Protein networks reveal organ-specific defense strategies in maize in response to an aboveground herbivore

2017 ◽  
Vol 12 (1) ◽  
pp. 147-175 ◽  
Author(s):  
Lina Castano-Duque ◽  
Dawn S. Luthe
2018 ◽  
Vol 44 (7-8) ◽  
pp. 727-745 ◽  
Author(s):  
Lina Castano-Duque ◽  
Anjel Helms ◽  
Jared Gregory Ali ◽  
Dawn S. Luthe

2004 ◽  
Vol 171 (4S) ◽  
pp. 350-350
Author(s):  
Young Ah Goo ◽  
Eugene Yi ◽  
Carrie M. Sorensen ◽  
Leroy E. Hood ◽  
Alvin Y. Liu

2008 ◽  
Vol 2 (4) ◽  
pp. 563-570 ◽  
Author(s):  
Krisztina Hagymási ◽  
Gabriella Lengyel ◽  
Eszter Nagy ◽  
Zsolt Pallai ◽  
Ibolya Kocsis ◽  
...  

2020 ◽  
Author(s):  
Tam ngoc Nguyen

We proposes a new scientific model that enables the ability to collect evidence, and explain the motivations behind people's cyber malicious/ethical behaviors. Existing models mainly focus on detecting already-committed actions and associated response strategies, which is not proactive. That is the reason why little has been done in order to prevent malicious behaviors early, despite the fact that issues like insider threats cost corporations billions of dollars annually, and its time to detection often lasts for more than a year.We address those problems by our main contributions of:+ A better model for ethical/malicious behavioral analysis with a strong focus on understanding people's motivations. + Research results regarding ethical behaviors of more than 200 participants, during the historic Covid-19 pandemic. + Novel attack and defense strategies based on validated model and survey results. + Strategies for continuous model development and integration, utilizing latest technologies such as natural language processing, and machine learning. We employed mixed-mode research approach of: integrating and combining proven behavioral science models, case studying of hackers, survey research, quantitative analysis, and qualitative analysis. For practical deployments, corporations may utilize our model in: improving HR processes and research, prioritizing plans based on the model's informed human behavioral metrics, better analysis in existing or potential cyber insider threat cases, generating more defense tactics in information warfare and so on.


Sign in / Sign up

Export Citation Format

Share Document