Academic literature on the topic 'Decoy Strategy'

Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles

Select a source type:

Consult the lists of relevant articles, books, theses, conference reports, and other scholarly sources on the topic 'Decoy Strategy.'

Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.

You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.

Journal articles on the topic "Decoy Strategy"

1

Seo, Sang, and Dohoon Kim. "OSINT-Based LPC-MTD and HS-Decoy for Organizational Defensive Deception." Applied Sciences 11, no. 8 (2021): 3402. http://dx.doi.org/10.3390/app11083402.

Full text
Abstract:
This study aimed to alleviate the theoretical limitations of existing moving target defense (MTD) and decoy concepts and improve the efficiency of defensive deception technology within an organization. We present the concept of an open-source intelligence (OSINT)-based hierarchical social engineering decoy (HS-Decoy) strategy while considering the actual fingerprint of each organization. In addition, we propose a loosely proactive control-based MTD strategy that is based on the intended competitive exposure of OSINT between defenders and attackers. Existing MTDs and decoys are biased toward pr
APA, Harvard, Vancouver, ISO, and other styles
2

Linsky, Thomas W., Renan Vergara, Nuria Codina, et al. "De novo design of potent and resilient hACE2 decoys to neutralize SARS-CoV-2." Science 370, no. 6521 (2020): 1208–14. http://dx.doi.org/10.1126/science.abe0075.

Full text
Abstract:
We developed a de novo protein design strategy to swiftly engineer decoys for neutralizing pathogens that exploit extracellular host proteins to infect the cell. Our pipeline allowed the design, validation, and optimization of de novo human angiotensin-converting enzyme 2 (hACE2) decoys to neutralize severe acute respiratory syndrome coronavirus 2 (SARS-CoV-2). The best monovalent decoy, CTC-445.2, bound with low nanomolar affinity and high specificity to the receptor-binding domain (RBD) of the spike protein. Cryo–electron microscopy (cryo-EM) showed that the design is accurate and can simult
APA, Harvard, Vancouver, ISO, and other styles
3

Huang, Hesong, Zhongxiang Tong, Taorui Li, Lintong Jia, and Shenbo Li. "Defense Strategy of Aircraft Confronted with IR Guided Missile." Mathematical Problems in Engineering 2017 (2017): 1–9. http://dx.doi.org/10.1155/2017/9070412.

Full text
Abstract:
Surface-type infrared (IR) decoy can simulate the IR characteristics of the target aircraft, which is one of the most effective equipment to confront IR guided missile. In the air combat, the IR guided missile poses a serious threat to the aircraft when it comes from the front of target aircraft. In this paper, firstly, the model of aircraft and surface-type IR decoy is established. To ensure their authenticity, the aircraft maneuver and radiation models based on real data of flight and exhaust system radiation in the state of different heights and different speeds are established. Secondly, t
APA, Harvard, Vancouver, ISO, and other styles
4

Ackerman, Joshua T., John M. Eadie, and Thomas G. Moore. "Does Life History Predict Risk-Taking Behavior of Wintering Dabbling Ducks?" Condor 108, no. 3 (2006): 530–46. http://dx.doi.org/10.1093/condor/108.3.530.

Full text
Abstract:
AbstractLife-history theory predicts that longer-lived, less fecund species should take fewer risks when exposed to predation than shorter-lived, more fecund species. We tested this prediction for seven species of dabbling ducks (Anas) by measuring the approach behavior (behavior of ducks when approaching potential landing sites) of 1099 duck flocks during 37 hunting trials and 491 flocks during 13 trials conducted immediately after the 1999–2000 waterfowl hunting season in California, USA. We also experimentally manipulated the attractiveness of the study site by using two decoy treatments: (
APA, Harvard, Vancouver, ISO, and other styles
5

Kato, K., K. Akeda, S. Miyazaki, et al. "NF-kB decoy oligodeoxynucleotide preserves disc height in a rabbit anular-puncture model and reduces pain induction in a rat xenograft-radiculopathy model." European Cells and Materials 42 (July 20, 2021): 90–109. http://dx.doi.org/10.22203/ecm.v042a07.

Full text
Abstract:
While it is known that the degenerated intervertebral disc (IVD) is one of the primary reasons for low-back pain and subsequent need for medical care, there are currently no established effective methods for direct treatment. Nuclear factor-κB (NF-κB) is a transcription factor that regulates various genes’ expression, among which are inflammatory cytokines, in many tissues including the IVD. NF-κB decoy is an oligodeoxynucleotide containing the NF-κB binding site that entraps NF-κB subunits, resulting in suppression of NF-κB activity. In the present preclinical study, NF-κB decoy was injected
APA, Harvard, Vancouver, ISO, and other styles
6

Bern, Marshall W., and Yong J. Kil. "Two-Dimensional Target Decoy Strategy for Shotgun Proteomics." Journal of Proteome Research 10, no. 12 (2011): 5296–301. http://dx.doi.org/10.1021/pr200780j.

Full text
APA, Harvard, Vancouver, ISO, and other styles
7

Burri Naresh, Et al. "Integrating Enhanced Decoy Technology and User Behavior Profiling for Strengthening Cloud Server Security." International Journal on Recent and Innovation Trends in Computing and Communication 11, no. 8 (2023): 401–8. http://dx.doi.org/10.17762/ijritcc.v11i8.9082.

Full text
Abstract:
Information technology improvements have improved things but also caused security issues, particularly with regard to password file security. Strong security measures are needed for cloud computing, which holds massive amounts of data. This study investigates the possibility of Enhanced Decoy technology and User Behaviour Profiling as a combined strategy to improve cloud server security. Although there are algorithms for both strategies, after recognizing anonymous user behaviour, effectively providing Enhanced Decoy files without raising suspicion is still difficult. In order to provide a com
APA, Harvard, Vancouver, ISO, and other styles
8

Ramasamy, Thiruganesh, Xucai Chen, Bin Qin, Daniel E. Johnson, Jennifer R. Grandis, and Flordeliza S. Villanueva. "STAT3 decoy oligonucleotide-carrying microbubbles with pulsed ultrasound for enhanced therapeutic effect in head and neck tumors." PLOS ONE 15, no. 11 (2020): e0242264. http://dx.doi.org/10.1371/journal.pone.0242264.

Full text
Abstract:
Signal transducer and activator of transcription-3 (STAT3) is an oncogenic transcription factor implicated in carcinogenesis, tumor progression, and drug resistance in head and neck squamous cell carcinoma (HNSCC). A decoy oligonucleotide targeting STAT3 offers a promising anti-tumor strategy, but achieving targeted tumor delivery of the decoy with systemic administration poses a significant challenge. We previously showed the potential for STAT3 decoy-loaded microbubbles, in conjunction with ultrasound targeted microbubble cavitation (UTMC), to decrease tumor growth in murine squamous cell ca
APA, Harvard, Vancouver, ISO, and other styles
9

Tomita, Naruya, Toshio Ogihara, and Ryuichi Morishita. "Therapeutic potential of decoy oligonucleotides strategy in cardiovascular diseases." Expert Review of Cardiovascular Therapy 1, no. 3 (2003): 463–70. http://dx.doi.org/10.1586/14779072.1.3.463.

Full text
APA, Harvard, Vancouver, ISO, and other styles
10

Jia, Dong. "Decoy oligonucleotide technology in fibrosis: Application and delivery strategy." World Chinese Journal of Digestology 23, no. 31 (2015): 4931. http://dx.doi.org/10.11569/wcjd.v23.i31.4931.

Full text
APA, Harvard, Vancouver, ISO, and other styles
More sources
We offer discounts on all premium plans for authors whose works are included in thematic literature selections. Contact us to get a unique promo code!