-
121
Burkholderia pseudomallei-loaded cells act as a Trojan horse to invade the brain during endotoxemia
Published 2018-09-01“…This study aims to test whether the Trojan horse-like mechanism occurs during endotoxemia. …”
Get full text
Article -
122
The Role and Regulation of Thromboxane A<sub>2</sub> Signaling in Cancer-Trojan Horses and Misdirection
Published 2022-09-01Get full text
Article -
123
Immunoadjuvant Nanoparticles as Trojan Horses for Enhanced Photo-Immunotherapy in the Treatment of Triple-Negative Breast Cancer
Published 2022-05-01“…In this strategy, the self-associated synthesis of spherical GC@ICG significantly improved the stability of ICG and endowed GC with Trojan Horses in tumor cells to enhance tumor immunogenicity. …”
Get full text
Article -
124
Practical Security Bounds against Trojan Horse Attacks in Continuous-Variable Quantum Key Distribution
Published 2020-11-01Subjects: Get full text
Article -
125
Anemonefish use sialic acid metabolism as Trojan horse to avoid giant sea anemone stinging
Published 2025-02-01Get full text
Article -
126
Sub-Coulomb nuclear studies using Indirect Methods: Recent results with the Trojan Horse Method
Published 2024-01-01“…One such technique, the Trojan Horse Method, makes use of transfer reactions to determine cross sections of reactions relevant in stellar burning processes. …”
Get full text
Article -
127
-
128
Recognition of endophytic Trichoderma species by leaf-cutting ants and their potential in a Trojan-horse management strategy
Published 2017-01-01“…These results indicate that endophytic fungi which pose a threat to ant fungal gardens through their antagonistic traits, such as Trichoderma, have the potential to act as bodyguards of their plant hosts and thus might be employed in a Trojan-horse strategy to mitigate the negative impact of leaf-cutting ants in both agriculture and silviculture in the Neotropics. …”
Get full text
Article -
129
Neutrophils, as “Trojan horses”, participate in the delivery of therapeutical PLGA nanoparticles into a tumor based on the chemotactic effect
Published 2020-01-01Subjects: Get full text
Article -
130
Study of 3He(n,p)3H reaction at cosmological energies with trojan horse method
Published 2020-01-01“…In the network of reactions present in the Big Bang nucleosynthesis, the 3He(n, p)3H has an important role which impacts the final 7Li abundance. The Trojan Horse Method (THM) has been applied to the 3He(d, pt)H reaction in order to extract the astrophysical S(E)-factor of the 3He(n, p)3H in the Gamow energy range. …”
Get full text
Article -
131
A Therapeutic Sheep in Metastatic Wolf’s Clothing: Trojan Horse Approach for Cancer Brain Metastases Treatment
Published 2022-04-01Subjects: “…Trojan horse…”
Get full text
Article -
132
The ComP-ComA quorum system is essential for "Trojan horse" like pathogenesis in Bacillus nematocida.
Published 2013-01-01“…Bacillus nematocida B16 has been shown to use "Trojan horse" mechanism in pathogenesis that has characteristics of "social" behavior. …”
Get full text
Article -
133
Study of the 12C +16 O fusion reaction in carbon burning via the Trojan Horse Method
Published 2023-01-01“…To try to solve this uncertainty and corroborate direct measurement the Trojan Horse Method was applied to three-body processes 16O(14N, α24Mg)2H and 16O(14N, p27Al)2H to study the 16O(12C, α)24Mg and 16O(12C, p)27Al reactions.…”
Get full text
Article -
134
Problematising the Official Athens Mosque: Between Mere Place of Worship and 21st Century ‘Trojan Horse’
Published 2021-06-01Get full text
Article -
135
-
136
Brucella abortus Traverses Brain Microvascular Endothelial Cells Using Infected Monocytes as a Trojan Horse
Published 2018-06-01Get full text
Article -
137
-
138
Treating late-onset Tay Sachs disease: Brain delivery with a dual trojan horse protein
Published 2024-09-01Get full text
Article -
139
Research on Clue Mining in Criminal Cases of Smart Phone Trojan Horse under the Background of Information Security
Published 2022-01-01“…At the same time, the basic principles and implementation methods of mobile phone Trojan horse hiding are also studied. Through the research of the broadcast receiver model of the Android platform, the background monitoring principle and implementation technology of the mobile phone Trojan horse are analyzed, and the theoretical foundation and technical support are provided for the implementation of the Trojan horse background monitoring program in this article. …”
Get full text
Article -
140
AVANÇO DO CONSERVADORISMO NO BRASIL: a PEC nº. 181/2015 e o regresso na legislação permissiva do aborto
Published 2018-01-01Subjects: Get full text
Article