“Stealth” tumors

نویسندگان
چکیده

برای دانلود باید عضویت طلایی داشته باشید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

“Stealth” tumors

Breast cancers (BCs) comprise heterogeneous subtypes of various prognoses. An active anti-tumor immune profile usually correlated with a better survival. Two current major challenges of BC research are to understand the inter-relations between BC and anti-tumor immunity, and to identify candidates whose targeting would contribute to enhance anti-tumor efficiency.

متن کامل

Stealth DoS

Users and providers increasingly disagree on what Denial of Service (DoS) is. For example, an ISP might consider large multimedia downloads an attack to overload its infrastructure or have it pay high interconnection fees. On the other hand, a user will certainly consider selective bandwidth reduction that is used by ISPs as a countermeasure, as a DoS measure. Given the nature of their business...

متن کامل

Tobacco Marketing by Stealth

1389 This is an Open Access article distributed under the terms of the Creative Commons Attribution-NonCommercial-NoDerivs licence (http://creativecommons.org/ licenses/by-nc-nd/3.0/), which permits non-commercial reproduction and distribution of the work, in any medium, provided the original work is not altered or transformed in any way, and that the work is properly cited. For commercial re-u...

متن کامل

Introducing Stealth Malware Taxonomy

Introduction At the beginning of this year, at Black Hat Federal Conference, I proposed a simple taxonomy that could be used to classify stealth malware according to how it interacts with the operating system. Since that time I have often referred to this classification as I think it is very useful in designing system integrity verification tools and talking about malware in general. Now I deci...

متن کامل

The herpesvirus stealth program

Immune evasion represents a critical strategy that many viruses have evolved to ensure survival in individual hosts and entire populations. In vertebrates, particularly mammals that are protected by a highly sophisticated immune system, viruses need to antagonize the many defense line drawn after antigen recognition and the ensuing differentiation and proliferation of virus-specific T and B cel...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

ژورنال

عنوان ژورنال: OncoImmunology

سال: 2012

ISSN: 2162-402X

DOI: 10.4161/onci.18528