Browsing
     by title


0-9 A B C D E F G H I J K L M N O P Q R S T U V W X Y Z

or enter first few letters:   
OK
Peer Reviewed
See detailTrick with Treat – Reciprocity increases the willingness to communicate personal data.
Happ, Christian; Melzer, André UL; Steffgen, Georges UL

Scientific Conference (2016, June)

Information security is a significant challenge for information and communication technologies (ICT). This includes withstanding attempts of social engineering aimed at manipulating people into divulging ... [more ▼]

Information security is a significant challenge for information and communication technologies (ICT). This includes withstanding attempts of social engineering aimed at manipulating people into divulging confidential information. However, many users are lacking awareness of the risks involved with, for example, password security. In a field survey that tested reciprocal behavior in social interactions, 1,208 participants were asked to reveal their personal password. More than one third of the participants shared their password with an unknown interviewer. In line with the social norm of reciprocity, people were more willing to do so when they received a small incentive (i.e., a piece of chocolate) before they were asked to reveal personal information. Elicitation was even more successful when the incentive was given right before asking for the password. The results, including moderating factors (e.g., age, gender), are discussed in the light of security awareness of ICT users and the mechanisms of psychological persuasion. [less ▲]

Detailed reference viewed: 322 (21 UL)
Full Text
Peer Reviewed
See detailTRIDENT: A Three-Steps Strategy to Digitise an Industrial System for Stepping into Industry 4.0
Benedick, Paul-Lou UL; Robert, Jérémy UL; Le Traon, Yves UL

in Proceedings of 45th Annual Conference of the IEEE Industrial Electronics Society (2019)

Detailed reference viewed: 105 (11 UL)
Full Text
Peer Reviewed
See detailA Tridimensional Approach for Studying the Formal Verification of Model Transformations
Amrani, Moussa UL; Lucio, Levi; Selim, Gehan M. K. et al

in Proceedings of the First Workshop on Verification and Validation of Model Transformations (2012)

Detailed reference viewed: 93 (2 UL)
Full Text
See detailDie Trierer Leprosorien Estrich und St. Jost
Uhrmacher, Martin UL

in Uhrmacher, Martin (Ed.) Lepra und Leprosorien im rheinischen Raum vom 12. bis zum 18. Jahrhundert (2011)

Detailed reference viewed: 126 (2 UL)
Full Text
Peer Reviewed
See detailTriggerZoo: A Dataset of Android Applications Automatically Infected with Logic Bombs
Samhi, Jordan UL; Bissyande, Tegawendé François D Assise UL; Klein, Jacques UL

in 19th International Conference on Mining Software Repositories, Data Showcase, (MSR 2022) (2022, May 23)

Many Android apps analyzers rely, among other techniques, on dynamic analysis to monitor their runtime behavior and detect potential security threats. However, malicious developers use subtle, though ... [more ▼]

Many Android apps analyzers rely, among other techniques, on dynamic analysis to monitor their runtime behavior and detect potential security threats. However, malicious developers use subtle, though efficient, techniques to bypass dynamic analyzers. Logic bombs are examples of popular techniques where the malicious code is triggered only under specific circumstances, challenging comprehensive dynamic analyses. The research community has proposed various approaches and tools to detect logic bombs. Unfortunately, rigorous assessment and fair comparison of state-of-the-art techniques are impossible due to the lack of ground truth. In this paper, we present TriggerZoo, a new dataset of 406 Android apps containing logic bombs and benign trigger-based behavior that we release only to the research community using authenticated API. These apps are real-world apps from Google Play that have been automatically infected by our tool AndroBomb. The injected pieces of code implementing the logic bombs cover a large pallet of realistic logic bomb types that we have manually characterized from a set of real logic bombs. Researchers can exploit this dataset as ground truth to assess their approaches and provide comparisons against other tools. [less ▲]

Detailed reference viewed: 103 (11 UL)
Full Text
See detailTrigonometry for the multiples of 3 degrees
Perucca, Antonella UL; Stranen, Deborah UL

Article for general public (2019)

Detailed reference viewed: 74 (8 UL)
Peer Reviewed
See detailThe TRIGR Trial: Testing the Potential Link between Weaning Diet and Type 1 Diabetes
Akerblom, H.K.; Knip, M.; Becker, D. et al

in Immunology, Endocrine and Metabolic Agents - Medicinal Chemistry (2007), 7

Detailed reference viewed: 50 (1 UL)
Peer Reviewed
See detailTrigraph
Weth, Constanze UL

in Neef, Martin; Weingarten, Rüdiger (Eds.) Schriftlinguistik (2019)

Detailed reference viewed: 26 (0 UL)
Full Text
Peer Reviewed
See detailThe trilingual Luxembourgish school system in historical perspective: progress or regress?
Weber, Jean-Jacques UL; Horner, Kristine

in Language, Culture and Curriculum (2012), 25(1), 3-15

Detailed reference viewed: 330 (33 UL)
Full Text
Peer Reviewed
See detailTrilingual Primary Education in Luxembourg
Ehrhart, Sabine UL

in Bangma, Idske; van der Meer, Cor; Riemersma, Alex (Eds.) Trilingual Primary Education in Europe - Some developments with regard to the provisions of trilingual primary education in minority language communities of the European Union (2011)

Detailed reference viewed: 117 (3 UL)
Full Text
Peer Reviewed
See detailTrillingen tijdens het boren van de Hubertustunnel
Van Baars, Stefan UL; Vink, J.W.

in Geotechniek (2009)

Tijdens het boren van de Hubertustunnel in Den Haag zijn geen schadelijke trillingen opgetreden, maar wel onverwachte hinderlijke trillingen. Bij het boorproces in bijvoorbeeld rotsformaties zijn ... [more ▼]

Tijdens het boren van de Hubertustunnel in Den Haag zijn geen schadelijke trillingen opgetreden, maar wel onverwachte hinderlijke trillingen. Bij het boorproces in bijvoorbeeld rotsformaties zijn dergelijke trillingen bekend, maar men had dit niet verwacht in het hier aanwezige strandzand. Uit analyse van de gemeten trillingen blijkt dat de trillingen voornamelijk zijn ontstaan door de stroeve voortgang van de TBM in het zand ten gevolge van het stick-slip effect. Het vooruit schokken van de TBM veroorzaakt hoofdzakelijk trillingen in boorrichting: schuifgolven langs de wand en drukgolven aan het boorfront. [less ▲]

Detailed reference viewed: 73 (0 UL)
Peer Reviewed
See detailTrilostane - a new and effective drug for primary aldosteronism
Neyses, Ludwig UL; Groth, H; Vetter, H et al

in The adrenal gland and hypertension (1985)

Detailed reference viewed: 53 (1 UL)
Full Text
Peer Reviewed
See detailThe TRIM-NHL protein TRIM32 activates microRNAs and prevents self-renewal in mouse neural progenitors.
Schwamborn, Jens Christian UL; Berezikov, Eugene; Knoblich, Juergen A.

in Cell (2009), 136(5), 913-25

In the mouse neocortex, neural progenitor cells generate both differentiating neurons and daughter cells that maintain progenitor fate. Here, we show that the TRIM-NHL protein TRIM32 regulates protein ... [more ▼]

In the mouse neocortex, neural progenitor cells generate both differentiating neurons and daughter cells that maintain progenitor fate. Here, we show that the TRIM-NHL protein TRIM32 regulates protein degradation and microRNA activity to control the balance between those two daughter cell types. In both horizontally and vertically dividing progenitors, TRIM32 becomes polarized in mitosis and is concentrated in one of the two daughter cells. TRIM32 overexpression induces neuronal differentiation while inhibition of TRIM32 causes both daughter cells to retain progenitor cell fate. TRIM32 ubiquitinates and degrades the transcription factor c-Myc but also binds Argonaute-1 and thereby increases the activity of specific microRNAs. We show that Let-7 is one of the TRIM32 targets and is required and sufficient for neuronal differentiation. TRIM32 is the mouse ortholog of Drosophila Brat and Mei-P26 and might be part of a protein family that regulates the balance between differentiation and proliferation in stem cell lineages. [less ▲]

Detailed reference viewed: 200 (6 UL)
Full Text
Peer Reviewed
See detailTRIM32 modulates pluripotency entry and exit by directly regulating Oct4 stability
Bahnassawy, Lamia’a; Perumal, Thanneer; Gonzalez Cano, Laura UL et al

in Scientific Reports (2015)

Detailed reference viewed: 266 (11 UL)
Full Text
Peer Reviewed
See detailTRIM32 regulates skeletal muscle stem cell differentiation and is necessary for normal adult muscle regeneration.
Nicklas, Sarah; Otto, Anthony; Wu, Xiaoli et al

in PLoS ONE (2012), 7(1), 30445

Limb girdle muscular dystrophy type 2H (LGMD2H) is an inherited autosomal recessive disease of skeletal muscle caused by a mutation in the TRIM32 gene. Currently its pathogenesis is entirely unclear ... [more ▼]

Limb girdle muscular dystrophy type 2H (LGMD2H) is an inherited autosomal recessive disease of skeletal muscle caused by a mutation in the TRIM32 gene. Currently its pathogenesis is entirely unclear. Typically the regeneration process of adult skeletal muscle during growth or following injury is controlled by a tissue specific stem cell population termed satellite cells. Given that TRIM32 regulates the fate of mammalian neural progenitor cells through controlling their differentiation, we asked whether TRIM32 could also be essential for the regulation of myogenic stem cells. Here we demonstrate for the first time that TRIM32 is expressed in the skeletal muscle stem cell lineage of adult mice, and that in the absence of TRIM32, myogenic differentiation is disrupted. Moreover, we show that the ubiquitin ligase TRIM32 controls this process through the regulation of c-Myc, a similar mechanism to that previously observed in neural progenitors. Importantly we show that loss of TRIM32 function induces a LGMD2H-like phenotype and strongly affects muscle regeneration in vivo. Our studies implicate that the loss of TRIM32 results in dysfunctional muscle stem cells which could contribute to the development of LGMD2H. [less ▲]

Detailed reference viewed: 189 (3 UL)
Full Text
Peer Reviewed
See detailTRIM32 Senses and Restricts Influenza A Virus by Ubiquitination of PB1 Polymerase
Bishi; Wang, Lingyan; Ding, Hao et al

in PLoS Pathogens (2015)

Detailed reference viewed: 202 (16 UL)