نتایج جستجو برای: compromised host
تعداد نتایج: 237790 فیلتر نتایج به سال:
Disseminated nocardiosis (DN), is an infrequent and severe infection due to Nocardia species and defined as infection in two or more discontinuous organs. Most infections occur in the immunocompromised host or in persons with underlying disease. DN occurs rarely in children. In this report, we describe an 11-year-old immune-compromised child with nocardiosis involving the lung, skin, brain a...
Consensus regarding femoral stem fixation options in revision total knee arthroplasty remains controversial. Tapered, modular, fluted titanium (TMFT) stems have an excellent track record in total hip arthroplasty for their ability to provide axial and rotational stability in situations of compromised host bone. We present 3 successfully treated cases in which the Food & Drug Administration gran...
Security analytics is a catchall term for vulnerability assessment and intrusion detection leveraging security logs from a wide array of Security Analytics Sources (SASs), which include firewalls, VPNs, and endpoint instrumentation. Today, nearly all security analytics systems suffer from a lack of even basic data protections. An adversary can eavesdrop on SAS outputs and advanced malware can u...
disseminated nocardiosis (dn), is an infrequent and severe infection due to nocardia species and defined as infection in two or more discontinuous organs. most infections occur in the immunocompromised host or in persons with underlying disease. dn occurs rarely in children. in this report, we describe an 11-year-old immune-compromised child with nocardiosis involving the lung, skin, brain a...
The study of tumor viruses paves the way for understanding the mechanisms of virus pathogenesis, including those involved in establishing infection and dissemination in the host tumor affecting immune-compromised patients. The processes ranging from viral infection to progressing malignancy are slow and usually insufficient for establishment of transformed cells that develop cancer in only ...
To assure enterprise security, typically a SIEM (Security Information and Event Management) system is built to correlate security events from different preventive technologies and flag alerts. Analysts in a security operations center (SOC) investigate the alerts to decide whether the related hosts are malicious or not. However, the number of alerts is overwhelming which exceeds the SOC’s capaci...
Bacterial pathogens colonize a host plant by growing between the cells by utilizing the nutrients present in apoplastic space. While successful pathogens manipulate the plant cell membrane to retrieve more nutrients from the cell, the counteracting plant defense mechanism against nonhost pathogens to restrict the nutrient efflux into the apoplast is not clear. To identify the genes involved in ...
The area of detecting malicious behavious has been well explored in the following approaches. SPOT focuses on the detection of compromised machines that have been recruited to serve as spam zombies. It is based on sequentially scanning outgoing messages while employing a statistical method Sequential Probability Ratio Test (SPRT), to quickly determine whether a host has been compromised. BotHun...
The gut ecosystem with myriads of microorganisms and the high concentration of immune system cells can be considered as a separate organ on its own. The balanced interaction between the host and microbial cells has been shaped during the long co-evolutionary process. In dysbiotic conditions, however, this balance is compromised and results in abnormal interaction between the host and microbiota...
نمودار تعداد نتایج جستجو در هر سال
با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید