scholarly journals Metavirome and its functional diversity analysis through microbiome study of the Sikkim Himalayan hot spring solfataric mud sediments

2020 ◽  
Vol 1 ◽  
pp. 18-29 ◽  
Author(s):  
Sayak Das ◽  
Ankita Kumari ◽  
Mingma Thundu Sherpa ◽  
Ishfaq Nabi Najar ◽  
Nagendra Thakur
2017 ◽  
Vol 82 (3) ◽  
pp. 421-430
Author(s):  
ZanGe Jing ◽  
WeiKe Duan ◽  
XiaoMing Song ◽  
Peng Wu ◽  
Jun Tang ◽  
...  

2009 ◽  
Vol 59 (4) ◽  
pp. 710-723 ◽  
Author(s):  
Dawn E. Lewis ◽  
John R. White ◽  
Denis Wafula ◽  
Rana Athar ◽  
Tamar Dickerson ◽  
...  

2003 ◽  
Vol 30 (6) ◽  
pp. 847-877 ◽  
Author(s):  
Richard G. Davies ◽  
Paul Eggleton ◽  
David T. Jones ◽  
Freddy J. Gathorne-Hardy ◽  
Luis M. Hernández

2017 ◽  
Vol 2 (1) ◽  
Author(s):  
Amrita Kumari Panda ◽  
Satpal Singh Bisht ◽  
Bodh Raj Kaushal ◽  
Surajit De Mandal ◽  
Nachimuthu Senthil Kumar ◽  
...  

2013 ◽  
Vol 316-317 ◽  
pp. 618-621
Author(s):  
Shan Li ◽  
Yan Bin Zhu ◽  
Fang Ma ◽  
Deng Xin Li

So far, the study on diversity of microbial community which produces flocculating substances is relatively few. In this paper, soil, activated sludge and wastewater samples are collected from 21 different places, and then are cultivated in 5 different media. 5 different colony groups form large amounts of slime externally, which having high level of flocculation activities. Biolog is used to analysis the functional diversity of microbial communities.The microbial community BF-BCT having highest flocculating capability. The AWCD analysis results shows that the micro be in the BF-BCT utilized more carbons compared with the other six colony groups. In addition, the diversity analysis has similar conclusions with PCA analysis.


2021 ◽  
Vol 27 (1) ◽  
Author(s):  
Hafizul Asad ◽  
Ilir Gashi

AbstractDiverse layers of defence play an important role in the design of defence-in-depth architectures. The use of Intrusion Detection Systems (IDSs) are ubiquitous in this design. But the selection of the “right” IDSs in various configurations is an important decision that the security architects need to make. Additionally, the ability of these IDSs to adapt to the evolving threat-landscape also needs to be investigated. To help with these decisions, we need rigorous quantitative analysis. In this paper, we present a diversity analysis of open-source IDSs, Snort and Suricata, to help security architects tune/deploy these IDSs. We analyse two types of diversities in these IDSs; configurational diversity and functional diversity. In the configurational diversity analysis, we investigate the diversity in the sets of rules and the Blacklisted IP Addresses (BIPAs) these IDSs use in their configurations. The functional diversity analysis investigates the differences in alerting behaviours of these IDSs when they analyse real network traffic, and how these differences evolve. The configurational diversity experiment utilises snapshots of the rules and BIPAs collected over a period of 5 months, from May to October 2017. The snapshots have been collected for three different off-the-shelf default configurations of the Snort IDS and the Emerging Threats (ET) configuration of the Suricata IDS. The functional diversity investigates the alerting behaviour of these two IDSs for a sample of the real network traffic collected in the same time window. Analysing the differences in these systems allows us to get insights into where the diversity in the behaviour of these systems comes from, how does it evolve and whether this has any effect on the alerting behaviour of these IDSs. This analysis gives insight to security architects on how they can combine and layer these systems in a defence-in-depth deployment.


2015 ◽  
Vol 6 ◽  
Author(s):  
Olalla López-López ◽  
Kamila Knapik ◽  
Maria-Esperanza Cerdán ◽  
María-Isabel González-Siso

Sign in / Sign up

Export Citation Format

Share Document