Defense and counter-defense in rice–virus interactions
نویسندگان
چکیده
منابع مشابه
Plants versus Fungi and Oomycetes: Pathogenesis, Defense and Counter-Defense in the Proteomics Era
Plant-fungi and plant-oomycete interactions have been studied at the proteomic level for many decades. However, it is only in the last few years, with the development of new approaches, combined with bioinformatics data mining tools, gel staining, and analytical instruments, such as 2D-PAGE/nanoflow-LC-MS/MS, that proteomic approaches thrived. They allow screening and analysis, at the sub-cellu...
متن کاملMultifaceted defense and counter-defense in co-evolutionary arms race between plants and viruses
ARTICLE HISTORY Received 24 May 2017 Accepted 7 June 2017 ABSTRACT Plants have evolved sophisticated surveillance and defense mechanisms against constant attacks by different types of microbial pathogens including viruses. Nucleotide-based RNA silencing and receptorbased innate immunity constitute the primary plant defense to viral infection. To establish their infections, plant viruses have al...
متن کاملMicroRNA-Mediated Gene Silencing in Plant Defense and Viral Counter-Defense
MicroRNAs (miRNAs) are non-coding RNAs of approximately 20-24 nucleotides in length that serve as central regulators of eukaryotic gene expression by targeting mRNAs for cleavage or translational repression. In plants, miRNAs are associated with numerous regulatory pathways in growth and development processes, and defensive responses in plant-pathogen interactions. Recently, significant progres...
متن کاملViral invasion and host defense: strategies and counter-strategies.
The outcome of infection of plants by viruses is determined by the net effects of compatibility functions and defense responses. Recent advances reveal that viruses have the capacity to modulate host compatibility and defense functions by a variety of mechanisms.
متن کاملAn Automated Defense System to Counter Internet Worms
Our society is highly dependent on network services such as the Web, email, and collaborative P2P enterprise applications. But what if such infrastructures were suddenly torn down? Both past incidents and research studies show that a well-engineered Internet worm can accomplish such a task in a fairly simple way and, most notably, in a matter of a few minutes. This clearly rules out the possibi...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: Phytopathology Research
سال: 2019
ISSN: 2524-4167
DOI: 10.1186/s42483-019-0041-7