attack surface of the operating system kernel and modules. We present a kernel module that demonstrates how kernel-mode access can be used to bypass any security mechanism that is implemented in kernel-mode. External security tools, like firewalls, lack important information about the origin of the intercepted packets, thus their filtering policy is usually insufficient to prevent c…
Deep in the Dark: A Novel Threat Detection System using Darknet Traffic
2019
This paper proposes a threat detection system based on Machine Learning classifiers that are trained using darknet traffic. Traffic destined to Darknet is either malicious or by misconfiguration. Darknet traffic contains traces of several threats such as DDoS attacks, botnets, spoofing, probes and scanning attacks. We analyse darknet traffic by extracting network traffic features from it that help in finding patterns of these advanced threats. We collected the darknet traffic from the network sensors deployed at SURFnet and extracted several network-based features. In this study, we proposed a framework that uses supervised machine learning and a concept drift detector. Our experimental res…
The protective value of a defensive display varies with the experience of wild predators
2019
AbstractPredation has driven the evolution of diverse adaptations for defence among prey, and one striking example is the deimatic display. While such displays can resemble, or indeed co-occur with, aposematic ‘warning’ signals, theory suggests deimatic displays may function independently of predator learning. The survival value of deimatic displays against wild predators has not been tested before. Here we used the mountain katydid Acripeza reticulata to test the efficacy of a putative deimatic display in the wild. Mountain katydids have a complex defence strategy; they are camouflaged at rest, but reveal a striking red-, blue-, and black-banded abdomen when attacked. We presented live kat…
C3 Drives Inflammatory Skin Carcinogenesis Independently of C5
2021
Nonmelanoma skin cancer such as cutaneous squamous cell carcinoma (cSCC) is the most common form of cancer and can occur as a consequence of DNA damage to the epithelium by UVR or chemical carcinogens. There is growing evidence that the complement system is involved in cancer immune surveillance; however, its role in cSCC remains unclear. Here, we show that complement genes are expressed in tissue from patients with cSCC, and C3 activation fragments are present in cSCC biopsies, indicating complement activation. Using a range of complement-deficient mice in a two-stage mouse model of chemically-induced cSCC, where a subclinical dose of 7,12-dimethylbenz[a]anthracene causes oncogenic mutatio…
Membrane Attack Complex in Myocardial Ischemia/Reperfusion Injury: A Systematic Review for Post Mortem Applications
2020
The complement system has a significant role in myocardial ischemia/reperfusion injury, being responsible for cell lysis and amplification of inflammatory response. In this context, several studies highlight that terminal complement complex C5b-9, also known as the membrane attack complex (MAC), is a significant contributor. The MAC functions were studied by many researchers analyzing the characteristics of its activation in myocardial infarction. Here, a systematic literature review was reported to evaluate the principal features, advantages, and limits (regarding the application) of complement components and MAC in post mortem settings to perform the diagnosis of myocardial ischemia/infar…