Search

Your search keyword '"Trojan horse"' showing total 1,903 results

Search Constraints

Start Over You searched for: Descriptor "Trojan horse" Remove constraint Descriptor: "Trojan horse"
1,903 results on '"Trojan horse"'

Search Results

2. Location, Location, Location: Establishing Design Principles for New Antibacterials from Ferric Siderophore Transport Systems.

3. Mechanisms and Virulence Factors of Cryptococcus neoformans Dissemination to the Central Nervous System.

4. Spyware Alert System and Image Steganography for Military Application

5. Computer Crime

6. Degradable Mesoporous Silica Nanoparticle/Peptide-Based "Trojan Horse"-like Drug Delivery System for Deep Intratumoral Penetration and Cancer Therapy.

7. Using decision tree classifier to detect Trojan Horse based on memory data.

8. Extended Reality Head-Mounted Displays Are Likely to Pose a Significant Risk in Medical Settings While Current Classification Remains as Non-Critical.

9. Highly biocidal poly(vinyl alcohol)-hydantoin/starch hybrid gels: A "Trojan Horse" for Bacillus subtilis.

10. Mechanisms and Virulence Factors of Cryptococcus neoformans Dissemination to the Central Nervous System

11. Location, Location, Location: Establishing Design Principles for New Antibacterials from Ferric Siderophore Transport Systems

13. Phraseme mythologischen Ursprungs im heutigen Sprachgebrauch – dargestellt an zwei Beispielen

14. Harnessing Transition Metal Scaffolds for Targeted Antibacterial Therapy.

15. Attosecond Pulses from Ionization Injection Wakefield Accelerators.

16. Do mobile phone surfaces carry SARS-CoV-2 virus? A systematic review warranting the inclusion of a "6th" moment of hand hygiene in healthcare.

17. Extended Reality Head-Mounted Displays Are Likely to Pose a Significant Risk in Medical Settings While Current Classification Remains as Non-Critical

18. Modifying antibody-FcRn interactions to increase the transport of antibodies through the blood-brain barrier

19. Fusobacterium nucleatum dissemination by neutrophils

21. Cyber-Awareness for Dummies

22. Cybersecurity and Cybercrime

25. Fault Detection in Floating PV System Using DC Leakage Current

26. Brain gene therapy with Trojan horse lipid nanoparticles.

27. Fuzzy-Based Fault Detection and Classification in Grid-Connected Floating PV System.

28. Can Acanthamoeba Harbor Monkeypox Virus?

29. Harnessing microbial iron chelators to develop innovative therapeutic agents

30. Fusobacterium nucleatum dissemination by neutrophils.

31. Phraseme mythologischen Ursprungs im heutigen Sprachgebrauch - dargestellt an zwei Beispielen.

32. A Therapeutic Sheep in Metastatic Wolf’s Clothing: Trojan Horse Approach for Cancer Brain Metastases Treatment

33. Nanoplastics as competitors of natural colloids in the environment: The case of gadolinium complexes.

34. Attosecond Pulses from Ionization Injection Wakefield Accelerators

35. Characterization of Heterogeneous Malware Contagions in Wireless Sensor Networks: A Case of Uniform Random Distribution

37. A Therapeutic Sheep in Metastatic Wolf’s Clothing: Trojan Horse Approach for Cancer Brain Metastases Treatment.

38. VIRGILIO EN LOS TRÓPICOS: PERVIVENCIAS DEL CABALLO DE TROYA EN ESPEJO DE PACIENCIA DE SILVESTRE DE BALBOA.

39. Cryptococcus neoformans Infection in the Central Nervous System: The Battle between Host and Pathogen.

40. Into the Gates of Troy : A Comparative Study of Antivirus Solutions for the Detection of Trojan Horse Malware.

41. Harnessing microbial iron chelators to develop innovative therapeutic agents.

42. Low efficiency of leucocyte plugging-based drug delivery to cancer in mice.

43. Translation of Vergil's Aeneid -- Bk. II: XL-LVI

44. Host Molecules Regulating Neural Invasion of Zika Virus and Drug Repurposing Strategy.

45. Quasar Remote Access Trojan feature extraction depending on Ethical Hacking.

46. Neutrophils, as 'Trojan horses', participate in the delivery of therapeutical PLGA nanoparticles into a tumor based on the chemotactic effect

47. Engineering of fluorescent or photoactive Trojan probes for detection and eradication of β-Amyloids

48. Host Molecules Regulating Neural Invasion of Zika Virus and Drug Repurposing Strategy

49. Can Acanthamoeba Harbor Monkeypox Virus?

50. Sideromycins as Pathogen-Targeted Antibiotics

Catalog

Books, media, physical & digital resources