Search results for "attack"

showing 10 items of 221 documents

Volatile-mediated foraging behaviour of three parasitoid species under conditions of dual insect herbivore attack

2016

Infochemicals play an important role in structuring intra-and interspecific interactions. Many parasitoid wasp species rely on herbivory or oviposition-induced plant volatiles (HIPVs/OIPVs) to locate their herbivorous hosts, and must cope with variation in the volatile blends due to factors such as plant/host species, herbivore density or attack by several herbivores. However, little is known about how dual herbivory or changes in herbivore density affect multiple parasitoid species, each attacking a different herbivore, in the same system. In a natural system, we investigated the effect of dual attack on the ability of three parasitoid species to differentiate between volatiles induced by …

0106 biological sciences010603 evolutionary biology01 natural sciencesMultitrophic interactionParasitoid waspParasitoidMultiple attackMultitrophic interactionsHerbivore-induced plant volatilesBotanyLaboratory of EntomologyEcology Evolution Behavior and Systematics016-3906Pieris brassicaeAphidbiologyDiaeretiella rapaeOviposition-induced plant volatilesHerbivore-induced plant volatileTrichogramma brassicaebiology.organism_classificationCotesia glomerataPE&RCLaboratorium voor EntomologieBiosystematiekSettore AGR/11 - Entomologia Generale E ApplicataBrevicoryne brassicaeIndirect defenceBiosystematicsAnimal Science and ZoologyEPS010606 plant biology & botany
researchProduct

An invasive insect herbivore disrupts plant volatile-mediated tritrophic signalling

2017

Plants respond to insect attack by emission of volatile organic compounds, which recruit natural enemies of the attacking herbivore, constituting an indirect plant defence strategy. In this context, the egg parasitoid Trissolcus basalis is attracted by oviposition-induced plant volatiles emitted by Vicia faba plants as a consequence of feeding and oviposition by the pentatomid host Nezara viridula. However, this local tritrophic web could be affected by the recent invasion by the alien pentatomid bug Halyomorpha halys, an herbivore that shares the same environments as native pentatomid pests. Therefore, we investigated in laboratory conditions the possible impact of H. halys on the plant vo…

0106 biological sciencesmedia_common.quotation_subjectForagingHalyomorpha halys; Insect invasion; Multiple attack; Oviposition-induced plant volatiles; Trissolcus basalisContext (language use)InsectInsect invasion010603 evolutionary biology01 natural sciencesParasitoidMultiple attackSemiochemicalHalyomorpha halysTrissolcus basalismedia_commonOriginal PaperHerbivorebiologyHost (biology)EcologyOviposition-induced plant volatileOviposition-induced plant volatilesTrissolcus basalibiology.organism_classificationHalyomorpha halys; Insect invasion; Multiple attack; Oviposition-induced plant volatiles; Trissolcus basalis; Agronomy and Crop Science010602 entomologyHalyomorpha halySettore AGR/11 - Entomologia Generale E ApplicataNezara viridulaAgronomy and Crop Science
researchProduct

Specifications for carbonate content quantification in recent marine sediments using Rock-Eval pyrolysis

2019

11 pages; International audience; The amount of CaCO3 in sediments and/or sedimentary rocks is usually measured by calcimetry while the nature of the carbonates is determined by X-ray diffraction. Recently, a carbonate recognition method based on the results of Rock-Eval pyrolysis was proposed in 2014 by Pillot et al. [1]. Rock-Eval pyrolysis is also widely used for the characterization of recent sediments. However, later in 2015 Baudin et al. [2] noticed that some of the characteristics of recent sediments tended to produce different results from those of more classical Rock-Eval analyses, causing bias in interpretations.In this study, the thermal stability of fossil and recent marine carb…

020209 energyGeochemistrySalt (chemistry)Mineralogy[SDU.STU]Sciences of the Universe [physics]/Earth Sciences02 engineering and technologyAnalytical Chemistrychemistry.chemical_compound020401 chemical engineering[SDU.STU.GC]Sciences of the Universe [physics]/Earth Sciences/Geochemistry0202 electrical engineering electronic engineering information engineeringRecent sedimentsAcid attack0204 chemical engineeringChemical decompositionComputingMilieux_MISCELLANEOUSTotal organic carbonchemistry.chemical_classificationCalciteRock-EvalSedimentCarbonates decompositionFuel Technologychemistry13. Climate action[SDU.STU.ST]Sciences of the Universe [physics]/Earth Sciences/StratigraphyCarbonateSedimentary rockRock evalClay mineralsPyrolysisGeologyPyrolysis
researchProduct

Aircraft wing rock oscillations suppression by simple adaptive control

2020

Abstract Roll angular motion of the modern aircraft operating in non-linear flight modes with a high angle of attack often demonstrates the limit cycle oscillations, which is commonly known as the wing rock phenomenon. Wing rock dynamics are represented by a substantially non-linear model, with parameters varying over a wide range, depending on the flight conditions (altitude, Mach number, payload mass, etc.) and angle of attack. A perspective approach of the wing rock suppression lies in the adaptation methods. In the present paper an application of the simple adaptive control approach with the Implicit Reference Model (IRM) is proposed and numerically studied. The IRM adaptive controller …

0209 industrial biotechnologyAdaptive controlComputer scienceAngle of attackAerospace Engineering02 engineering and technology01 natural sciences010305 fluids & plasmaslaw.inventionsymbols.namesake020901 industrial engineering & automationCircular motionAileronMach numberControl theorylawRange (aeronautics)0103 physical sciencesTrajectorysymbolsAerospace Science and Technology
researchProduct

Secure and efficient verification for data aggregation in wireless sensor networks

2017

Summary The Internet of Things (IoT) concept is, and will be, one of the most interesting topics in the field of Information and Communications Technology. Covering a wide range of applications, wireless sensor networks (WSNs) can play an important role in IoT by seamless integration among thousands of sensors. The benefits of using WSN in IoT include the integrity, scalability, robustness, and easiness in deployment. In WSNs, data aggregation is a famous technique, which, on one hand, plays an essential role in energy preservation and, on the other hand, makes the network prone to different kinds of attacks. The detection of false data injection and impersonation attacks is one of the majo…

021110 strategic defence & security studiesComputer Networks and Communicationsbusiness.industryComputer scienceComputerSystemsOrganization_COMPUTER-COMMUNICATIONNETWORKS0211 other engineering and technologiesEarly detection020206 networking & telecommunications02 engineering and technologyImpersonation attackComputer Science ApplicationsData aggregatorRobustness (computer science)Information and Communications TechnologySoftware deploymentScalability0202 electrical engineering electronic engineering information engineeringbusinessWireless sensor networkComputer networkInternational Journal of Network Management
researchProduct

HyperWall: A Hypervisor for Detection and Prevention of Malicious Communication

2020

Malicious programs vary widely in their functionality, from key-logging to disk encryption. However, most malicious programs communicate with their operators, thus revealing themselves to various security tools. The security tools incorporated within an operating system are vulnerable to attacks due to the large attack surface of the operating system kernel and modules. We present a kernel module that demonstrates how kernel-mode access can be used to bypass any security mechanism that is implemented in kernel-mode. External security tools, like firewalls, lack important information about the origin of the intercepted packets, thus their filtering policy is usually insufficient to prevent c…

021110 strategic defence & security studiesSoftware_OPERATINGSYSTEMSNetwork securitybusiness.industryComputer scienceNetwork packet0211 other engineering and technologiesHypervisor02 engineering and technologyAttack surfaceComputer securitycomputer.software_genreOperator (computer programming)Trusted computing baseDisk encryptionKernel (image processing)020204 information systems0202 electrical engineering electronic engineering information engineeringbusinesscomputer
researchProduct

Deep in the Dark: A Novel Threat Detection System using Darknet Traffic

2019

This paper proposes a threat detection system based on Machine Learning classifiers that are trained using darknet traffic. Traffic destined to Darknet is either malicious or by misconfiguration. Darknet traffic contains traces of several threats such as DDoS attacks, botnets, spoofing, probes and scanning attacks. We analyse darknet traffic by extracting network traffic features from it that help in finding patterns of these advanced threats. We collected the darknet traffic from the network sensors deployed at SURFnet and extracted several network-based features. In this study, we proposed a framework that uses supervised machine learning and a concept drift detector. Our experimental res…

021110 strategic defence & security studiesSpoofing attackComputer scienceNetwork telescopeDarknetComputerSystemsOrganization_COMPUTER-COMMUNICATIONNETWORKS0211 other engineering and technologiesBotnetDenial-of-service attack02 engineering and technologyComputer securitycomputer.software_genre0202 electrical engineering electronic engineering information engineering020201 artificial intelligence & image processingcomputer
researchProduct

The protective value of a defensive display varies with the experience of wild predators

2019

AbstractPredation has driven the evolution of diverse adaptations for defence among prey, and one striking example is the deimatic display. While such displays can resemble, or indeed co-occur with, aposematic ‘warning’ signals, theory suggests deimatic displays may function independently of predator learning. The survival value of deimatic displays against wild predators has not been tested before. Here we used the mountain katydid Acripeza reticulata to test the efficacy of a putative deimatic display in the wild. Mountain katydids have a complex defence strategy; they are camouflaged at rest, but reveal a striking red-, blue-, and black-banded abdomen when attacked. We presented live kat…

0301 basic medicineValue (ethics)Allopatric speciationZoologylcsh:MedicineAposematismeläinten käyttäytyminenArticlePredationGryllidae03 medical and health sciences0302 clinical medicineAnimalspuolustusmekanismit (biologia)Australian magpielcsh:SciencePredatorMultidisciplinaryBehavior Animaldefensive displaybiologylcsh:RAustraliabehavioural ecologyhepokatitbiology.organism_classificationkatydids030104 developmental biologySympatric speciationPredatory BehaviorPredator attacklcsh:Q030217 neurology & neurosurgeryScientific Reports
researchProduct

C3 Drives Inflammatory Skin Carcinogenesis Independently of C5

2021

Nonmelanoma skin cancer such as cutaneous squamous cell carcinoma (cSCC) is the most common form of cancer and can occur as a consequence of DNA damage to the epithelium by UVR or chemical carcinogens. There is growing evidence that the complement system is involved in cancer immune surveillance; however, its role in cSCC remains unclear. Here, we show that complement genes are expressed in tissue from patients with cSCC, and C3 activation fragments are present in cSCC biopsies, indicating complement activation. Using a range of complement-deficient mice in a two-stage mouse model of chemically-induced cSCC, where a subclinical dose of 7,12-dimethylbenz[a]anthracene causes oncogenic mutatio…

0301 basic medicineWT wild typeSkin NeoplasmsComplement receptorComplement Membrane Attack Complexmedicine.disease_causeBiochemistrychemistry.chemical_compoundMice0302 clinical medicineCR complement receptorComplement ActivationSkinMice KnockoutcSCC cutaneous squamous cell carcinomaComplement C5Complement C3Receptors Complement030220 oncology & carcinogenesisCarcinoma Squamous CellDisease ProgressionTumor BiologyOriginal ArticleMAC membrane attack complexSignal TransductionHPV16 human papillomavirus type 16910-Dimethyl-12-benzanthraceneTPA 12-O-tetradecanoylphorbol-13-acetateMice TransgenicDermatologySettore MED/08 - Anatomia Patologica03 medical and health sciencesmedicineAnimalsHumansC3Molecular BiologyReceptor Anaphylatoxin C5aDMBA 712-dimethylbenz[a]anthracenebusiness.industry712-Dimethylbenz[a]anthraceneCancerCell BiologyNeoplasms Experimentalmedicine.diseaseComplement systemDisease Models Animal030104 developmental biologychemistryTumor progressionCancer researchCarcinogensTumor EscapeSkin cancerbusinessCarcinogenesisComplement membrane attack complexSkin carcinogenesis.EC epithelial cell
researchProduct

Membrane Attack Complex in Myocardial Ischemia/Reperfusion Injury: A Systematic Review for Post Mortem Applications

2020

The complement system has a significant role in myocardial ischemia/reperfusion injury, being responsible for cell lysis and amplification of inflammatory response. In this context, several studies highlight that terminal complement complex C5b-9, also known as the membrane attack complex (MAC), is a significant contributor. The MAC functions were studied by many researchers analyzing the characteristics of its activation in myocardial infarction. Here, a systematic literature review was reported to evaluate the principal features, advantages, and limits (regarding the application) of complement components and MAC in post mortem settings to perform the diagnosis of myocardial ischemia/infar…

0301 basic medicinemedicine.medical_specialtyForensic pathologyClinical BiochemistryInfarctionContext (language use)Reviewischemia/reperfusion injury03 medical and health sciences0302 clinical medicineSettore MED/43 - Medicina LegaleInternal medicinemedicine030216 legal & forensic medicineMyocardial infarctioncomplement systemlcsh:R5-920business.industryC5b-9schemia/reperfusion injuryforensic pathologymedicine.diseaseComplement systempost mortem investigation030104 developmental biologymyocardial infarctionInclusion and exclusion criteriaCardiologyC5b-9; complement system; forensic pathology; ischemia/reperfusion injury; myocardial infarction; post mortem investigationbusinessComplement membrane attack complexlcsh:Medicine (General)Reperfusion injury
researchProduct