id sid tid token lemma pos cord-264542-0hu5twhp 1 1 key key JJ cord-264542-0hu5twhp 1 2 : : : cord-264542-0hu5twhp 1 3 cord-264542 cord-264542 NN cord-264542-0hu5twhp 1 4 - - HYPH cord-264542-0hu5twhp 1 5 0hu5twhp 0hu5twhp JJ cord-264542-0hu5twhp 1 6 authors author NNS cord-264542-0hu5twhp 1 7 : : : cord-264542-0hu5twhp 1 8 Mueller Mueller NNP cord-264542-0hu5twhp 1 9 , , , cord-264542-0hu5twhp 1 10 Siguna Siguna NNP cord-264542-0hu5twhp 1 11 title title NN cord-264542-0hu5twhp 1 12 : : : cord-264542-0hu5twhp 1 13 Facing face VBG cord-264542-0hu5twhp 1 14 the the DT cord-264542-0hu5twhp 1 15 2020 2020 CD cord-264542-0hu5twhp 1 16 Pandemic Pandemic NNP cord-264542-0hu5twhp 2 1 : : : cord-264542-0hu5twhp 2 2 What what WP cord-264542-0hu5twhp 2 3 does do VBZ cord-264542-0hu5twhp 2 4 Cyberbiosecurity cyberbiosecurity NN cord-264542-0hu5twhp 2 5 want want VB cord-264542-0hu5twhp 2 6 us -PRON- PRP cord-264542-0hu5twhp 2 7 to to TO cord-264542-0hu5twhp 2 8 know know VB cord-264542-0hu5twhp 2 9 to to TO cord-264542-0hu5twhp 2 10 safeguard safeguard VB cord-264542-0hu5twhp 2 11 the the DT cord-264542-0hu5twhp 2 12 future future NN cord-264542-0hu5twhp 2 13 ? ? . cord-264542-0hu5twhp 3 1 date date NN cord-264542-0hu5twhp 3 2 : : : cord-264542-0hu5twhp 3 3 2020 2020 CD cord-264542-0hu5twhp 3 4 - - HYPH cord-264542-0hu5twhp 3 5 09 09 CD cord-264542-0hu5twhp 3 6 - - SYM cord-264542-0hu5twhp 3 7 25 25 CD cord-264542-0hu5twhp 3 8 journal journal NN cord-264542-0hu5twhp 3 9 : : : cord-264542-0hu5twhp 4 1 Biosaf Biosaf NNP cord-264542-0hu5twhp 4 2 Health Health NNP cord-264542-0hu5twhp 4 3 DOI doi NN cord-264542-0hu5twhp 4 4 : : : cord-264542-0hu5twhp 4 5 10.1016/ 10.1016/ CD cord-264542-0hu5twhp 5 1 j.bsheal.2020.09.007 j.bsheal.2020.09.007 NNP cord-264542-0hu5twhp 5 2 sha sha NN cord-264542-0hu5twhp 5 3 : : : cord-264542-0hu5twhp 5 4 fabbbfb1c0bb41db384a7aa37673e40346d72f2b fabbbfb1c0bb41db384a7aa37673e40346d72f2b NNS cord-264542-0hu5twhp 5 5 doc_id doc_id CD cord-264542-0hu5twhp 5 6 : : : cord-264542-0hu5twhp 5 7 264542 264542 CD cord-264542-0hu5twhp 5 8 cord_uid cord_uid NNS cord-264542-0hu5twhp 5 9 : : : cord-264542-0hu5twhp 5 10 0hu5twhp 0hu5twhp NNP cord-264542-0hu5twhp 5 11 As as IN cord-264542-0hu5twhp 5 12 the the DT cord-264542-0hu5twhp 5 13 entire entire JJ cord-264542-0hu5twhp 5 14 world world NN cord-264542-0hu5twhp 5 15 is be VBZ cord-264542-0hu5twhp 5 16 under under IN cord-264542-0hu5twhp 5 17 the the DT cord-264542-0hu5twhp 5 18 grip grip NN cord-264542-0hu5twhp 5 19 of of IN cord-264542-0hu5twhp 5 20 the the DT cord-264542-0hu5twhp 5 21 Coronavirus Coronavirus NNP cord-264542-0hu5twhp 5 22 diseases disease NNS cord-264542-0hu5twhp 5 23 2019 2019 CD cord-264542-0hu5twhp 5 24 ( ( -LRB- cord-264542-0hu5twhp 5 25 COVID-19 COVID-19 NNP cord-264542-0hu5twhp 5 26 ) ) -RRB- cord-264542-0hu5twhp 5 27 , , , cord-264542-0hu5twhp 5 28 and and CC cord-264542-0hu5twhp 5 29 as as RB cord-264542-0hu5twhp 5 30 many many JJ cord-264542-0hu5twhp 5 31 are be VBP cord-264542-0hu5twhp 5 32 eagerly eagerly RB cord-264542-0hu5twhp 5 33 trying try VBG cord-264542-0hu5twhp 5 34 to to TO cord-264542-0hu5twhp 5 35 explain explain VB cord-264542-0hu5twhp 5 36 the the DT cord-264542-0hu5twhp 5 37 origins origin NNS cord-264542-0hu5twhp 5 38 of of IN cord-264542-0hu5twhp 5 39 the the DT cord-264542-0hu5twhp 5 40 virus virus NN cord-264542-0hu5twhp 5 41 and and CC cord-264542-0hu5twhp 5 42 cause cause NN cord-264542-0hu5twhp 5 43 of of IN cord-264542-0hu5twhp 5 44 the the DT cord-264542-0hu5twhp 5 45 pandemic pandemic NN cord-264542-0hu5twhp 5 46 , , , cord-264542-0hu5twhp 5 47 it -PRON- PRP cord-264542-0hu5twhp 5 48 is be VBZ cord-264542-0hu5twhp 5 49 imperative imperative JJ cord-264542-0hu5twhp 5 50 to to TO cord-264542-0hu5twhp 5 51 place place VB cord-264542-0hu5twhp 5 52 more more JJR cord-264542-0hu5twhp 5 53 attention attention NN cord-264542-0hu5twhp 5 54 on on IN cord-264542-0hu5twhp 5 55 related relate VBN cord-264542-0hu5twhp 5 56 potential potential JJ cord-264542-0hu5twhp 5 57 biosafety biosafety NN cord-264542-0hu5twhp 5 58 risks risk NNS cord-264542-0hu5twhp 5 59 . . . cord-264542-0hu5twhp 6 1 Biology biology NN cord-264542-0hu5twhp 6 2 and and CC cord-264542-0hu5twhp 6 3 biotechnology biotechnology NN cord-264542-0hu5twhp 6 4 have have VBP cord-264542-0hu5twhp 6 5 changed change VBN cord-264542-0hu5twhp 6 6 dramatically dramatically RB cord-264542-0hu5twhp 6 7 during during IN cord-264542-0hu5twhp 6 8 the the DT cord-264542-0hu5twhp 6 9 last last JJ cord-264542-0hu5twhp 6 10 ten ten CD cord-264542-0hu5twhp 6 11 years year NNS cord-264542-0hu5twhp 6 12 or or CC cord-264542-0hu5twhp 6 13 so so RB cord-264542-0hu5twhp 6 14 . . . cord-264542-0hu5twhp 7 1 Their -PRON- PRP$ cord-264542-0hu5twhp 7 2 reliance reliance NN cord-264542-0hu5twhp 7 3 on on IN cord-264542-0hu5twhp 7 4 digitization digitization NN cord-264542-0hu5twhp 7 5 , , , cord-264542-0hu5twhp 7 6 automation automation NN cord-264542-0hu5twhp 7 7 , , , cord-264542-0hu5twhp 7 8 and and CC cord-264542-0hu5twhp 7 9 their -PRON- PRP$ cord-264542-0hu5twhp 7 10 cyber cyber NN cord-264542-0hu5twhp 7 11 - - : cord-264542-0hu5twhp 7 12 overlaps overlap NNS cord-264542-0hu5twhp 7 13 have have VBP cord-264542-0hu5twhp 7 14 created create VBN cord-264542-0hu5twhp 7 15 new new JJ cord-264542-0hu5twhp 7 16 vulnerabilities vulnerability NNS cord-264542-0hu5twhp 7 17 for for IN cord-264542-0hu5twhp 7 18 unintended unintended JJ cord-264542-0hu5twhp 7 19 consequences consequence NNS cord-264542-0hu5twhp 7 20 and and CC cord-264542-0hu5twhp 7 21 potentials potential NNS cord-264542-0hu5twhp 7 22 for for IN cord-264542-0hu5twhp 7 23 intended intend VBN cord-264542-0hu5twhp 7 24 exploitation exploitation NN cord-264542-0hu5twhp 7 25 that that WDT cord-264542-0hu5twhp 7 26 are be VBP cord-264542-0hu5twhp 7 27 largely largely RB cord-264542-0hu5twhp 7 28 under under RB cord-264542-0hu5twhp 7 29 - - HYPH cord-264542-0hu5twhp 7 30 appreciated appreciate VBN cord-264542-0hu5twhp 7 31 . . . cord-264542-0hu5twhp 8 1 Herein herein RB cord-264542-0hu5twhp 8 2 , , , cord-264542-0hu5twhp 8 3 I -PRON- PRP cord-264542-0hu5twhp 8 4 summarize summarize VBP cord-264542-0hu5twhp 8 5 and and CC cord-264542-0hu5twhp 8 6 elaborate elaborate VB cord-264542-0hu5twhp 8 7 on on IN cord-264542-0hu5twhp 8 8 these these DT cord-264542-0hu5twhp 8 9 new new JJ cord-264542-0hu5twhp 8 10 cyberbiosecurity cyberbiosecurity NN cord-264542-0hu5twhp 8 11 challenges challenge NNS cord-264542-0hu5twhp 8 12 , , , cord-264542-0hu5twhp 8 13 ( ( -LRB- cord-264542-0hu5twhp 8 14 1 1 LS cord-264542-0hu5twhp 8 15 ) ) -RRB- cord-264542-0hu5twhp 8 16 in in IN cord-264542-0hu5twhp 8 17 terms term NNS cord-264542-0hu5twhp 8 18 of of IN cord-264542-0hu5twhp 8 19 comprehending comprehend VBG cord-264542-0hu5twhp 8 20 the the DT cord-264542-0hu5twhp 8 21 evolving evolve VBG cord-264542-0hu5twhp 8 22 threat threat NN cord-264542-0hu5twhp 8 23 landscape landscape NN cord-264542-0hu5twhp 8 24 and and CC cord-264542-0hu5twhp 8 25 determining determine VBG cord-264542-0hu5twhp 8 26 new new JJ cord-264542-0hu5twhp 8 27 risk risk NN cord-264542-0hu5twhp 8 28 potentials potential NNS cord-264542-0hu5twhp 8 29 , , , cord-264542-0hu5twhp 8 30 ( ( -LRB- cord-264542-0hu5twhp 8 31 2 2 LS cord-264542-0hu5twhp 8 32 ) ) -RRB- cord-264542-0hu5twhp 8 33 in in IN cord-264542-0hu5twhp 8 34 developing develop VBG cord-264542-0hu5twhp 8 35 adequate adequate JJ cord-264542-0hu5twhp 8 36 safeguarding safeguard VBG cord-264542-0hu5twhp 8 37 measures measure NNS cord-264542-0hu5twhp 8 38 , , , cord-264542-0hu5twhp 8 39 their -PRON- PRP$ cord-264542-0hu5twhp 8 40 validation validation NN cord-264542-0hu5twhp 8 41 and and CC cord-264542-0hu5twhp 8 42 implementation implementation NN cord-264542-0hu5twhp 8 43 , , , cord-264542-0hu5twhp 8 44 and and CC cord-264542-0hu5twhp 8 45 ( ( -LRB- cord-264542-0hu5twhp 8 46 3 3 LS cord-264542-0hu5twhp 8 47 ) ) -RRB- cord-264542-0hu5twhp 8 48 specific specific JJ cord-264542-0hu5twhp 8 49 critical critical JJ cord-264542-0hu5twhp 8 50 dangers danger NNS cord-264542-0hu5twhp 8 51 and and CC cord-264542-0hu5twhp 8 52 consequences consequence NNS cord-264542-0hu5twhp 8 53 , , , cord-264542-0hu5twhp 8 54 many many JJ cord-264542-0hu5twhp 8 55 of of IN cord-264542-0hu5twhp 8 56 them -PRON- PRP cord-264542-0hu5twhp 8 57 unique unique JJ cord-264542-0hu5twhp 8 58 to to IN cord-264542-0hu5twhp 8 59 the the DT cord-264542-0hu5twhp 8 60 life life NN cord-264542-0hu5twhp 8 61 - - HYPH cord-264542-0hu5twhp 8 62 sciences science NNS cord-264542-0hu5twhp 8 63 . . . cord-264542-0hu5twhp 9 1 Drawing draw VBG cord-264542-0hu5twhp 9 2 upon upon IN cord-264542-0hu5twhp 9 3 expertise expertise NN cord-264542-0hu5twhp 9 4 shared share VBN cord-264542-0hu5twhp 9 5 by by IN cord-264542-0hu5twhp 9 6 others other NNS cord-264542-0hu5twhp 9 7 as as RB cord-264542-0hu5twhp 9 8 well well RB cord-264542-0hu5twhp 9 9 as as IN cord-264542-0hu5twhp 9 10 my -PRON- PRP$ cord-264542-0hu5twhp 9 11 previous previous JJ cord-264542-0hu5twhp 9 12 work work NN cord-264542-0hu5twhp 9 13 , , , cord-264542-0hu5twhp 9 14 this this DT cord-264542-0hu5twhp 9 15 article article NN cord-264542-0hu5twhp 9 16 aims aim VBZ cord-264542-0hu5twhp 9 17 to to TO cord-264542-0hu5twhp 9 18 summarize summarize VB cord-264542-0hu5twhp 9 19 and and CC cord-264542-0hu5twhp 9 20 critically critically RB cord-264542-0hu5twhp 9 21 interpret interpret VB cord-264542-0hu5twhp 9 22 the the DT cord-264542-0hu5twhp 9 23 current current JJ cord-264542-0hu5twhp 9 24 situation situation NN cord-264542-0hu5twhp 9 25 of of IN cord-264542-0hu5twhp 9 26 our -PRON- PRP$ cord-264542-0hu5twhp 9 27 bioeconomy bioeconomy NN cord-264542-0hu5twhp 9 28 . . . cord-264542-0hu5twhp 10 1 Herein herein RB cord-264542-0hu5twhp 10 2 , , , cord-264542-0hu5twhp 10 3 the the DT cord-264542-0hu5twhp 10 4 goal goal NN cord-264542-0hu5twhp 10 5 is be VBZ cord-264542-0hu5twhp 10 6 not not RB cord-264542-0hu5twhp 10 7 to to TO cord-264542-0hu5twhp 10 8 attribute attribute VB cord-264542-0hu5twhp 10 9 causative causative JJ cord-264542-0hu5twhp 10 10 aspects aspect NNS cord-264542-0hu5twhp 10 11 of of IN cord-264542-0hu5twhp 10 12 past past JJ cord-264542-0hu5twhp 10 13 biosafety biosafety NN cord-264542-0hu5twhp 10 14 or or CC cord-264542-0hu5twhp 10 15 biosecurity biosecurity NN cord-264542-0hu5twhp 10 16 events event NNS cord-264542-0hu5twhp 10 17 , , , cord-264542-0hu5twhp 10 18 but but CC cord-264542-0hu5twhp 10 19 to to TO cord-264542-0hu5twhp 10 20 highlight highlight VB cord-264542-0hu5twhp 10 21 the the DT cord-264542-0hu5twhp 10 22 fact fact NN cord-264542-0hu5twhp 10 23 that that IN cord-264542-0hu5twhp 10 24 the the DT cord-264542-0hu5twhp 10 25 bioeconomy bioeconomy NNP cord-264542-0hu5twhp 10 26 harbors harbor VBZ cord-264542-0hu5twhp 10 27 unique unique JJ cord-264542-0hu5twhp 10 28 features feature NNS cord-264542-0hu5twhp 10 29 that that WDT cord-264542-0hu5twhp 10 30 have have VBP cord-264542-0hu5twhp 10 31 to to TO cord-264542-0hu5twhp 10 32 be be VB cord-264542-0hu5twhp 10 33 more more RBR cord-264542-0hu5twhp 10 34 critically critically RB cord-264542-0hu5twhp 10 35 assessed assess VBN cord-264542-0hu5twhp 10 36 for for IN cord-264542-0hu5twhp 10 37 their -PRON- PRP$ cord-264542-0hu5twhp 10 38 potential potential NN cord-264542-0hu5twhp 10 39 to to TO cord-264542-0hu5twhp 10 40 unintentionally unintentionally RB cord-264542-0hu5twhp 10 41 cause cause VB cord-264542-0hu5twhp 10 42 harm harm NN cord-264542-0hu5twhp 10 43 to to IN cord-264542-0hu5twhp 10 44 human human JJ cord-264542-0hu5twhp 10 45 health health NN cord-264542-0hu5twhp 10 46 or or CC cord-264542-0hu5twhp 10 47 environment environment NN cord-264542-0hu5twhp 10 48 , , , cord-264542-0hu5twhp 10 49 or or CC cord-264542-0hu5twhp 10 50 to to TO cord-264542-0hu5twhp 10 51 be be VB cord-264542-0hu5twhp 10 52 re re VBN cord-264542-0hu5twhp 10 53 - - VBN cord-264542-0hu5twhp 10 54 tasked task VBN cord-264542-0hu5twhp 10 55 with with IN cord-264542-0hu5twhp 10 56 an an DT cord-264542-0hu5twhp 10 57 intention intention NN cord-264542-0hu5twhp 10 58 to to TO cord-264542-0hu5twhp 10 59 cause cause VB cord-264542-0hu5twhp 10 60 harm harm NN cord-264542-0hu5twhp 10 61 . . . cord-264542-0hu5twhp 11 1 I -PRON- PRP cord-264542-0hu5twhp 11 2 conclude conclude VBP cord-264542-0hu5twhp 11 3 with with IN cord-264542-0hu5twhp 11 4 recommendations recommendation NNS cord-264542-0hu5twhp 11 5 that that WDT cord-264542-0hu5twhp 11 6 will will MD cord-264542-0hu5twhp 11 7 need need VB cord-264542-0hu5twhp 11 8 to to TO cord-264542-0hu5twhp 11 9 be be VB cord-264542-0hu5twhp 11 10 taken take VBN cord-264542-0hu5twhp 11 11 into into IN cord-264542-0hu5twhp 11 12 consideration consideration NN cord-264542-0hu5twhp 11 13 to to TO cord-264542-0hu5twhp 11 14 help help VB cord-264542-0hu5twhp 11 15 ensure ensure VB cord-264542-0hu5twhp 11 16 converging converge VBG cord-264542-0hu5twhp 11 17 and and CC cord-264542-0hu5twhp 11 18 emerging emerge VBG cord-264542-0hu5twhp 11 19 biorisk biorisk NN cord-264542-0hu5twhp 11 20 challenges challenge NNS cord-264542-0hu5twhp 11 21 , , , cord-264542-0hu5twhp 11 22 in in IN cord-264542-0hu5twhp 11 23 order order NN cord-264542-0hu5twhp 11 24 to to TO cord-264542-0hu5twhp 11 25 minimize minimize VB cord-264542-0hu5twhp 11 26 vulnerabilities vulnerability NNS cord-264542-0hu5twhp 11 27 to to IN cord-264542-0hu5twhp 11 28 the the DT cord-264542-0hu5twhp 11 29 life life NN cord-264542-0hu5twhp 11 30 - - HYPH cord-264542-0hu5twhp 11 31 science science NN cord-264542-0hu5twhp 11 32 enterprise enterprise NN cord-264542-0hu5twhp 11 33 , , , cord-264542-0hu5twhp 11 34 public public JJ cord-264542-0hu5twhp 11 35 health health NN cord-264542-0hu5twhp 11 36 , , , cord-264542-0hu5twhp 11 37 and and CC cord-264542-0hu5twhp 11 38 national national JJ cord-264542-0hu5twhp 11 39 security security NN cord-264542-0hu5twhp 11 40 . . . cord-264542-0hu5twhp 12 1 Ever ever RB cord-264542-0hu5twhp 12 2 since since IN cord-264542-0hu5twhp 12 3 the the DT cord-264542-0hu5twhp 12 4 Coronavirus Coronavirus NNP cord-264542-0hu5twhp 12 5 diseases disease NNS cord-264542-0hu5twhp 12 6 2019 2019 CD cord-264542-0hu5twhp 13 1 ( ( -LRB- cord-264542-0hu5twhp 13 2 COVID- covid- NN cord-264542-0hu5twhp 13 3 19 19 CD cord-264542-0hu5twhp 13 4 ) ) -RRB- cord-264542-0hu5twhp 13 5 pandemic pandemic NN cord-264542-0hu5twhp 13 6 , , , cord-264542-0hu5twhp 13 7 ( ( -LRB- cord-264542-0hu5twhp 13 8 laboratory laboratory NN cord-264542-0hu5twhp 13 9 ) ) -RRB- cord-264542-0hu5twhp 13 10 biosafety biosafety NN cord-264542-0hu5twhp 13 11 and and CC cord-264542-0hu5twhp 13 12 biosecurity biosecurity NN cord-264542-0hu5twhp 13 13 concerns concern NNS cord-264542-0hu5twhp 13 14 are be VBP cord-264542-0hu5twhp 13 15 even even RB cord-264542-0hu5twhp 13 16 more more RBR cord-264542-0hu5twhp 13 17 rigorously rigorously RB cord-264542-0hu5twhp 13 18 scrutinized scrutinize VBN cord-264542-0hu5twhp 13 19 . . . cord-264542-0hu5twhp 14 1 This this DT cord-264542-0hu5twhp 14 2 article article NN cord-264542-0hu5twhp 14 3 uses use VBZ cord-264542-0hu5twhp 14 4 the the DT cord-264542-0hu5twhp 14 5 lens lens NN cord-264542-0hu5twhp 14 6 of of IN cord-264542-0hu5twhp 14 7 the the DT cord-264542-0hu5twhp 14 8 current current JJ cord-264542-0hu5twhp 14 9 pandemic pandemic NN cord-264542-0hu5twhp 14 10 to to TO cord-264542-0hu5twhp 14 11 evaluate evaluate VB cord-264542-0hu5twhp 14 12 biological biological JJ cord-264542-0hu5twhp 14 13 risks risk NNS cord-264542-0hu5twhp 14 14 from from IN cord-264542-0hu5twhp 14 15 biological biological JJ cord-264542-0hu5twhp 14 16 research research NN cord-264542-0hu5twhp 14 17 , , , cord-264542-0hu5twhp 14 18 particularly particularly RB cord-264542-0hu5twhp 14 19 those those DT cord-264542-0hu5twhp 14 20 that that WDT cord-264542-0hu5twhp 14 21 are be VBP cord-264542-0hu5twhp 14 22 amplified amplify VBN cord-264542-0hu5twhp 14 23 by by IN cord-264542-0hu5twhp 14 24 the the DT cord-264542-0hu5twhp 14 25 digitization digitization NN cord-264542-0hu5twhp 14 26 of of IN cord-264542-0hu5twhp 14 27 biological biological JJ cord-264542-0hu5twhp 14 28 information information NN cord-264542-0hu5twhp 14 29 and and CC cord-264542-0hu5twhp 14 30 biotechnology biotechnology NN cord-264542-0hu5twhp 14 31 automation automation NN cord-264542-0hu5twhp 14 32 . . . cord-264542-0hu5twhp 15 1 The the DT cord-264542-0hu5twhp 15 2 cyberphysical cyberphysical JJ cord-264542-0hu5twhp 15 3 nature nature NN cord-264542-0hu5twhp 15 4 of of IN cord-264542-0hu5twhp 15 5 biotechnology biotechnology NN cord-264542-0hu5twhp 15 6 has have VBZ cord-264542-0hu5twhp 15 7 led lead VBN cord-264542-0hu5twhp 15 8 to to IN cord-264542-0hu5twhp 15 9 fascinating fascinating JJ cord-264542-0hu5twhp 15 10 advances advance NNS cord-264542-0hu5twhp 15 11 throughout throughout IN cord-264542-0hu5twhp 15 12 the the DT cord-264542-0hu5twhp 15 13 bioscience bioscience NN cord-264542-0hu5twhp 15 14 field field NN cord-264542-0hu5twhp 15 15 . . . cord-264542-0hu5twhp 16 1 Only only RB cord-264542-0hu5twhp 16 2 recently recently RB cord-264542-0hu5twhp 16 3 , , , cord-264542-0hu5twhp 16 4 concerns concern NNS cord-264542-0hu5twhp 16 5 have have VBP cord-264542-0hu5twhp 16 6 been be VBN cord-264542-0hu5twhp 16 7 raised raise VBN cord-264542-0hu5twhp 16 8 regarding regard VBG cord-264542-0hu5twhp 16 9 new new JJ cord-264542-0hu5twhp 16 10 risks risk NNS cord-264542-0hu5twhp 16 11 that that WDT cord-264542-0hu5twhp 16 12 may may MD cord-264542-0hu5twhp 16 13 lead lead VB cord-264542-0hu5twhp 16 14 to to IN cord-264542-0hu5twhp 16 15 unintended unintended JJ cord-264542-0hu5twhp 16 16 consequences consequence NNS cord-264542-0hu5twhp 16 17 or or CC cord-264542-0hu5twhp 16 18 unrecognized unrecognized JJ cord-264542-0hu5twhp 16 19 potentials potential NNS cord-264542-0hu5twhp 16 20 for for IN cord-264542-0hu5twhp 16 21 misuse misuse NN cord-264542-0hu5twhp 16 22 . . . cord-264542-0hu5twhp 17 1 Just just RB cord-264542-0hu5twhp 17 2 as as IN cord-264542-0hu5twhp 17 3 the the DT cord-264542-0hu5twhp 17 4 emergence emergence NN cord-264542-0hu5twhp 17 5 of of IN cord-264542-0hu5twhp 17 6 the the DT cord-264542-0hu5twhp 17 7 internet internet NN cord-264542-0hu5twhp 17 8 some some DT cord-264542-0hu5twhp 17 9 decades decade NNS cord-264542-0hu5twhp 17 10 ago ago RB cord-264542-0hu5twhp 17 11 led lead VBD cord-264542-0hu5twhp 17 12 to to IN cord-264542-0hu5twhp 17 13 a a DT cord-264542-0hu5twhp 17 14 major major JJ cord-264542-0hu5twhp 17 15 revolution revolution NN cord-264542-0hu5twhp 17 16 -which -which NN cord-264542-0hu5twhp 17 17 , , , cord-264542-0hu5twhp 17 18 by by IN cord-264542-0hu5twhp 17 19 necessity necessity NN cord-264542-0hu5twhp 17 20 was be VBD cord-264542-0hu5twhp 17 21 paralleled parallel VBN cord-264542-0hu5twhp 17 22 by by IN cord-264542-0hu5twhp 17 23 the the DT cord-264542-0hu5twhp 17 24 field field NN cord-264542-0hu5twhp 17 25 of of IN cord-264542-0hu5twhp 17 26 cybersecurity cybersecurity NN cord-264542-0hu5twhp 17 27 -we -we : cord-264542-0hu5twhp 17 28 are be VBP cord-264542-0hu5twhp 17 29 now now RB cord-264542-0hu5twhp 17 30 facing face VBG cord-264542-0hu5twhp 17 31 the the DT cord-264542-0hu5twhp 17 32 era era NN cord-264542-0hu5twhp 17 33 of of IN cord-264542-0hu5twhp 17 34 cyber cyber JJ cord-264542-0hu5twhp 17 35 biosecurity biosecurity NN cord-264542-0hu5twhp 17 36 2 2 CD cord-264542-0hu5twhp 17 37 with with IN cord-264542-0hu5twhp 17 38 its -PRON- PRP$ cord-264542-0hu5twhp 17 39 own own JJ cord-264542-0hu5twhp 17 40 security security NN cord-264542-0hu5twhp 17 41 vulnerabilities vulnerability NNS cord-264542-0hu5twhp 17 42 . . . cord-264542-0hu5twhp 18 1 The the DT cord-264542-0hu5twhp 18 2 DNA dna NN cord-264542-0hu5twhp 18 3 synthesis synthesis NN cord-264542-0hu5twhp 18 4 industry industry NN cord-264542-0hu5twhp 18 5 has have VBZ cord-264542-0hu5twhp 18 6 worked work VBN cord-264542-0hu5twhp 18 7 proactively proactively RB cord-264542-0hu5twhp 18 8 for for IN cord-264542-0hu5twhp 18 9 many many JJ cord-264542-0hu5twhp 18 10 years year NNS cord-264542-0hu5twhp 18 11 to to TO cord-264542-0hu5twhp 18 12 ensure ensure VB cord-264542-0hu5twhp 18 13 that that IN cord-264542-0hu5twhp 18 14 synthesis synthesis NN cord-264542-0hu5twhp 18 15 is be VBZ cord-264542-0hu5twhp 18 16 carried carry VBN cord-264542-0hu5twhp 18 17 out out RP cord-264542-0hu5twhp 18 18 securely securely RB cord-264542-0hu5twhp 18 19 and and CC cord-264542-0hu5twhp 18 20 safely safely RB cord-264542-0hu5twhp 18 21 3 3 CD cord-264542-0hu5twhp 18 22 . . . cord-264542-0hu5twhp 19 1 These these DT cord-264542-0hu5twhp 19 2 efforts effort NNS cord-264542-0hu5twhp 19 3 have have VBP cord-264542-0hu5twhp 19 4 been be VBN cord-264542-0hu5twhp 19 5 complemented complement VBN cord-264542-0hu5twhp 19 6 by by IN cord-264542-0hu5twhp 19 7 the the DT cord-264542-0hu5twhp 19 8 growing grow VBG cord-264542-0hu5twhp 19 9 desire desire NN cord-264542-0hu5twhp 19 10 and and CC cord-264542-0hu5twhp 19 11 capability capability NN cord-264542-0hu5twhp 19 12 to to TO cord-264542-0hu5twhp 19 13 resynthesize resynthesize VB cord-264542-0hu5twhp 19 14 biological biological JJ cord-264542-0hu5twhp 19 15 material material NN cord-264542-0hu5twhp 19 16 using use VBG cord-264542-0hu5twhp 19 17 digital digital JJ cord-264542-0hu5twhp 19 18 resources resource NNS cord-264542-0hu5twhp 19 19 [ [ -LRB- cord-264542-0hu5twhp 19 20 1 1 CD cord-264542-0hu5twhp 19 21 , , , cord-264542-0hu5twhp 19 22 2 2 CD cord-264542-0hu5twhp 19 23 ] ] -RRB- cord-264542-0hu5twhp 19 24 . . . cord-264542-0hu5twhp 20 1 Yet yet RB cord-264542-0hu5twhp 20 2 , , , cord-264542-0hu5twhp 20 3 the the DT cord-264542-0hu5twhp 20 4 convergence convergence NN cord-264542-0hu5twhp 20 5 of of IN cord-264542-0hu5twhp 20 6 technologies technology NNS cord-264542-0hu5twhp 20 7 at at IN cord-264542-0hu5twhp 20 8 the the DT cord-264542-0hu5twhp 20 9 nexus nexus NN cord-264542-0hu5twhp 20 10 of of IN cord-264542-0hu5twhp 20 11 life life NN cord-264542-0hu5twhp 20 12 and and CC cord-264542-0hu5twhp 20 13 medical medical JJ cord-264542-0hu5twhp 20 14 sciences science NNS cord-264542-0hu5twhp 20 15 , , , cord-264542-0hu5twhp 20 16 cyber cyber NNP cord-264542-0hu5twhp 20 17 , , , cord-264542-0hu5twhp 20 18 cyberphysical cyberphysical JJ cord-264542-0hu5twhp 20 19 , , , cord-264542-0hu5twhp 20 20 supply supply NN cord-264542-0hu5twhp 20 21 chain chain NN cord-264542-0hu5twhp 20 22 and and CC cord-264542-0hu5twhp 20 23 infrastructure infrastructure NN cord-264542-0hu5twhp 20 24 systems system NNS cord-264542-0hu5twhp 20 25 [ [ -LRB- cord-264542-0hu5twhp 20 26 3 3 CD cord-264542-0hu5twhp 20 27 ] ] -RRB- cord-264542-0hu5twhp 20 28 , , , cord-264542-0hu5twhp 20 29 has have VBZ cord-264542-0hu5twhp 20 30 led lead VBN cord-264542-0hu5twhp 20 31 to to IN cord-264542-0hu5twhp 20 32 new new JJ cord-264542-0hu5twhp 20 33 security security NN cord-264542-0hu5twhp 20 34 problems problem NNS cord-264542-0hu5twhp 20 35 that that WDT cord-264542-0hu5twhp 20 36 have have VBP cord-264542-0hu5twhp 20 37 remained remain VBN cord-264542-0hu5twhp 20 38 elusive elusive JJ cord-264542-0hu5twhp 20 39 to to IN cord-264542-0hu5twhp 20 40 the the DT cord-264542-0hu5twhp 20 41 majority majority NN cord-264542-0hu5twhp 20 42 of of IN cord-264542-0hu5twhp 20 43 the the DT cord-264542-0hu5twhp 20 44 scientific scientific JJ cord-264542-0hu5twhp 20 45 , , , cord-264542-0hu5twhp 20 46 agricultural agricultural JJ cord-264542-0hu5twhp 20 47 , , , cord-264542-0hu5twhp 20 48 and and CC cord-264542-0hu5twhp 20 49 health health NN cord-264542-0hu5twhp 20 50 communities community NNS cord-264542-0hu5twhp 20 51 . . . cord-264542-0hu5twhp 21 1 It -PRON- PRP cord-264542-0hu5twhp 21 2 has have VBZ cord-264542-0hu5twhp 21 3 only only RB cord-264542-0hu5twhp 21 4 been be VBN cord-264542-0hu5twhp 21 5 during during IN cord-264542-0hu5twhp 21 6 the the DT cord-264542-0hu5twhp 21 7 last last JJ cord-264542-0hu5twhp 21 8 few few JJ cord-264542-0hu5twhp 21 9 years year NNS cord-264542-0hu5twhp 21 10 , , , cord-264542-0hu5twhp 21 11 that that DT cord-264542-0hu5twhp 21 12 awareness awareness NN cord-264542-0hu5twhp 21 13 of of IN cord-264542-0hu5twhp 21 14 these these DT cord-264542-0hu5twhp 21 15 new new JJ cord-264542-0hu5twhp 21 16 types type NNS cord-264542-0hu5twhp 21 17 of of IN cord-264542-0hu5twhp 21 18 vulnerabilities vulnerability NNS cord-264542-0hu5twhp 21 19 is be VBZ cord-264542-0hu5twhp 21 20 growing grow VBG cord-264542-0hu5twhp 21 21 , , , cord-264542-0hu5twhp 21 22 especially especially RB cord-264542-0hu5twhp 21 23 related related JJ cord-264542-0hu5twhp 21 24 to to IN cord-264542-0hu5twhp 21 25 the the DT cord-264542-0hu5twhp 21 26 danger danger NN cord-264542-0hu5twhp 21 27 of of IN cord-264542-0hu5twhp 21 28 intended intend VBN cord-264542-0hu5twhp 21 29 manipulations manipulation NNS cord-264542-0hu5twhp 21 30 . . . cord-264542-0hu5twhp 22 1 As as IN cord-264542-0hu5twhp 22 2 these these DT cord-264542-0hu5twhp 22 3 concerns concern NNS cord-264542-0hu5twhp 22 4 have have VBP cord-264542-0hu5twhp 22 5 spawned spawn VBN cord-264542-0hu5twhp 22 6 the the DT cord-264542-0hu5twhp 22 7 emergence emergence NN cord-264542-0hu5twhp 22 8 of of IN cord-264542-0hu5twhp 22 9 cyberbiosecurity cyberbiosecurity NN cord-264542-0hu5twhp 22 10 as as IN cord-264542-0hu5twhp 22 11 a a DT cord-264542-0hu5twhp 22 12 new new JJ cord-264542-0hu5twhp 22 13 discipline discipline NN cord-264542-0hu5twhp 22 14 , , , cord-264542-0hu5twhp 22 15 it -PRON- PRP cord-264542-0hu5twhp 22 16 is be VBZ cord-264542-0hu5twhp 22 17 important important JJ cord-264542-0hu5twhp 22 18 to to TO cord-264542-0hu5twhp 22 19 realize realize VB cord-264542-0hu5twhp 22 20 that that IN cord-264542-0hu5twhp 22 21 its -PRON- PRP$ cord-264542-0hu5twhp 22 22 focus focus NN cord-264542-0hu5twhp 22 23 is be VBZ cord-264542-0hu5twhp 22 24 not not RB cord-264542-0hu5twhp 22 25 merely merely RB cord-264542-0hu5twhp 22 26 on on IN cord-264542-0hu5twhp 22 27 traditional traditional JJ cord-264542-0hu5twhp 22 28 cyber cyber NN cord-264542-0hu5twhp 22 29 - - HYPH cord-264542-0hu5twhp 22 30 attacks attack NNS cord-264542-0hu5twhp 22 31 ( ( -LRB- cord-264542-0hu5twhp 22 32 Sect Sect NNP cord-264542-0hu5twhp 22 33 . . NNP cord-264542-0hu5twhp 22 34 2 2 CD cord-264542-0hu5twhp 22 35 and and CC cord-264542-0hu5twhp 22 36 Fig Fig NNP cord-264542-0hu5twhp 22 37 . . . cord-264542-0hu5twhp 23 1 1 1 CD cord-264542-0hu5twhp 23 2 below below RB cord-264542-0hu5twhp 23 3 ) ) -RRB- cord-264542-0hu5twhp 23 4 . . . cord-264542-0hu5twhp 24 1 Due due IN cord-264542-0hu5twhp 24 2 to to IN cord-264542-0hu5twhp 24 3 the the DT cord-264542-0hu5twhp 24 4 increased increase VBN cord-264542-0hu5twhp 24 5 reliance reliance NN cord-264542-0hu5twhp 24 6 of of IN cord-264542-0hu5twhp 24 7 the the DT cord-264542-0hu5twhp 24 8 bioscience bioscience NN cord-264542-0hu5twhp 24 9 fields field NNS cord-264542-0hu5twhp 24 10 on on IN cord-264542-0hu5twhp 24 11 cyberphysical cyberphysical JJ cord-264542-0hu5twhp 24 12 systems system NNS cord-264542-0hu5twhp 24 13 ( ( -LRB- cord-264542-0hu5twhp 24 14 CPS CPS NNP cord-264542-0hu5twhp 24 15 , , , cord-264542-0hu5twhp 24 16 Fig Fig NNP cord-264542-0hu5twhp 24 17 . . . cord-264542-0hu5twhp 24 18 _SP cord-264542-0hu5twhp 24 19 3 3 CD cord-264542-0hu5twhp 24 20 below below IN cord-264542-0hu5twhp 24 21 ) ) -RRB- cord-264542-0hu5twhp 24 22 , , , cord-264542-0hu5twhp 24 23 potentials potential NNS cord-264542-0hu5twhp 24 24 for for IN cord-264542-0hu5twhp 24 25 exploitation exploitation NN cord-264542-0hu5twhp 24 26 exist exist VBP cord-264542-0hu5twhp 24 27 at at IN cord-264542-0hu5twhp 24 28 each each DT cord-264542-0hu5twhp 24 29 point point NN cord-264542-0hu5twhp 24 30 where where WRB cord-264542-0hu5twhp 24 31 bioengineered bioengineere VBN cord-264542-0hu5twhp 24 32 or or CC cord-264542-0hu5twhp 24 33 biomanufactured biomanufacture VBN cord-264542-0hu5twhp 24 34 processes process NNS cord-264542-0hu5twhp 24 35 or or CC cord-264542-0hu5twhp 24 36 services service NNS cord-264542-0hu5twhp 24 37 interface interface NN cord-264542-0hu5twhp 24 38 with with IN cord-264542-0hu5twhp 24 39 the the DT cord-264542-0hu5twhp 24 40 cyber cyber NN cord-264542-0hu5twhp 24 41 and and CC cord-264542-0hu5twhp 24 42 the the DT cord-264542-0hu5twhp 24 43 physical physical JJ cord-264542-0hu5twhp 24 44 domain domain NN cord-264542-0hu5twhp 24 45 , , , cord-264542-0hu5twhp 24 46 whereby whereby WRB cord-264542-0hu5twhp 24 47 attackers attacker NNS cord-264542-0hu5twhp 24 48 may may MD cord-264542-0hu5twhp 24 49 exploit exploit VB cord-264542-0hu5twhp 24 50 unsecured unsecured JJ cord-264542-0hu5twhp 24 51 networks network NNS cord-264542-0hu5twhp 24 52 and and CC cord-264542-0hu5twhp 24 53 remotely remotely RB cord-264542-0hu5twhp 24 54 manipulate manipulate VB cord-264542-0hu5twhp 24 55 biologic biologic JJ cord-264542-0hu5twhp 24 56 data datum NNS cord-264542-0hu5twhp 24 57 , , , cord-264542-0hu5twhp 24 58 exploit exploit VB cord-264542-0hu5twhp 24 59 biologic biologic JJ cord-264542-0hu5twhp 24 60 agents agent NNS cord-264542-0hu5twhp 24 61 , , , cord-264542-0hu5twhp 24 62 or or CC cord-264542-0hu5twhp 24 63 affect affect VB cord-264542-0hu5twhp 24 64 physical physical JJ cord-264542-0hu5twhp 24 65 processing processing NN cord-264542-0hu5twhp 24 66 involving involve VBG cord-264542-0hu5twhp 24 67 biological biological JJ cord-264542-0hu5twhp 24 68 materials material NNS cord-264542-0hu5twhp 24 69 , , , cord-264542-0hu5twhp 24 70 that that DT cord-264542-0hu5twhp 24 71 result result NN cord-264542-0hu5twhp 24 72 ( ( -LRB- cord-264542-0hu5twhp 24 73 whether whether IN cord-264542-0hu5twhp 24 74 intentionally intentionally RB cord-264542-0hu5twhp 24 75 or or CC cord-264542-0hu5twhp 24 76 unintentionally unintentionally RB cord-264542-0hu5twhp 24 77 ) ) -RRB- cord-264542-0hu5twhp 24 78 in in IN cord-264542-0hu5twhp 24 79 unwanted unwanted JJ cord-264542-0hu5twhp 24 80 or or CC cord-264542-0hu5twhp 24 81 dangerous dangerous JJ cord-264542-0hu5twhp 24 82 biological biological JJ cord-264542-0hu5twhp 24 83 outcomes outcome NNS cord-264542-0hu5twhp 24 84 [ [ -LRB- cord-264542-0hu5twhp 24 85 4 4 CD cord-264542-0hu5twhp 24 86 , , , cord-264542-0hu5twhp 24 87 5 5 CD cord-264542-0hu5twhp 24 88 , , , cord-264542-0hu5twhp 24 89 6 6 CD cord-264542-0hu5twhp 24 90 , , , cord-264542-0hu5twhp 24 91 7 7 CD cord-264542-0hu5twhp 24 92 ] ] -RRB- cord-264542-0hu5twhp 24 93 . . . cord-264542-0hu5twhp 25 1 Great great JJ cord-264542-0hu5twhp 25 2 efforts effort NNS cord-264542-0hu5twhp 25 3 have have VBP cord-264542-0hu5twhp 25 4 been be VBN cord-264542-0hu5twhp 25 5 put put VBN cord-264542-0hu5twhp 25 6 into into IN cord-264542-0hu5twhp 25 7 place place NN cord-264542-0hu5twhp 25 8 to to TO cord-264542-0hu5twhp 25 9 rigorously rigorously RB cord-264542-0hu5twhp 25 10 assess assess VB cord-264542-0hu5twhp 25 11 the the DT cord-264542-0hu5twhp 25 12 new new JJ cord-264542-0hu5twhp 25 13 risks risk NNS cord-264542-0hu5twhp 25 14 and and CC cord-264542-0hu5twhp 25 15 threats threat NNS cord-264542-0hu5twhp 25 16 ( ( -LRB- cord-264542-0hu5twhp 25 17 see see VB cord-264542-0hu5twhp 25 18 in in IN cord-264542-0hu5twhp 25 19 particular particular JJ cord-264542-0hu5twhp 25 20 [ [ -LRB- cord-264542-0hu5twhp 25 21 3 3 CD cord-264542-0hu5twhp 25 22 ] ] -RRB- cord-264542-0hu5twhp 25 23 and and CC cord-264542-0hu5twhp 25 24 the the DT cord-264542-0hu5twhp 25 25 recent recent JJ cord-264542-0hu5twhp 25 26 National National NNP cord-264542-0hu5twhp 25 27 Academy Academy NNP cord-264542-0hu5twhp 25 28 of of IN cord-264542-0hu5twhp 25 29 Sciences Sciences NNPS cord-264542-0hu5twhp 25 30 , , , cord-264542-0hu5twhp 25 31 Engineering Engineering NNP cord-264542-0hu5twhp 25 32 , , , cord-264542-0hu5twhp 25 33 and and CC cord-264542-0hu5twhp 25 34 Medicine Medicine NNP cord-264542-0hu5twhp 25 35 report report NN cord-264542-0hu5twhp 25 36 " " `` cord-264542-0hu5twhp 25 37 Safeguarding safeguard VBG cord-264542-0hu5twhp 25 38 the the DT cord-264542-0hu5twhp 25 39 Bioeconomy Bioeconomy NNP cord-264542-0hu5twhp 25 40 " " '' cord-264542-0hu5twhp 25 41 [ [ -LRB- cord-264542-0hu5twhp 25 42 7 7 CD cord-264542-0hu5twhp 25 43 , , , cord-264542-0hu5twhp 25 44 pp.204 pp.204 NNP cord-264542-0hu5twhp 25 45 - - HYPH cord-264542-0hu5twhp 25 46 211 211 CD cord-264542-0hu5twhp 25 47 ] ] -RRB- cord-264542-0hu5twhp 25 48 ) ) -RRB- cord-264542-0hu5twhp 25 49 . . . cord-264542-0hu5twhp 26 1 Nonetheless nonetheless RB cord-264542-0hu5twhp 26 2 , , , cord-264542-0hu5twhp 26 3 cyberbiosecurity cyberbiosecurity NN cord-264542-0hu5twhp 26 4 is be VBZ cord-264542-0hu5twhp 26 5 still still RB cord-264542-0hu5twhp 26 6 in in IN cord-264542-0hu5twhp 26 7 its -PRON- PRP$ cord-264542-0hu5twhp 26 8 infancy infancy NN cord-264542-0hu5twhp 26 9 . . . cord-264542-0hu5twhp 27 1 There there EX cord-264542-0hu5twhp 27 2 is be VBZ cord-264542-0hu5twhp 27 3 still still RB cord-264542-0hu5twhp 27 4 limited limit VBN cord-264542-0hu5twhp 27 5 expertise expertise NN cord-264542-0hu5twhp 27 6 to to TO cord-264542-0hu5twhp 27 7 fully fully RB cord-264542-0hu5twhp 27 8 characterize characterize VB cord-264542-0hu5twhp 27 9 and and CC cord-264542-0hu5twhp 27 10 assess assess VB cord-264542-0hu5twhp 27 11 the the DT cord-264542-0hu5twhp 27 12 emerging emerge VBG cord-264542-0hu5twhp 27 13 cyberbio cyberbio NN cord-264542-0hu5twhp 27 14 risks risk NNS cord-264542-0hu5twhp 27 15 [ [ -LRB- cord-264542-0hu5twhp 27 16 8 8 CD cord-264542-0hu5twhp 27 17 ] ] -RRB- cord-264542-0hu5twhp 27 18 , , , cord-264542-0hu5twhp 27 19 and and CC cord-264542-0hu5twhp 27 20 it -PRON- PRP cord-264542-0hu5twhp 27 21 has have VBZ cord-264542-0hu5twhp 27 22 been be VBN cord-264542-0hu5twhp 27 23 recognized recognize VBN cord-264542-0hu5twhp 27 24 that that IN cord-264542-0hu5twhp 27 25 generic generic JJ cord-264542-0hu5twhp 27 26 cyber cyber NN cord-264542-0hu5twhp 27 27 and and CC cord-264542-0hu5twhp 27 28 information information NN cord-264542-0hu5twhp 27 29 security security NN cord-264542-0hu5twhp 27 30 measures measure NNS cord-264542-0hu5twhp 27 31 are be VBP cord-264542-0hu5twhp 27 32 insufficient insufficient JJ cord-264542-0hu5twhp 27 33 [ [ -LRB- cord-264542-0hu5twhp 27 34 8 8 CD cord-264542-0hu5twhp 27 35 , , , cord-264542-0hu5twhp 27 36 9 9 CD cord-264542-0hu5twhp 27 37 , , , cord-264542-0hu5twhp 27 38 10 10 CD cord-264542-0hu5twhp 27 39 , , , cord-264542-0hu5twhp 27 40 11 11 CD cord-264542-0hu5twhp 27 41 , , , cord-264542-0hu5twhp 27 42 12 12 CD cord-264542-0hu5twhp 27 43 , , , cord-264542-0hu5twhp 27 44 13 13 CD cord-264542-0hu5twhp 27 45 , , , cord-264542-0hu5twhp 27 46 14 14 CD cord-264542-0hu5twhp 27 47 ] ] -RRB- cord-264542-0hu5twhp 27 48 . . . cord-264542-0hu5twhp 28 1 Triggered trigger VBN cord-264542-0hu5twhp 28 2 by by IN cord-264542-0hu5twhp 28 3 the the DT cord-264542-0hu5twhp 28 4 COVID-19 COVID-19 NNP cord-264542-0hu5twhp 28 5 pandemic pandemic NN cord-264542-0hu5twhp 28 6 , , , cord-264542-0hu5twhp 28 7 enormous enormous JJ cord-264542-0hu5twhp 28 8 amounts amount NNS cord-264542-0hu5twhp 28 9 of of IN cord-264542-0hu5twhp 28 10 resources resource NNS cord-264542-0hu5twhp 28 11 have have VBP cord-264542-0hu5twhp 28 12 been be VBN cord-264542-0hu5twhp 28 13 devoted devote VBN cord-264542-0hu5twhp 28 14 to to TO cord-264542-0hu5twhp 28 15 identify identify VB cord-264542-0hu5twhp 28 16 its -PRON- PRP$ cord-264542-0hu5twhp 28 17 exact exact JJ cord-264542-0hu5twhp 28 18 genesis genesis NN cord-264542-0hu5twhp 28 19 . . . cord-264542-0hu5twhp 29 1 A a DT cord-264542-0hu5twhp 29 2 goal goal NN cord-264542-0hu5twhp 29 3 of of IN cord-264542-0hu5twhp 29 4 this this DT cord-264542-0hu5twhp 29 5 article article NN cord-264542-0hu5twhp 29 6 is be VBZ cord-264542-0hu5twhp 29 7 to to TO cord-264542-0hu5twhp 29 8 challenge challenge VB cord-264542-0hu5twhp 29 9 this this DT cord-264542-0hu5twhp 29 10 narrow narrow JJ cord-264542-0hu5twhp 29 11 focus focus NN cord-264542-0hu5twhp 29 12 by by IN cord-264542-0hu5twhp 29 13 concentrating concentrate VBG cord-264542-0hu5twhp 29 14 on on IN cord-264542-0hu5twhp 29 15 the the DT cord-264542-0hu5twhp 29 16 larger large JJR cord-264542-0hu5twhp 29 17 context context NN cord-264542-0hu5twhp 29 18 of of IN cord-264542-0hu5twhp 29 19 cyberbiosecurity cyberbiosecurity NN cord-264542-0hu5twhp 29 20 , , , cord-264542-0hu5twhp 29 21 to to TO cord-264542-0hu5twhp 29 22 illuminate illuminate VB cord-264542-0hu5twhp 29 23 serious serious JJ cord-264542-0hu5twhp 29 24 new new JJ cord-264542-0hu5twhp 29 25 concerns concern NNS cord-264542-0hu5twhp 29 26 for for IN cord-264542-0hu5twhp 29 27 a a DT cord-264542-0hu5twhp 29 28 wide wide JJ cord-264542-0hu5twhp 29 29 audience audience NN cord-264542-0hu5twhp 29 30 . . . cord-264542-0hu5twhp 30 1 I -PRON- PRP cord-264542-0hu5twhp 30 2 will will MD cord-264542-0hu5twhp 30 3 highlight highlight VB cord-264542-0hu5twhp 30 4 distinct distinct JJ cord-264542-0hu5twhp 30 5 challenges challenge NNS cord-264542-0hu5twhp 30 6 and and CC cord-264542-0hu5twhp 30 7 suggest suggest VBP cord-264542-0hu5twhp 30 8 specific specific JJ cord-264542-0hu5twhp 30 9 steps step NNS cord-264542-0hu5twhp 30 10 to to TO cord-264542-0hu5twhp 30 11 help help VB cord-264542-0hu5twhp 30 12 support support VB cord-264542-0hu5twhp 30 13 risk risk NN cord-264542-0hu5twhp 30 14 deterrence deterrence NN cord-264542-0hu5twhp 30 15 efforts effort NNS cord-264542-0hu5twhp 30 16 . . . cord-264542-0hu5twhp 31 1 Most most RBS cord-264542-0hu5twhp 31 2 broadly broadly RB cord-264542-0hu5twhp 31 3 , , , cord-264542-0hu5twhp 31 4 cyberbiosecurity cyberbiosecurity NNP cord-264542-0hu5twhp 31 5 aims aim VBZ cord-264542-0hu5twhp 31 6 to to TO cord-264542-0hu5twhp 31 7 identify identify VB cord-264542-0hu5twhp 31 8 and and CC cord-264542-0hu5twhp 31 9 mitigate mitigate VB cord-264542-0hu5twhp 31 10 security security NN cord-264542-0hu5twhp 31 11 risks risk NNS cord-264542-0hu5twhp 31 12 fostered foster VBN cord-264542-0hu5twhp 31 13 by by IN cord-264542-0hu5twhp 31 14 the the DT cord-264542-0hu5twhp 31 15 digitization digitization NN cord-264542-0hu5twhp 31 16 of of IN cord-264542-0hu5twhp 31 17 biology biology NN cord-264542-0hu5twhp 31 18 and and CC cord-264542-0hu5twhp 31 19 biotechnology biotechnology NN cord-264542-0hu5twhp 31 20 automation automation NN cord-264542-0hu5twhp 31 21 . . . cord-264542-0hu5twhp 32 1 Fig Fig NNP cord-264542-0hu5twhp 32 2 . . NNP cord-264542-0hu5twhp 32 3 1 1 CD cord-264542-0hu5twhp 32 4 gives give VBZ cord-264542-0hu5twhp 32 5 a a DT cord-264542-0hu5twhp 32 6 summary summary NN cord-264542-0hu5twhp 32 7 how how WRB cord-264542-0hu5twhp 32 8 this this DT cord-264542-0hu5twhp 32 9 new new JJ cord-264542-0hu5twhp 32 10 paradigm paradigm NN cord-264542-0hu5twhp 32 11 evolved evolve VBD cord-264542-0hu5twhp 32 12 . . . cord-264542-0hu5twhp 33 1 While while IN cord-264542-0hu5twhp 33 2 others other NNS cord-264542-0hu5twhp 33 3 , , , cord-264542-0hu5twhp 33 4 including include VBG cord-264542-0hu5twhp 33 5 the the DT cord-264542-0hu5twhp 33 6 author author NN cord-264542-0hu5twhp 33 7 , , , cord-264542-0hu5twhp 33 8 began begin VBD cord-264542-0hu5twhp 33 9 to to TO cord-264542-0hu5twhp 33 10 investigate investigate VB cord-264542-0hu5twhp 33 11 these these DT cord-264542-0hu5twhp 33 12 challenges challenge NNS cord-264542-0hu5twhp 33 13 almost almost RB cord-264542-0hu5twhp 33 14 a a DT cord-264542-0hu5twhp 33 15 decade decade NN cord-264542-0hu5twhp 33 16 ago ago RB cord-264542-0hu5twhp 33 17 [ [ -LRB- cord-264542-0hu5twhp 33 18 15 15 CD cord-264542-0hu5twhp 33 19 , , , cord-264542-0hu5twhp 33 20 16 16 CD cord-264542-0hu5twhp 33 21 , , , cord-264542-0hu5twhp 33 22 17 17 CD cord-264542-0hu5twhp 33 23 , , , cord-264542-0hu5twhp 33 24 18 18 CD cord-264542-0hu5twhp 33 25 , , , cord-264542-0hu5twhp 33 26 19 19 CD cord-264542-0hu5twhp 33 27 , , , cord-264542-0hu5twhp 33 28 13 13 CD cord-264542-0hu5twhp 33 29 ] ] -RRB- cord-264542-0hu5twhp 33 30 , , , cord-264542-0hu5twhp 33 31 the the DT cord-264542-0hu5twhp 33 32 term term NN cord-264542-0hu5twhp 33 33 cyberbiosecurity cyberbiosecurity NN cord-264542-0hu5twhp 33 34 was be VBD cord-264542-0hu5twhp 33 35 first first RB cord-264542-0hu5twhp 33 36 ( ( -LRB- cord-264542-0hu5twhp 33 37 informally informally RB cord-264542-0hu5twhp 33 38 ) ) -RRB- cord-264542-0hu5twhp 33 39 used use VBN cord-264542-0hu5twhp 33 40 in in IN cord-264542-0hu5twhp 33 41 [ [ -LRB- cord-264542-0hu5twhp 33 42 20 20 CD cord-264542-0hu5twhp 33 43 ] ] -RRB- cord-264542-0hu5twhp 33 44 . . . cord-264542-0hu5twhp 34 1 These these DT cord-264542-0hu5twhp 34 2 authors author NNS cord-264542-0hu5twhp 34 3 warned warn VBD cord-264542-0hu5twhp 34 4 of of IN cord-264542-0hu5twhp 34 5 security security NN cord-264542-0hu5twhp 34 6 issues issue NNS cord-264542-0hu5twhp 34 7 resulting result VBG cord-264542-0hu5twhp 34 8 from from IN cord-264542-0hu5twhp 34 9 the the DT cord-264542-0hu5twhp 34 10 cyberphysical cyberphysical JJ cord-264542-0hu5twhp 34 11 interface interface NN cord-264542-0hu5twhp 34 12 of of IN cord-264542-0hu5twhp 34 13 the the DT cord-264542-0hu5twhp 34 14 bioeconomy bioeconomy NN cord-264542-0hu5twhp 34 15 , , , cord-264542-0hu5twhp 34 16 as as IN cord-264542-0hu5twhp 34 17 it -PRON- PRP cord-264542-0hu5twhp 34 18 was be VBD cord-264542-0hu5twhp 34 19 recognized recognize VBN cord-264542-0hu5twhp 34 20 that that IN cord-264542-0hu5twhp 34 21 all all DT cord-264542-0hu5twhp 34 22 biomanufacturing biomanufacturing NN cord-264542-0hu5twhp 34 23 processes process NNS cord-264542-0hu5twhp 34 24 are be VBP cord-264542-0hu5twhp 34 25 in in IN cord-264542-0hu5twhp 34 26 fact fact NN cord-264542-0hu5twhp 34 27 CPS CPS NNP cord-264542-0hu5twhp 34 28 ( ( -LRB- cord-264542-0hu5twhp 34 29 see see VB cord-264542-0hu5twhp 34 30 also also RB cord-264542-0hu5twhp 34 31 Incomplete incomplete JJ cord-264542-0hu5twhp 34 32 awareness awareness NN cord-264542-0hu5twhp 34 33 . . . cord-264542-0hu5twhp 35 1 During during IN cord-264542-0hu5twhp 35 2 the the DT cord-264542-0hu5twhp 35 3 last last JJ cord-264542-0hu5twhp 35 4 few few JJ cord-264542-0hu5twhp 35 5 years year NNS cord-264542-0hu5twhp 35 6 , , , cord-264542-0hu5twhp 35 7 the the DT cord-264542-0hu5twhp 35 8 biotechnology biotechnology NN cord-264542-0hu5twhp 35 9 industry industry NN cord-264542-0hu5twhp 35 10 has have VBZ cord-264542-0hu5twhp 35 11 fallen fall VBN cord-264542-0hu5twhp 35 12 prey prey NN cord-264542-0hu5twhp 35 13 to to IN cord-264542-0hu5twhp 35 14 serious serious JJ cord-264542-0hu5twhp 35 15 attacks attack NNS cord-264542-0hu5twhp 35 16 ( ( -LRB- cord-264542-0hu5twhp 35 17 see see VB cord-264542-0hu5twhp 35 18 e.g. e.g. JJ cord-264542-0hu5twhp 35 19 [ [ -LRB- cord-264542-0hu5twhp 35 20 7 7 CD cord-264542-0hu5twhp 35 21 , , , cord-264542-0hu5twhp 35 22 Table Table NNP cord-264542-0hu5twhp 35 23 7 7 CD cord-264542-0hu5twhp 35 24 -1 -1 NN cord-264542-0hu5twhp 35 25 ] ] -RRB- cord-264542-0hu5twhp 35 26 ) ) -RRB- cord-264542-0hu5twhp 35 27 , , , cord-264542-0hu5twhp 35 28 although although IN cord-264542-0hu5twhp 35 29 there there EX cord-264542-0hu5twhp 35 30 is be VBZ cord-264542-0hu5twhp 35 31 no no DT cord-264542-0hu5twhp 35 32 broad broad JJ cord-264542-0hu5twhp 35 33 awareness awareness NN cord-264542-0hu5twhp 35 34 of of IN cord-264542-0hu5twhp 35 35 this this DT cord-264542-0hu5twhp 35 36 . . . cord-264542-0hu5twhp 36 1 This this DT cord-264542-0hu5twhp 36 2 important important JJ cord-264542-0hu5twhp 36 3 observation observation NN cord-264542-0hu5twhp 36 4 and and CC cord-264542-0hu5twhp 36 5 the the DT cord-264542-0hu5twhp 36 6 compelling compelling JJ cord-264542-0hu5twhp 36 7 need need NN cord-264542-0hu5twhp 36 8 to to TO cord-264542-0hu5twhp 36 9 question question VB cord-264542-0hu5twhp 36 10 the the DT cord-264542-0hu5twhp 36 11 " " `` cord-264542-0hu5twhp 36 12 naive naive JJ cord-264542-0hu5twhp 36 13 trust trust NN cord-264542-0hu5twhp 36 14 " " '' cord-264542-0hu5twhp 36 15 throughout throughout IN cord-264542-0hu5twhp 36 16 the the DT cord-264542-0hu5twhp 36 17 life life NN cord-264542-0hu5twhp 36 18 - - HYPH cord-264542-0hu5twhp 36 19 science science NN cord-264542-0hu5twhp 36 20 arena arena NN cord-264542-0hu5twhp 36 21 were be VBD cord-264542-0hu5twhp 36 22 key key JJ cord-264542-0hu5twhp 36 23 drivers driver NNS cord-264542-0hu5twhp 36 24 to to TO cord-264542-0hu5twhp 36 25 establish establish VB cord-264542-0hu5twhp 36 26 cyberbiosecurity cyberbiosecurity NN cord-264542-0hu5twhp 36 27 as as IN cord-264542-0hu5twhp 36 28 a a DT cord-264542-0hu5twhp 36 29 new new JJ cord-264542-0hu5twhp 36 30 discipline discipline NN cord-264542-0hu5twhp 36 31 [ [ -LRB- cord-264542-0hu5twhp 36 32 20 20 CD cord-264542-0hu5twhp 36 33 ] ] -RRB- cord-264542-0hu5twhp 36 34 . . . cord-264542-0hu5twhp 37 1 Additional additional JJ cord-264542-0hu5twhp 37 2 sobering sobering JJ cord-264542-0hu5twhp 37 3 criminal criminal JJ cord-264542-0hu5twhp 37 4 cases case NNS cord-264542-0hu5twhp 37 5 that that WDT cord-264542-0hu5twhp 37 6 have have VBP cord-264542-0hu5twhp 37 7 affected affect VBN cord-264542-0hu5twhp 37 8 the the DT cord-264542-0hu5twhp 37 9 bioscience bioscience NN cord-264542-0hu5twhp 37 10 field field NN cord-264542-0hu5twhp 37 11 are be VBP cord-264542-0hu5twhp 37 12 now now RB cord-264542-0hu5twhp 37 13 emerging emerge VBG cord-264542-0hu5twhp 37 14 , , , cord-264542-0hu5twhp 37 15 even even RB cord-264542-0hu5twhp 37 16 during during IN cord-264542-0hu5twhp 37 17 the the DT cord-264542-0hu5twhp 37 18 current current JJ cord-264542-0hu5twhp 37 19 pandemic pandemic NN cord-264542-0hu5twhp 37 20 ( ( -LRB- cord-264542-0hu5twhp 37 21 e.g. e.g. NN cord-264542-0hu5twhp 37 22 [ [ -LRB- cord-264542-0hu5twhp 37 23 10 10 CD cord-264542-0hu5twhp 37 24 , , , cord-264542-0hu5twhp 37 25 23 23 CD cord-264542-0hu5twhp 37 26 , , , cord-264542-0hu5twhp 37 27 24 24 CD cord-264542-0hu5twhp 37 28 , , , cord-264542-0hu5twhp 37 29 21 21 CD cord-264542-0hu5twhp 37 30 , , , cord-264542-0hu5twhp 37 31 25 25 CD cord-264542-0hu5twhp 37 32 , , , cord-264542-0hu5twhp 37 33 26 26 CD cord-264542-0hu5twhp 37 34 ] ] -RRB- cord-264542-0hu5twhp 37 35 ) ) -RRB- cord-264542-0hu5twhp 37 36 . . . cord-264542-0hu5twhp 38 1 As as IN cord-264542-0hu5twhp 38 2 noted note VBN cord-264542-0hu5twhp 38 3 in in IN cord-264542-0hu5twhp 38 4 [ [ -LRB- cord-264542-0hu5twhp 38 5 23 23 CD cord-264542-0hu5twhp 38 6 ] ] -RRB- cord-264542-0hu5twhp 38 7 , , , cord-264542-0hu5twhp 38 8 these these DT cord-264542-0hu5twhp 38 9 encompass encompass VBP cord-264542-0hu5twhp 38 10 three three CD cord-264542-0hu5twhp 38 11 critical critical JJ cord-264542-0hu5twhp 38 12 areas area NNS cord-264542-0hu5twhp 38 13 of of IN cord-264542-0hu5twhp 38 14 attack attack NN cord-264542-0hu5twhp 38 15 -sabotage -sabotage NN cord-264542-0hu5twhp 38 16 , , , cord-264542-0hu5twhp 38 17 corporate corporate JJ cord-264542-0hu5twhp 38 18 espionage espionage NN cord-264542-0hu5twhp 38 19 , , , cord-264542-0hu5twhp 38 20 and and CC cord-264542-0hu5twhp 38 21 crime crime NN cord-264542-0hu5twhp 38 22 / / SYM cord-264542-0hu5twhp 38 23 extortion extortion NN cord-264542-0hu5twhp 38 24 . . . cord-264542-0hu5twhp 39 1 Yet yet RB cord-264542-0hu5twhp 39 2 , , , cord-264542-0hu5twhp 39 3 people people NNS cord-264542-0hu5twhp 39 4 in in IN cord-264542-0hu5twhp 39 5 the the DT cord-264542-0hu5twhp 39 6 life life NN cord-264542-0hu5twhp 39 7 - - HYPH cord-264542-0hu5twhp 39 8 sciences science NNS cord-264542-0hu5twhp 39 9 are be VBP cord-264542-0hu5twhp 39 10 largely largely RB cord-264542-0hu5twhp 39 11 ignorant ignorant JJ cord-264542-0hu5twhp 39 12 of of IN cord-264542-0hu5twhp 39 13 the the DT cord-264542-0hu5twhp 39 14 dangers danger NNS cord-264542-0hu5twhp 39 15 as as IN cord-264542-0hu5twhp 39 16 they -PRON- PRP cord-264542-0hu5twhp 39 17 are be VBP cord-264542-0hu5twhp 39 18 barely barely RB cord-264542-0hu5twhp 39 19 trained train VBN cord-264542-0hu5twhp 39 20 in in IN cord-264542-0hu5twhp 39 21 security security NN cord-264542-0hu5twhp 39 22 issues issue NNS cord-264542-0hu5twhp 39 23 -or -or : cord-264542-0hu5twhp 39 24 not not RB cord-264542-0hu5twhp 39 25 at at RB cord-264542-0hu5twhp 39 26 all all RB cord-264542-0hu5twhp 39 27 . . . cord-264542-0hu5twhp 40 1 Research research NN cord-264542-0hu5twhp 40 2 and and CC cord-264542-0hu5twhp 40 3 healthcare healthcare NN cord-264542-0hu5twhp 40 4 industries industry NNS cord-264542-0hu5twhp 40 5 are be VBP cord-264542-0hu5twhp 40 6 vulnerable vulnerable JJ cord-264542-0hu5twhp 40 7 to to IN cord-264542-0hu5twhp 40 8 cyberbiosecurity cyberbiosecurity NN cord-264542-0hu5twhp 40 9 attacks attack NNS cord-264542-0hu5twhp 40 10 because because IN cord-264542-0hu5twhp 40 11 they -PRON- PRP cord-264542-0hu5twhp 40 12 have have VBP cord-264542-0hu5twhp 40 13 not not RB cord-264542-0hu5twhp 40 14 kept keep VBN cord-264542-0hu5twhp 40 15 up up RP cord-264542-0hu5twhp 40 16 with with IN cord-264542-0hu5twhp 40 17 threats threat NNS cord-264542-0hu5twhp 40 18 [ [ -LRB- cord-264542-0hu5twhp 40 19 27 27 CD cord-264542-0hu5twhp 40 20 , , , cord-264542-0hu5twhp 40 21 8 8 CD cord-264542-0hu5twhp 40 22 ] ] -RRB- cord-264542-0hu5twhp 40 23 . . . cord-264542-0hu5twhp 41 1 Capitalizing capitalize VBG cord-264542-0hu5twhp 41 2 on on IN cord-264542-0hu5twhp 41 3 a a DT cord-264542-0hu5twhp 41 4 common common JJ cord-264542-0hu5twhp 41 5 misconception misconception NN cord-264542-0hu5twhp 41 6 . . . cord-264542-0hu5twhp 42 1 Generally generally RB cord-264542-0hu5twhp 42 2 , , , cord-264542-0hu5twhp 42 3 it -PRON- PRP cord-264542-0hu5twhp 42 4 is be VBZ cord-264542-0hu5twhp 42 5 widely widely RB cord-264542-0hu5twhp 42 6 accepted accept VBN cord-264542-0hu5twhp 42 7 that that IN cord-264542-0hu5twhp 42 8 cybersecurity cybersecurity NN cord-264542-0hu5twhp 42 9 attacks attack NNS cord-264542-0hu5twhp 42 10 and and CC cord-264542-0hu5twhp 42 11 data datum NNS cord-264542-0hu5twhp 42 12 breaches breach NNS cord-264542-0hu5twhp 42 13 are be VBP cord-264542-0hu5twhp 42 14 a a DT cord-264542-0hu5twhp 42 15 matter matter NN cord-264542-0hu5twhp 42 16 of of IN cord-264542-0hu5twhp 42 17 when when WRB cord-264542-0hu5twhp 42 18 , , , cord-264542-0hu5twhp 42 19 not not RB cord-264542-0hu5twhp 42 20 if if IN cord-264542-0hu5twhp 42 21 . . . cord-264542-0hu5twhp 43 1 Very very RB cord-264542-0hu5twhp 43 2 recently recently RB cord-264542-0hu5twhp 43 3 , , , cord-264542-0hu5twhp 43 4 ransomware ransomware NN cord-264542-0hu5twhp 43 5 attacks attack NNS cord-264542-0hu5twhp 43 6 have have VBP cord-264542-0hu5twhp 43 7 been be VBN cord-264542-0hu5twhp 43 8 recognized recognize VBN cord-264542-0hu5twhp 43 9 as as IN cord-264542-0hu5twhp 43 10 " " `` cord-264542-0hu5twhp 43 11 the the DT cord-264542-0hu5twhp 43 12 primary primary JJ cord-264542-0hu5twhp 43 13 threat threat NN cord-264542-0hu5twhp 43 14 " " '' cord-264542-0hu5twhp 43 15 to to IN cord-264542-0hu5twhp 43 16 healthcare healthcare NN cord-264542-0hu5twhp 43 17 organizations organization NNS cord-264542-0hu5twhp 43 18 [ [ -LRB- cord-264542-0hu5twhp 43 19 28 28 CD cord-264542-0hu5twhp 43 20 ] ] -RRB- cord-264542-0hu5twhp 43 21 . . . cord-264542-0hu5twhp 44 1 Statements statement NNS cord-264542-0hu5twhp 44 2 like like IN cord-264542-0hu5twhp 44 3 these these DT cord-264542-0hu5twhp 44 4 seem seem VBP cord-264542-0hu5twhp 44 5 to to TO cord-264542-0hu5twhp 44 6 support support VB cord-264542-0hu5twhp 44 7 the the DT cord-264542-0hu5twhp 44 8 understanding understanding NN cord-264542-0hu5twhp 44 9 that that IN cord-264542-0hu5twhp 44 10 cyberbio cyberbio NN cord-264542-0hu5twhp 44 11 concerns concern NNS cord-264542-0hu5twhp 44 12 in in IN cord-264542-0hu5twhp 44 13 the the DT cord-264542-0hu5twhp 44 14 bioeconomy bioeconomy NN cord-264542-0hu5twhp 44 15 could could MD cord-264542-0hu5twhp 44 16 be be VB cord-264542-0hu5twhp 44 17 dealt deal VBN cord-264542-0hu5twhp 44 18 with with IN cord-264542-0hu5twhp 44 19 by by IN cord-264542-0hu5twhp 44 20 using use VBG cord-264542-0hu5twhp 44 21 IT IT NNP cord-264542-0hu5twhp 44 22 solutions solution NNS cord-264542-0hu5twhp 44 23 alone alone JJ cord-264542-0hu5twhp 44 24 ( ( -LRB- cord-264542-0hu5twhp 44 25 and and CC cord-264542-0hu5twhp 44 26 possibly possibly RB cord-264542-0hu5twhp 44 27 optimized optimize VBN cord-264542-0hu5twhp 44 28 for for IN cord-264542-0hu5twhp 44 29 life life NN cord-264542-0hu5twhp 44 30 - - HYPH cord-264542-0hu5twhp 44 31 science science NN cord-264542-0hu5twhp 44 32 demands demand NNS cord-264542-0hu5twhp 44 33 ) ) -RRB- cord-264542-0hu5twhp 44 34 . . . cord-264542-0hu5twhp 45 1 Unfortunately unfortunately RB cord-264542-0hu5twhp 45 2 , , , cord-264542-0hu5twhp 45 3 the the DT cord-264542-0hu5twhp 45 4 reliance reliance NN cord-264542-0hu5twhp 45 5 on on IN cord-264542-0hu5twhp 45 6 CPS CPS NNP cord-264542-0hu5twhp 45 7 generates generate VBZ cord-264542-0hu5twhp 45 8 unrecognized unrecognized JJ cord-264542-0hu5twhp 45 9 convergence convergence NN cord-264542-0hu5twhp 45 10 issues issue NNS cord-264542-0hu5twhp 45 11 . . . cord-264542-0hu5twhp 46 1 It -PRON- PRP cord-264542-0hu5twhp 46 2 is be VBZ cord-264542-0hu5twhp 46 3 important important JJ cord-264542-0hu5twhp 46 4 to to TO cord-264542-0hu5twhp 46 5 understand understand VB cord-264542-0hu5twhp 46 6 that that IN cord-264542-0hu5twhp 46 7 due due IN cord-264542-0hu5twhp 46 8 to to IN cord-264542-0hu5twhp 46 9 cross cross VB cord-264542-0hu5twhp 46 10 - - JJ cord-264542-0hu5twhp 46 11 over over RP cord-264542-0hu5twhp 46 12 effects effect NNS cord-264542-0hu5twhp 46 13 , , , cord-264542-0hu5twhp 46 14 neither neither CC cord-264542-0hu5twhp 46 15 cyber cyber JJ cord-264542-0hu5twhp 46 16 nor nor CC cord-264542-0hu5twhp 46 17 physical physical JJ cord-264542-0hu5twhp 46 18 security security NN cord-264542-0hu5twhp 46 19 concepts concept NNS cord-264542-0hu5twhp 46 20 alone alone RB cord-264542-0hu5twhp 46 21 are be VBP cord-264542-0hu5twhp 46 22 sufficient sufficient JJ cord-264542-0hu5twhp 46 23 to to TO cord-264542-0hu5twhp 46 24 protect protect VB cord-264542-0hu5twhp 46 25 a a DT cord-264542-0hu5twhp 46 26 CPS cps NN cord-264542-0hu5twhp 46 27 . . . cord-264542-0hu5twhp 47 1 " " `` cord-264542-0hu5twhp 47 2 Separate separate JJ cord-264542-0hu5twhp 47 3 sets set NNS cord-264542-0hu5twhp 47 4 of of IN cord-264542-0hu5twhp 47 5 vulnerabilities vulnerability NNS cord-264542-0hu5twhp 47 6 on on IN cord-264542-0hu5twhp 47 7 the the DT cord-264542-0hu5twhp 47 8 cyber cyber JJ cord-264542-0hu5twhp 47 9 and and CC cord-264542-0hu5twhp 47 10 physical physical JJ cord-264542-0hu5twhp 47 11 sides side NNS cord-264542-0hu5twhp 47 12 do do VBP cord-264542-0hu5twhp 47 13 not not RB cord-264542-0hu5twhp 47 14 simply simply RB cord-264542-0hu5twhp 47 15 add add VB cord-264542-0hu5twhp 47 16 up up RP cord-264542-0hu5twhp 47 17 , , , cord-264542-0hu5twhp 47 18 they -PRON- PRP cord-264542-0hu5twhp 47 19 multiply multiply VBP cord-264542-0hu5twhp 47 20 " " '' cord-264542-0hu5twhp 47 21 [ [ -LRB- cord-264542-0hu5twhp 47 22 29 29 CD cord-264542-0hu5twhp 47 23 ] ] -RRB- cord-264542-0hu5twhp 47 24 . . . cord-264542-0hu5twhp 48 1 Notably notably RB cord-264542-0hu5twhp 48 2 , , , cord-264542-0hu5twhp 48 3 cyber cyber NN cord-264542-0hu5twhp 48 4 - - HYPH cord-264542-0hu5twhp 48 5 attacks attack NNS cord-264542-0hu5twhp 48 6 on on IN cord-264542-0hu5twhp 48 7 critical critical JJ cord-264542-0hu5twhp 48 8 automated automate VBN cord-264542-0hu5twhp 48 9 ( ( -LRB- cord-264542-0hu5twhp 48 10 computer computer NN cord-264542-0hu5twhp 48 11 - - HYPH cord-264542-0hu5twhp 48 12 based base VBN cord-264542-0hu5twhp 48 13 ) ) -RRB- cord-264542-0hu5twhp 48 14 processes process NNS cord-264542-0hu5twhp 48 15 ( ( -LRB- cord-264542-0hu5twhp 48 16 e.g. e.g. RB cord-264542-0hu5twhp 48 17 , , , cord-264542-0hu5twhp 48 18 workflow workflow NN cord-264542-0hu5twhp 48 19 or or CC cord-264542-0hu5twhp 48 20 process process NN cord-264542-0hu5twhp 48 21 controls control NNS cord-264542-0hu5twhp 48 22 ) ) -RRB- cord-264542-0hu5twhp 48 23 may may MD cord-264542-0hu5twhp 48 24 lead lead VB cord-264542-0hu5twhp 48 25 to to IN cord-264542-0hu5twhp 48 26 dire dire JJ cord-264542-0hu5twhp 48 27 real real JJ cord-264542-0hu5twhp 48 28 - - HYPH cord-264542-0hu5twhp 48 29 world world NN cord-264542-0hu5twhp 48 30 consequences consequence NNS cord-264542-0hu5twhp 48 31 , , , cord-264542-0hu5twhp 48 32 similar similar JJ cord-264542-0hu5twhp 48 33 to to IN cord-264542-0hu5twhp 48 34 direct direct JJ cord-264542-0hu5twhp 48 35 physical physical JJ cord-264542-0hu5twhp 48 36 attacks attack NNS cord-264542-0hu5twhp 48 37 . . . cord-264542-0hu5twhp 49 1 For for IN cord-264542-0hu5twhp 49 2 instance instance NN cord-264542-0hu5twhp 49 3 , , , cord-264542-0hu5twhp 49 4 a a DT cord-264542-0hu5twhp 49 5 2008 2008 CD cord-264542-0hu5twhp 49 6 explosion explosion NN cord-264542-0hu5twhp 49 7 in in IN cord-264542-0hu5twhp 49 8 the the DT cord-264542-0hu5twhp 49 9 highly highly RB cord-264542-0hu5twhp 49 10 secure secure JJ cord-264542-0hu5twhp 49 11 1,099-mile 1,099-mile CD cord-264542-0hu5twhp 49 12 Baku Baku NNP cord-264542-0hu5twhp 49 13 - - HYPH cord-264542-0hu5twhp 49 14 Tbilisi Tbilisi NNP cord-264542-0hu5twhp 49 15 - - HYPH cord-264542-0hu5twhp 49 16 Ceyhan Ceyhan NNP cord-264542-0hu5twhp 49 17 pipeline pipeline NN cord-264542-0hu5twhp 49 18 was be VBD cord-264542-0hu5twhp 49 19 caused cause VBN cord-264542-0hu5twhp 49 20 by by IN cord-264542-0hu5twhp 49 21 computer computer NN cord-264542-0hu5twhp 49 22 sabotage sabotage NN cord-264542-0hu5twhp 49 23 . . . cord-264542-0hu5twhp 50 1 The the DT cord-264542-0hu5twhp 50 2 main main JJ cord-264542-0hu5twhp 50 3 weapon weapon NN cord-264542-0hu5twhp 50 4 for for IN cord-264542-0hu5twhp 50 5 this this DT cord-264542-0hu5twhp 50 6 cyberphysical cyberphysical JJ cord-264542-0hu5twhp 50 7 act act NN cord-264542-0hu5twhp 50 8 of of IN cord-264542-0hu5twhp 50 9 terrorism terrorism NN cord-264542-0hu5twhp 50 10 was be VBD cord-264542-0hu5twhp 50 11 " " `` cord-264542-0hu5twhp 50 12 a a DT cord-264542-0hu5twhp 50 13 keyboard keyboard NN cord-264542-0hu5twhp 50 14 " " '' cord-264542-0hu5twhp 50 15 [ [ -LRB- cord-264542-0hu5twhp 50 16 30 30 CD cord-264542-0hu5twhp 50 17 , , , cord-264542-0hu5twhp 50 18 29 29 CD cord-264542-0hu5twhp 50 19 ] ] -RRB- cord-264542-0hu5twhp 50 20 . . . cord-264542-0hu5twhp 51 1 In in IN cord-264542-0hu5twhp 51 2 general general JJ cord-264542-0hu5twhp 51 3 , , , cord-264542-0hu5twhp 51 4 the the DT cord-264542-0hu5twhp 51 5 term term NN cord-264542-0hu5twhp 51 6 " " `` cord-264542-0hu5twhp 51 7 physical physical JJ cord-264542-0hu5twhp 51 8 " " '' cord-264542-0hu5twhp 51 9 in in IN cord-264542-0hu5twhp 51 10 CPS CPS NNP cord-264542-0hu5twhp 51 11 ( ( -LRB- cord-264542-0hu5twhp 51 12 Fig Fig NNP cord-264542-0hu5twhp 51 13 . . . cord-264542-0hu5twhp 51 14 3 3 CD cord-264542-0hu5twhp 51 15 , , , cord-264542-0hu5twhp 51 16 central central JJ cord-264542-0hu5twhp 51 17 box box NN cord-264542-0hu5twhp 51 18 ) ) -RRB- cord-264542-0hu5twhp 51 19 is be VBZ cord-264542-0hu5twhp 51 20 applied apply VBN cord-264542-0hu5twhp 51 21 to to IN cord-264542-0hu5twhp 51 22 the the DT cord-264542-0hu5twhp 51 23 " " `` cord-264542-0hu5twhp 51 24 engineering engineering NN cord-264542-0hu5twhp 51 25 , , , cord-264542-0hu5twhp 51 26 physical physical JJ cord-264542-0hu5twhp 51 27 and and CC cord-264542-0hu5twhp 51 28 biological biological JJ cord-264542-0hu5twhp 51 29 " " '' cord-264542-0hu5twhp 51 30 [ [ -LRB- cord-264542-0hu5twhp 51 31 31 31 CD cord-264542-0hu5twhp 51 32 ] ] -RRB- cord-264542-0hu5twhp 51 33 components component NNS cord-264542-0hu5twhp 51 34 of of IN cord-264542-0hu5twhp 51 35 the the DT cord-264542-0hu5twhp 51 36 system system NN cord-264542-0hu5twhp 51 37 , , , cord-264542-0hu5twhp 51 38 or or CC cord-264542-0hu5twhp 51 39 more more RBR cord-264542-0hu5twhp 51 40 generally generally RB cord-264542-0hu5twhp 51 41 , , , cord-264542-0hu5twhp 51 42 any any DT cord-264542-0hu5twhp 51 43 components component NNS cord-264542-0hu5twhp 51 44 of of IN cord-264542-0hu5twhp 51 45 the the DT cord-264542-0hu5twhp 51 46 physical physical JJ cord-264542-0hu5twhp 51 47 world world NN cord-264542-0hu5twhp 51 48 which which WDT cord-264542-0hu5twhp 51 49 are be VBP cord-264542-0hu5twhp 51 50 connected connect VBN cord-264542-0hu5twhp 51 51 through through IN cord-264542-0hu5twhp 51 52 cyber cyber JJ cord-264542-0hu5twhp 51 53 elements element NNS cord-264542-0hu5twhp 51 54 . . . cord-264542-0hu5twhp 52 1 ( ( -LRB- cord-264542-0hu5twhp 52 2 e.g. e.g. RB cord-264542-0hu5twhp 52 3 the the DT cord-264542-0hu5twhp 52 4 Hazard Hazard NNP cord-264542-0hu5twhp 52 5 Analysis Analysis NNP cord-264542-0hu5twhp 52 6 Control Control NNP cord-264542-0hu5twhp 52 7 Point Point NNP cord-264542-0hu5twhp 52 8 system system NN cord-264542-0hu5twhp 52 9 for for IN cord-264542-0hu5twhp 52 10 the the DT cord-264542-0hu5twhp 52 11 Fd+Ag fd+ag NN cord-264542-0hu5twhp 52 12 sector sector NN cord-264542-0hu5twhp 52 13 or or CC cord-264542-0hu5twhp 52 14 , , , cord-264542-0hu5twhp 52 15 more more RBR cord-264542-0hu5twhp 52 16 generally generally RB cord-264542-0hu5twhp 52 17 , , , cord-264542-0hu5twhp 52 18 The the DT cord-264542-0hu5twhp 52 19 Infrastructure Infrastructure NNP cord-264542-0hu5twhp 52 20 Survey Survey NNP cord-264542-0hu5twhp 52 21 Tool Tool NNP cord-264542-0hu5twhp 52 22 [ [ -LRB- cord-264542-0hu5twhp 52 23 36 36 CD cord-264542-0hu5twhp 52 24 ] ] -RRB- cord-264542-0hu5twhp 52 25 or or CC cord-264542-0hu5twhp 52 26 NIST NIST NNP cord-264542-0hu5twhp 52 27 guidelines guideline NNS cord-264542-0hu5twhp 52 28 [ [ -LRB- cord-264542-0hu5twhp 52 29 37 37 CD cord-264542-0hu5twhp 52 30 ] ] -RRB- cord-264542-0hu5twhp 52 31 ) ) -RRB- cord-264542-0hu5twhp 52 32 , , , cord-264542-0hu5twhp 52 33 it -PRON- PRP cord-264542-0hu5twhp 52 34 is be VBZ cord-264542-0hu5twhp 52 35 recognized recognize VBN cord-264542-0hu5twhp 52 36 that that IN cord-264542-0hu5twhp 52 37 fully fully RB cord-264542-0hu5twhp 52 38 scoping scope VBG cord-264542-0hu5twhp 52 39 all all PDT cord-264542-0hu5twhp 52 40 the the DT cord-264542-0hu5twhp 52 41 cyberbio cyberbio NN cord-264542-0hu5twhp 52 42 risks risk NNS cord-264542-0hu5twhp 52 43 , , , cord-264542-0hu5twhp 52 44 not not RB cord-264542-0hu5twhp 52 45 to to TO cord-264542-0hu5twhp 52 46 mention mention VB cord-264542-0hu5twhp 52 47 their -PRON- PRP$ cord-264542-0hu5twhp 52 48 relative relative JJ cord-264542-0hu5twhp 52 49 likelihood likelihood NN cord-264542-0hu5twhp 52 50 and and CC cord-264542-0hu5twhp 52 51 impact impact NN cord-264542-0hu5twhp 52 52 , , , cord-264542-0hu5twhp 52 53 is be VBZ cord-264542-0hu5twhp 52 54 rather rather RB cord-264542-0hu5twhp 52 55 challenging challenging JJ cord-264542-0hu5twhp 52 56 [ [ -LRB- cord-264542-0hu5twhp 52 57 23 23 CD cord-264542-0hu5twhp 52 58 , , , cord-264542-0hu5twhp 52 59 22 22 CD cord-264542-0hu5twhp 52 60 , , , cord-264542-0hu5twhp 52 61 8 8 CD cord-264542-0hu5twhp 52 62 ] ] -RRB- cord-264542-0hu5twhp 52 63 . . . cord-264542-0hu5twhp 53 1 Although although IN cord-264542-0hu5twhp 53 2 some some DT cord-264542-0hu5twhp 53 3 of of IN cord-264542-0hu5twhp 53 4 the the DT cord-264542-0hu5twhp 53 5 cyberbio cyberbio NN cord-264542-0hu5twhp 53 6 vulnerabilities vulnerability NNS cord-264542-0hu5twhp 53 7 share share VBP cord-264542-0hu5twhp 53 8 compelling compelling JJ cord-264542-0hu5twhp 53 9 similarities similarity NNS cord-264542-0hu5twhp 53 10 to to IN cord-264542-0hu5twhp 53 11 the the DT cord-264542-0hu5twhp 53 12 early early JJ cord-264542-0hu5twhp 53 13 days day NNS cord-264542-0hu5twhp 53 14 of of IN cord-264542-0hu5twhp 53 15 the the DT cord-264542-0hu5twhp 53 16 internet internet NN cord-264542-0hu5twhp 53 17 [ [ -LRB- cord-264542-0hu5twhp 53 18 38 38 CD cord-264542-0hu5twhp 53 19 ] ] -RRB- cord-264542-0hu5twhp 53 20 , , , cord-264542-0hu5twhp 53 21 there there EX cord-264542-0hu5twhp 53 22 are be VBP cord-264542-0hu5twhp 53 23 critical critical JJ cord-264542-0hu5twhp 53 24 differences difference NNS cord-264542-0hu5twhp 53 25 [ [ -LRB- cord-264542-0hu5twhp 53 26 9 9 CD cord-264542-0hu5twhp 53 27 , , , cord-264542-0hu5twhp 53 28 10 10 CD cord-264542-0hu5twhp 53 29 , , , cord-264542-0hu5twhp 53 30 11 11 CD cord-264542-0hu5twhp 53 31 , , , cord-264542-0hu5twhp 53 32 12 12 CD cord-264542-0hu5twhp 53 33 , , , cord-264542-0hu5twhp 53 34 14 14 CD cord-264542-0hu5twhp 53 35 ] ] -RRB- cord-264542-0hu5twhp 53 36 . . . cord-264542-0hu5twhp 54 1 While while IN cord-264542-0hu5twhp 54 2 most most JJS cord-264542-0hu5twhp 54 3 responders responder NNS cord-264542-0hu5twhp 54 4 to to IN cord-264542-0hu5twhp 54 5 the the DT cord-264542-0hu5twhp 54 6 above above RB cord-264542-0hu5twhp 54 7 mentioned mention VBN cord-264542-0hu5twhp 54 8 survey survey NN cord-264542-0hu5twhp 54 9 of of IN cord-264542-0hu5twhp 54 10 international international JJ cord-264542-0hu5twhp 54 11 experts expert NNS cord-264542-0hu5twhp 54 12 [ [ -LRB- cord-264542-0hu5twhp 54 13 8 8 CD cord-264542-0hu5twhp 54 14 ] ] -RRB- cord-264542-0hu5twhp 54 15 agreed agree VBD cord-264542-0hu5twhp 54 16 that that IN cord-264542-0hu5twhp 54 17 their -PRON- PRP$ cord-264542-0hu5twhp 54 18 organizations organization NNS cord-264542-0hu5twhp 54 19 had have VBD cord-264542-0hu5twhp 54 20 " " `` cord-264542-0hu5twhp 54 21 considered consider VBN cord-264542-0hu5twhp 54 22 " " '' cord-264542-0hu5twhp 54 23 cyberbio cyberbio NN cord-264542-0hu5twhp 54 24 issues issue NNS cord-264542-0hu5twhp 54 25 , , , cord-264542-0hu5twhp 54 26 some some DT cord-264542-0hu5twhp 54 27 noted note VBD cord-264542-0hu5twhp 54 28 " " `` cord-264542-0hu5twhp 54 29 insufficient insufficient JJ cord-264542-0hu5twhp 54 30 time time NN cord-264542-0hu5twhp 54 31 " " '' cord-264542-0hu5twhp 54 32 or or CC cord-264542-0hu5twhp 54 33 " " `` cord-264542-0hu5twhp 54 34 no no DT cord-264542-0hu5twhp 54 35 idea idea NN cord-264542-0hu5twhp 54 36 " " '' cord-264542-0hu5twhp 54 37 how how WRB cord-264542-0hu5twhp 54 38 to to TO cord-264542-0hu5twhp 54 39 address address VB cord-264542-0hu5twhp 54 40 them -PRON- PRP cord-264542-0hu5twhp 54 41 , , , cord-264542-0hu5twhp 54 42 and and CC cord-264542-0hu5twhp 54 43 all all DT cord-264542-0hu5twhp 54 44 pinpointed pinpoint VBD cord-264542-0hu5twhp 54 45 the the DT cord-264542-0hu5twhp 54 46 lack lack NN cord-264542-0hu5twhp 54 47 of of IN cord-264542-0hu5twhp 54 48 available available JJ cord-264542-0hu5twhp 54 49 resources resource NNS cord-264542-0hu5twhp 54 50 . . . cord-264542-0hu5twhp 55 1 This this DT cord-264542-0hu5twhp 55 2 section section NN cord-264542-0hu5twhp 55 3 describes describe VBZ cord-264542-0hu5twhp 55 4 some some DT cord-264542-0hu5twhp 55 5 of of IN cord-264542-0hu5twhp 55 6 the the DT cord-264542-0hu5twhp 55 7 difficulties difficulty NNS cord-264542-0hu5twhp 55 8 . . . cord-264542-0hu5twhp 56 1 The the DT cord-264542-0hu5twhp 56 2 problem problem NN cord-264542-0hu5twhp 56 3 of of IN cord-264542-0hu5twhp 56 4 identifying identify VBG cord-264542-0hu5twhp 56 5 what what WP cord-264542-0hu5twhp 56 6 needs need VBZ cord-264542-0hu5twhp 56 7 to to TO cord-264542-0hu5twhp 56 8 be be VB cord-264542-0hu5twhp 56 9 protected protect VBN cord-264542-0hu5twhp 56 10 : : : cord-264542-0hu5twhp 56 11 -Many -many ADD cord-264542-0hu5twhp 56 12 of of IN cord-264542-0hu5twhp 56 13 the the DT cord-264542-0hu5twhp 56 14 novel novel JJ cord-264542-0hu5twhp 56 15 cyberbio cyberbio NN cord-264542-0hu5twhp 56 16 risks risk NNS cord-264542-0hu5twhp 56 17 and and CC cord-264542-0hu5twhp 56 18 threats threat NNS cord-264542-0hu5twhp 56 19 ( ( -LRB- cord-264542-0hu5twhp 56 20 Table table NN cord-264542-0hu5twhp 56 21 1 1 CD cord-264542-0hu5twhp 56 22 ) ) -RRB- cord-264542-0hu5twhp 56 23 have have VBP cord-264542-0hu5twhp 56 24 not not RB cord-264542-0hu5twhp 56 25 been be VBN cord-264542-0hu5twhp 56 26 fully fully RB cord-264542-0hu5twhp 56 27 scoped scope VBN cord-264542-0hu5twhp 56 28 . . . cord-264542-0hu5twhp 57 1 They -PRON- PRP cord-264542-0hu5twhp 57 2 are be VBP cord-264542-0hu5twhp 57 3 difficult difficult JJ cord-264542-0hu5twhp 57 4 to to TO cord-264542-0hu5twhp 57 5 characterize characterize VB cord-264542-0hu5twhp 57 6 , , , cord-264542-0hu5twhp 57 7 and and CC cord-264542-0hu5twhp 57 8 envisioning envision VBG cord-264542-0hu5twhp 57 9 the the DT cord-264542-0hu5twhp 57 10 complete complete JJ cord-264542-0hu5twhp 57 11 risk risk NN cord-264542-0hu5twhp 57 12 landscape landscape NN cord-264542-0hu5twhp 57 13 continues continue VBZ cord-264542-0hu5twhp 57 14 to to TO cord-264542-0hu5twhp 57 15 be be VB cord-264542-0hu5twhp 57 16 a a DT cord-264542-0hu5twhp 57 17 challenge challenge NN cord-264542-0hu5twhp 57 18 [ [ -LRB- cord-264542-0hu5twhp 57 19 39 39 CD cord-264542-0hu5twhp 57 20 , , , cord-264542-0hu5twhp 57 21 8 8 CD cord-264542-0hu5twhp 57 22 , , , cord-264542-0hu5twhp 57 23 40 40 CD cord-264542-0hu5twhp 57 24 , , , cord-264542-0hu5twhp 57 25 14 14 CD cord-264542-0hu5twhp 57 26 , , , cord-264542-0hu5twhp 57 27 23 23 CD cord-264542-0hu5twhp 57 28 ] ] -RRB- cord-264542-0hu5twhp 57 29 . . . cord-264542-0hu5twhp 58 1 -Identifying -identifye VBG cord-264542-0hu5twhp 59 1 and and CC cord-264542-0hu5twhp 59 2 hierarchizing hierarchize VBG cord-264542-0hu5twhp 59 3 the the DT cord-264542-0hu5twhp 59 4 extent extent NN cord-264542-0hu5twhp 59 5 , , , cord-264542-0hu5twhp 59 6 impact impact NN cord-264542-0hu5twhp 59 7 and and CC cord-264542-0hu5twhp 59 8 severity severity NN cord-264542-0hu5twhp 59 9 of of IN cord-264542-0hu5twhp 59 10 various various JJ cord-264542-0hu5twhp 59 11 ( ( -LRB- cord-264542-0hu5twhp 59 12 including include VBG cord-264542-0hu5twhp 59 13 , , , cord-264542-0hu5twhp 59 14 hypothetical hypothetical JJ cord-264542-0hu5twhp 59 15 ) ) -RRB- cord-264542-0hu5twhp 59 16 new new JJ cord-264542-0hu5twhp 59 17 vulnerabilities vulnerability NNS cord-264542-0hu5twhp 59 18 is be VBZ cord-264542-0hu5twhp 59 19 difficult difficult JJ cord-264542-0hu5twhp 59 20 . . . cord-264542-0hu5twhp 60 1 -There -there NN cord-264542-0hu5twhp 60 2 is be VBZ cord-264542-0hu5twhp 60 3 no no DT cord-264542-0hu5twhp 60 4 comprehensive comprehensive JJ cord-264542-0hu5twhp 60 5 model model NN cord-264542-0hu5twhp 60 6 to to TO cord-264542-0hu5twhp 60 7 effectively effectively RB cord-264542-0hu5twhp 60 8 capture capture VB cord-264542-0hu5twhp 60 9 , , , cord-264542-0hu5twhp 60 10 assess assess VB cord-264542-0hu5twhp 60 11 , , , cord-264542-0hu5twhp 60 12 and and CC cord-264542-0hu5twhp 60 13 address address VB cord-264542-0hu5twhp 60 14 the the DT cord-264542-0hu5twhp 60 15 motivations motivation NNS cord-264542-0hu5twhp 60 16 , , , cord-264542-0hu5twhp 60 17 capabilities capability NNS cord-264542-0hu5twhp 60 18 , , , cord-264542-0hu5twhp 60 19 and and CC cord-264542-0hu5twhp 60 20 approaches approach NNS cord-264542-0hu5twhp 60 21 of of IN cord-264542-0hu5twhp 60 22 those those DT cord-264542-0hu5twhp 60 23 who who WP cord-264542-0hu5twhp 60 24 may may MD cord-264542-0hu5twhp 60 25 cause cause VB cord-264542-0hu5twhp 60 26 harm harm NN cord-264542-0hu5twhp 60 27 ( ( -LRB- cord-264542-0hu5twhp 60 28 see see VB cord-264542-0hu5twhp 60 29 also also RB cord-264542-0hu5twhp 60 30 Sect Sect NNP cord-264542-0hu5twhp 60 31 . . . cord-264542-0hu5twhp 60 32 4.2 4.2 CD cord-264542-0hu5twhp 60 33 ) ) -RRB- cord-264542-0hu5twhp 60 34 . . . cord-264542-0hu5twhp 61 1 • • NNP cord-264542-0hu5twhp 62 1 How how WRB cord-264542-0hu5twhp 62 2 protection protection NN cord-264542-0hu5twhp 62 3 is be VBZ cord-264542-0hu5twhp 62 4 achieved achieve VBN cord-264542-0hu5twhp 62 5 and and CC cord-264542-0hu5twhp 62 6 enforced enforce VBN cord-264542-0hu5twhp 62 7 : : : cord-264542-0hu5twhp 62 8 -Existing -existe VBG cord-264542-0hu5twhp 62 9 solutions solution NNS cord-264542-0hu5twhp 62 10 from from IN cord-264542-0hu5twhp 62 11 the the DT cord-264542-0hu5twhp 62 12 cyber cyber JJ cord-264542-0hu5twhp 62 13 domain domain NN cord-264542-0hu5twhp 62 14 are be VBP cord-264542-0hu5twhp 62 15 only only RB cord-264542-0hu5twhp 62 16 geared gear VBN cord-264542-0hu5twhp 62 17 at at IN cord-264542-0hu5twhp 62 18 specific specific JJ cord-264542-0hu5twhp 62 19 aspects aspect NNS cord-264542-0hu5twhp 62 20 of of IN cord-264542-0hu5twhp 62 21 biosecurity biosecurity NN cord-264542-0hu5twhp 62 22 and and CC cord-264542-0hu5twhp 62 23 cybersecurity cybersecurity NN cord-264542-0hu5twhp 62 24 but but CC cord-264542-0hu5twhp 62 25 do do VBP cord-264542-0hu5twhp 62 26 not not RB cord-264542-0hu5twhp 62 27 address address VB cord-264542-0hu5twhp 62 28 the the DT cord-264542-0hu5twhp 62 29 overlap overlap NN cord-264542-0hu5twhp 62 30 and and CC cord-264542-0hu5twhp 62 31 the the DT cord-264542-0hu5twhp 62 32 issues issue NNS cord-264542-0hu5twhp 62 33 arising arise VBG cord-264542-0hu5twhp 62 34 from from IN cord-264542-0hu5twhp 62 35 this this DT cord-264542-0hu5twhp 62 36 convergence convergence NN cord-264542-0hu5twhp 62 37 [ [ -LRB- cord-264542-0hu5twhp 62 38 8 8 CD cord-264542-0hu5twhp 62 39 , , , cord-264542-0hu5twhp 62 40 40 40 CD cord-264542-0hu5twhp 62 41 , , , cord-264542-0hu5twhp 62 42 14 14 CD cord-264542-0hu5twhp 62 43 ] ] -RRB- cord-264542-0hu5twhp 62 44 . . . cord-264542-0hu5twhp 63 1 -Due -due NN cord-264542-0hu5twhp 63 2 to to IN cord-264542-0hu5twhp 63 3 variations variation NNS cord-264542-0hu5twhp 63 4 in in IN cord-264542-0hu5twhp 63 5 types type NNS cord-264542-0hu5twhp 63 6 of of IN cord-264542-0hu5twhp 63 7 threats threat NNS cord-264542-0hu5twhp 63 8 , , , cord-264542-0hu5twhp 63 9 targets target NNS cord-264542-0hu5twhp 63 10 and and CC cord-264542-0hu5twhp 63 11 potential potential JJ cord-264542-0hu5twhp 63 12 impacts impact NNS cord-264542-0hu5twhp 63 13 , , , cord-264542-0hu5twhp 63 14 it -PRON- PRP cord-264542-0hu5twhp 63 15 is be VBZ cord-264542-0hu5twhp 63 16 not not RB cord-264542-0hu5twhp 63 17 straightforward straightforward JJ cord-264542-0hu5twhp 63 18 to to TO cord-264542-0hu5twhp 63 19 determine determine VB cord-264542-0hu5twhp 63 20 the the DT cord-264542-0hu5twhp 63 21 applicability applicability NN cord-264542-0hu5twhp 63 22 and and CC cord-264542-0hu5twhp 63 23 effectiveness effectiveness NN cord-264542-0hu5twhp 63 24 of of IN cord-264542-0hu5twhp 63 25 a a DT cord-264542-0hu5twhp 63 26 possible possible JJ cord-264542-0hu5twhp 63 27 solution solution NN cord-264542-0hu5twhp 63 28 . . . cord-264542-0hu5twhp 64 1 -As -As . cord-264542-0hu5twhp 65 1 " " `` cord-264542-0hu5twhp 65 2 there there EX cord-264542-0hu5twhp 65 3 is be VBZ cord-264542-0hu5twhp 65 4 no no DT cord-264542-0hu5twhp 65 5 one one CD cord-264542-0hu5twhp 65 6 model model NN cord-264542-0hu5twhp 65 7 " " '' cord-264542-0hu5twhp 65 8 to to TO cord-264542-0hu5twhp 65 9 secure secure VB cord-264542-0hu5twhp 65 10 the the DT cord-264542-0hu5twhp 65 11 use use NN cord-264542-0hu5twhp 65 12 of of IN cord-264542-0hu5twhp 65 13 information information NN cord-264542-0hu5twhp 65 14 systems system NNS cord-264542-0hu5twhp 65 15 across across IN cord-264542-0hu5twhp 65 16 the the DT cord-264542-0hu5twhp 65 17 bioeconomy bioeconomy NN cord-264542-0hu5twhp 65 18 [ [ -LRB- cord-264542-0hu5twhp 65 19 7 7 CD cord-264542-0hu5twhp 65 20 ] ] -RRB- cord-264542-0hu5twhp 65 21 , , . cord-264542-0hu5twhp 66 1 weak weak JJ cord-264542-0hu5twhp 66 2 or or CC cord-264542-0hu5twhp 66 3 premature premature JJ cord-264542-0hu5twhp 66 4 solutions solution NNS cord-264542-0hu5twhp 66 5 may may MD cord-264542-0hu5twhp 66 6 only only RB cord-264542-0hu5twhp 66 7 help help VB cord-264542-0hu5twhp 66 8 address address VB cord-264542-0hu5twhp 66 9 a a DT cord-264542-0hu5twhp 66 10 distinct distinct JJ cord-264542-0hu5twhp 66 11 problem problem NN cord-264542-0hu5twhp 66 12 but but CC cord-264542-0hu5twhp 66 13 be be VB cord-264542-0hu5twhp 66 14 misapplied misapply VBN cord-264542-0hu5twhp 66 15 in in IN cord-264542-0hu5twhp 66 16 a a DT cord-264542-0hu5twhp 66 17 different different JJ cord-264542-0hu5twhp 66 18 context context NN cord-264542-0hu5twhp 66 19 , , , cord-264542-0hu5twhp 66 20 or or CC cord-264542-0hu5twhp 66 21 even even RB cord-264542-0hu5twhp 66 22 become become VB cord-264542-0hu5twhp 66 23 a a DT cord-264542-0hu5twhp 66 24 source source NN cord-264542-0hu5twhp 66 25 for for IN cord-264542-0hu5twhp 66 26 exploitation exploitation NN cord-264542-0hu5twhp 66 27 ( ( -LRB- cord-264542-0hu5twhp 66 28 Sect Sect NNP cord-264542-0hu5twhp 66 29 . . . cord-264542-0hu5twhp 67 1 4.2 4.2 CD cord-264542-0hu5twhp 67 2 and and CC cord-264542-0hu5twhp 67 3 Fig Fig NNP cord-264542-0hu5twhp 67 4 . . . cord-264542-0hu5twhp 68 1 4 4 LS cord-264542-0hu5twhp 68 2 below below RB cord-264542-0hu5twhp 68 3 ) ) -RRB- cord-264542-0hu5twhp 68 4 . . . cord-264542-0hu5twhp 69 1 J J NNP cord-264542-0hu5twhp 69 2 o o NN cord-264542-0hu5twhp 69 3 u u NN cord-264542-0hu5twhp 69 4 r r NN cord-264542-0hu5twhp 69 5 n n NN cord-264542-0hu5twhp 69 6 a a DT cord-264542-0hu5twhp 69 7 l l NN cord-264542-0hu5twhp 69 8 P p NN cord-264542-0hu5twhp 69 9 r r NN cord-264542-0hu5twhp 69 10 e e NN cord-264542-0hu5twhp 70 1 -p -p : cord-264542-0hu5twhp 71 1 r r NNP cord-264542-0hu5twhp 71 2 o o NN cord-264542-0hu5twhp 71 3 o o NN cord-264542-0hu5twhp 71 4 f f NN cord-264542-0hu5twhp 71 5 standards standard NNS cord-264542-0hu5twhp 71 6 and and CC cord-264542-0hu5twhp 71 7 guidelines guideline NNS cord-264542-0hu5twhp 71 8 [ [ -LRB- cord-264542-0hu5twhp 71 9 11 11 CD cord-264542-0hu5twhp 71 10 , , , cord-264542-0hu5twhp 71 11 22 22 CD cord-264542-0hu5twhp 71 12 , , , cord-264542-0hu5twhp 71 13 34 34 CD cord-264542-0hu5twhp 71 14 ] ] -RRB- cord-264542-0hu5twhp 71 15 are be VBP cord-264542-0hu5twhp 71 16 a a DT cord-264542-0hu5twhp 71 17 serious serious JJ cord-264542-0hu5twhp 71 18 issue issue NN cord-264542-0hu5twhp 71 19 to to TO cord-264542-0hu5twhp 71 20 achieve achieve VB cord-264542-0hu5twhp 71 21 comprehensive comprehensive JJ cord-264542-0hu5twhp 71 22 and and CC cord-264542-0hu5twhp 71 23 international international JJ cord-264542-0hu5twhp 71 24 protection protection NN cord-264542-0hu5twhp 71 25 . . . cord-264542-0hu5twhp 72 1 Very very RB cord-264542-0hu5twhp 72 2 recent recent JJ cord-264542-0hu5twhp 72 3 publications publication NNS cord-264542-0hu5twhp 72 4 and and CC cord-264542-0hu5twhp 72 5 programs program NNS cord-264542-0hu5twhp 72 6 [ [ -LRB- cord-264542-0hu5twhp 72 7 33 33 CD cord-264542-0hu5twhp 72 8 , , , cord-264542-0hu5twhp 72 9 41 41 CD cord-264542-0hu5twhp 72 10 , , , cord-264542-0hu5twhp 72 11 7 7 CD cord-264542-0hu5twhp 72 12 , , , cord-264542-0hu5twhp 72 13 42 42 CD cord-264542-0hu5twhp 72 14 , , , cord-264542-0hu5twhp 72 15 43 43 CD cord-264542-0hu5twhp 72 16 , , , cord-264542-0hu5twhp 72 17 44 44 CD cord-264542-0hu5twhp 72 18 , , , cord-264542-0hu5twhp 72 19 45 45 CD cord-264542-0hu5twhp 72 20 , , , cord-264542-0hu5twhp 72 21 46 46 CD cord-264542-0hu5twhp 72 22 , , , cord-264542-0hu5twhp 72 23 47 47 CD cord-264542-0hu5twhp 72 24 ] ] -RRB- cord-264542-0hu5twhp 72 25 ) ) -RRB- cord-264542-0hu5twhp 72 26 undoubtedly undoubtedly RB cord-264542-0hu5twhp 72 27 have have VBP cord-264542-0hu5twhp 72 28 increased increase VBN cord-264542-0hu5twhp 72 29 cyberbiosecurity cyberbiosecurity NN cord-264542-0hu5twhp 72 30 awareness awareness NN cord-264542-0hu5twhp 72 31 and and CC cord-264542-0hu5twhp 72 32 large large JJ cord-264542-0hu5twhp 72 33 corporations corporation NNS cord-264542-0hu5twhp 72 34 will will MD cord-264542-0hu5twhp 72 35 have have VB cord-264542-0hu5twhp 72 36 been be VBN cord-264542-0hu5twhp 72 37 able able JJ cord-264542-0hu5twhp 72 38 to to TO cord-264542-0hu5twhp 72 39 enhance enhance VB cord-264542-0hu5twhp 72 40 their -PRON- PRP$ cord-264542-0hu5twhp 72 41 infrastructure infrastructure NN cord-264542-0hu5twhp 72 42 . . . cord-264542-0hu5twhp 73 1 Yet yet RB cord-264542-0hu5twhp 73 2 , , , cord-264542-0hu5twhp 73 3 the the DT cord-264542-0hu5twhp 73 4 2020 2020 CD cord-264542-0hu5twhp 73 5 pandemic pandemic NN cord-264542-0hu5twhp 73 6 has have VBZ cord-264542-0hu5twhp 73 7 shifted shift VBN cord-264542-0hu5twhp 73 8 R R NNP cord-264542-0hu5twhp 73 9 & & CC cord-264542-0hu5twhp 73 10 D D NNP cord-264542-0hu5twhp 73 11 priorities priority NNS cord-264542-0hu5twhp 73 12 and and CC cord-264542-0hu5twhp 73 13 budget budget NN cord-264542-0hu5twhp 73 14 and and CC cord-264542-0hu5twhp 73 15 has have VBZ cord-264542-0hu5twhp 73 16 hampered hamper VBN cord-264542-0hu5twhp 73 17 many many JJ cord-264542-0hu5twhp 73 18 efforts effort NNS cord-264542-0hu5twhp 73 19 to to TO cord-264542-0hu5twhp 73 20 better better RB cord-264542-0hu5twhp 73 21 comprehend comprehend VB cord-264542-0hu5twhp 73 22 the the DT cord-264542-0hu5twhp 73 23 new new JJ cord-264542-0hu5twhp 73 24 risks risk NNS cord-264542-0hu5twhp 73 25 and and CC cord-264542-0hu5twhp 73 26 to to TO cord-264542-0hu5twhp 73 27 develop develop VB cord-264542-0hu5twhp 73 28 solutions solution NNS cord-264542-0hu5twhp 73 29 . . . cord-264542-0hu5twhp 74 1 Pharma Pharma NNS cord-264542-0hu5twhp 74 2 and and CC cord-264542-0hu5twhp 74 3 medtech medtech NN cord-264542-0hu5twhp 74 4 professionals professional NNS cord-264542-0hu5twhp 74 5 and and CC cord-264542-0hu5twhp 74 6 companies company NNS cord-264542-0hu5twhp 74 7 are be VBP cord-264542-0hu5twhp 74 8 overwhelmed overwhelmed JJ cord-264542-0hu5twhp 74 9 with with IN cord-264542-0hu5twhp 74 10 COVID-19 covid-19 JJ cord-264542-0hu5twhp 74 11 mitigation mitigation NN cord-264542-0hu5twhp 74 12 and and CC cord-264542-0hu5twhp 74 13 crisis crisis NN cord-264542-0hu5twhp 74 14 resolution resolution NN cord-264542-0hu5twhp 74 15 while while IN cord-264542-0hu5twhp 74 16 the the DT cord-264542-0hu5twhp 74 17 industry industry NN cord-264542-0hu5twhp 74 18 sprints sprint NNS cord-264542-0hu5twhp 74 19 to to TO cord-264542-0hu5twhp 74 20 develop develop VB cord-264542-0hu5twhp 74 21 new new JJ cord-264542-0hu5twhp 74 22 therapeutics therapeutic NNS cord-264542-0hu5twhp 74 23 and and CC cord-264542-0hu5twhp 74 24 vaccines vaccine NNS cord-264542-0hu5twhp 74 25 . . . cord-264542-0hu5twhp 75 1 On on IN cord-264542-0hu5twhp 75 2 the the DT cord-264542-0hu5twhp 75 3 other other JJ cord-264542-0hu5twhp 75 4 hand hand NN cord-264542-0hu5twhp 75 5 , , , cord-264542-0hu5twhp 75 6 the the DT cord-264542-0hu5twhp 75 7 pandemic pandemic NN cord-264542-0hu5twhp 75 8 has have VBZ cord-264542-0hu5twhp 75 9 led lead VBN cord-264542-0hu5twhp 75 10 to to IN cord-264542-0hu5twhp 75 11 a a DT cord-264542-0hu5twhp 75 12 huge huge JJ cord-264542-0hu5twhp 75 13 rise rise NN cord-264542-0hu5twhp 75 14 in in IN cord-264542-0hu5twhp 75 15 cyber cyber NN cord-264542-0hu5twhp 75 16 - - NNS cord-264542-0hu5twhp 75 17 attacks attack NNS cord-264542-0hu5twhp 75 18 , , , cord-264542-0hu5twhp 75 19 with with IN cord-264542-0hu5twhp 75 20 some some DT cord-264542-0hu5twhp 75 21 reporting reporting NN cord-264542-0hu5twhp 75 22 an an DT cord-264542-0hu5twhp 75 23 800 800 CD cord-264542-0hu5twhp 75 24 % % NN cord-264542-0hu5twhp 75 25 increase increase NN cord-264542-0hu5twhp 75 26 compared compare VBN cord-264542-0hu5twhp 75 27 to to IN cord-264542-0hu5twhp 75 28 pre pre JJ cord-264542-0hu5twhp 75 29 - - JJ cord-264542-0hu5twhp 75 30 coronavirus coronavirus JJ cord-264542-0hu5twhp 75 31 levels level NNS cord-264542-0hu5twhp 75 32 [ [ -LRB- cord-264542-0hu5twhp 75 33 48 48 CD cord-264542-0hu5twhp 75 34 ] ] -RRB- cord-264542-0hu5twhp 75 35 . . . cord-264542-0hu5twhp 76 1 As as IN cord-264542-0hu5twhp 76 2 cybersecurity cybersecurity NN cord-264542-0hu5twhp 76 3 professionals professional NNS cord-264542-0hu5twhp 76 4 are be VBP cord-264542-0hu5twhp 76 5 struggling struggle VBG cord-264542-0hu5twhp 76 6 to to TO cord-264542-0hu5twhp 76 7 target target VB cord-264542-0hu5twhp 76 8 this this DT cord-264542-0hu5twhp 76 9 surge surge NN cord-264542-0hu5twhp 76 10 in in IN cord-264542-0hu5twhp 76 11 cyber cyber NN cord-264542-0hu5twhp 76 12 - - HYPH cord-264542-0hu5twhp 76 13 crime crime NN cord-264542-0hu5twhp 76 14 , , , cord-264542-0hu5twhp 76 15 WFH WFH NNP cord-264542-0hu5twhp 76 16 ( ( -LRB- cord-264542-0hu5twhp 76 17 work work NN cord-264542-0hu5twhp 76 18 from from IN cord-264542-0hu5twhp 76 19 home home NN cord-264542-0hu5twhp 76 20 ) ) -RRB- cord-264542-0hu5twhp 76 21 has have VBZ cord-264542-0hu5twhp 76 22 impacted impact VBN cord-264542-0hu5twhp 76 23 the the DT cord-264542-0hu5twhp 76 24 ability ability NN cord-264542-0hu5twhp 76 25 of of IN cord-264542-0hu5twhp 76 26 many many JJ cord-264542-0hu5twhp 76 27 cybersecurity cybersecurity NN cord-264542-0hu5twhp 76 28 professionals professional NNS cord-264542-0hu5twhp 76 29 to to TO cord-264542-0hu5twhp 76 30 support support VB cord-264542-0hu5twhp 76 31 new new JJ cord-264542-0hu5twhp 76 32 business business NN cord-264542-0hu5twhp 76 33 applications application NNS cord-264542-0hu5twhp 76 34 or or CC cord-264542-0hu5twhp 76 35 initiatives initiative NNS cord-264542-0hu5twhp 76 36 [ [ -LRB- cord-264542-0hu5twhp 76 37 49 49 CD cord-264542-0hu5twhp 76 38 ] ] -RRB- cord-264542-0hu5twhp 76 39 . . . cord-264542-0hu5twhp 77 1 As as IN cord-264542-0hu5twhp 77 2 companies company NNS cord-264542-0hu5twhp 77 3 and and CC cord-264542-0hu5twhp 77 4 organizations organization NNS cord-264542-0hu5twhp 77 5 struggle struggle VBP cord-264542-0hu5twhp 77 6 to to TO cord-264542-0hu5twhp 77 7 maintain maintain VB cord-264542-0hu5twhp 77 8 stability stability NN cord-264542-0hu5twhp 77 9 and and CC cord-264542-0hu5twhp 77 10 security security NN cord-264542-0hu5twhp 77 11 , , , cord-264542-0hu5twhp 77 12 new new JJ cord-264542-0hu5twhp 77 13 research research NN cord-264542-0hu5twhp 77 14 areas area NNS cord-264542-0hu5twhp 77 15 such such JJ cord-264542-0hu5twhp 77 16 as as IN cord-264542-0hu5twhp 77 17 cyberbiosecurity cyberbiosecurity NNP cord-264542-0hu5twhp 77 18 have have VBP cord-264542-0hu5twhp 77 19 received receive VBN cord-264542-0hu5twhp 77 20 inadequate inadequate JJ cord-264542-0hu5twhp 77 21 attention attention NN cord-264542-0hu5twhp 77 22 and and CC cord-264542-0hu5twhp 77 23 support support NN cord-264542-0hu5twhp 77 24 . . . cord-264542-0hu5twhp 78 1 In in IN cord-264542-0hu5twhp 78 2 addition addition NN cord-264542-0hu5twhp 78 3 to to IN cord-264542-0hu5twhp 78 4 the the DT cord-264542-0hu5twhp 78 5 known know VBN cord-264542-0hu5twhp 78 6 cyberbio cyberbio NN cord-264542-0hu5twhp 78 7 challenges challenge NNS cord-264542-0hu5twhp 78 8 described describe VBN cord-264542-0hu5twhp 78 9 above above RB cord-264542-0hu5twhp 78 10 , , , cord-264542-0hu5twhp 78 11 the the DT cord-264542-0hu5twhp 78 12 context context NN cord-264542-0hu5twhp 78 13 of of IN cord-264542-0hu5twhp 78 14 the the DT cord-264542-0hu5twhp 78 15 bioscience bioscience NN cord-264542-0hu5twhp 78 16 fields field NNS cord-264542-0hu5twhp 78 17 leads lead VBZ cord-264542-0hu5twhp 78 18 to to IN cord-264542-0hu5twhp 78 19 distinct distinct JJ cord-264542-0hu5twhp 78 20 problems problem NNS cord-264542-0hu5twhp 78 21 that that WDT cord-264542-0hu5twhp 78 22 are be VBP cord-264542-0hu5twhp 78 23 not not RB cord-264542-0hu5twhp 78 24 well well RB cord-264542-0hu5twhp 78 25 understood understand VBN cord-264542-0hu5twhp 78 26 . . . cord-264542-0hu5twhp 79 1 The the DT cord-264542-0hu5twhp 79 2 context context NN cord-264542-0hu5twhp 79 3 of of IN cord-264542-0hu5twhp 79 4 the the DT cord-264542-0hu5twhp 79 5 life life NN cord-264542-0hu5twhp 79 6 - - HYPH cord-264542-0hu5twhp 79 7 sciences science NNS cord-264542-0hu5twhp 79 8 involves involve VBZ cord-264542-0hu5twhp 79 9 unique unique JJ cord-264542-0hu5twhp 79 10 concerns concern NNS cord-264542-0hu5twhp 79 11 and and CC cord-264542-0hu5twhp 79 12 unknowns unknown NNS cord-264542-0hu5twhp 79 13 . . . cord-264542-0hu5twhp 80 1 Cyber Cyber NNP cord-264542-0hu5twhp 80 2 - - HYPH cord-264542-0hu5twhp 80 3 based base VBN cord-264542-0hu5twhp 80 4 attacks attack NNS cord-264542-0hu5twhp 80 5 targeting target VBG cord-264542-0hu5twhp 80 6 the the DT cord-264542-0hu5twhp 80 7 biological biological JJ cord-264542-0hu5twhp 80 8 and and CC cord-264542-0hu5twhp 80 9 medical medical JJ cord-264542-0hu5twhp 80 10 sciences science NNS cord-264542-0hu5twhp 80 11 involve involve VBP cord-264542-0hu5twhp 80 12 living live VBG cord-264542-0hu5twhp 80 13 entities entity NNS cord-264542-0hu5twhp 80 14 , , , cord-264542-0hu5twhp 80 15 with with IN cord-264542-0hu5twhp 80 16 networks network NNS cord-264542-0hu5twhp 80 17 of of IN cord-264542-0hu5twhp 80 18 connections connection NNS cord-264542-0hu5twhp 80 19 , , , cord-264542-0hu5twhp 80 20 combinatorial combinatorial JJ cord-264542-0hu5twhp 80 21 interactions interaction NNS cord-264542-0hu5twhp 80 22 and and CC cord-264542-0hu5twhp 80 23 a a DT cord-264542-0hu5twhp 80 24 dynamic dynamic JJ cord-264542-0hu5twhp 80 25 range range NN cord-264542-0hu5twhp 80 26 of of IN cord-264542-0hu5twhp 80 27 outcomes outcome NNS cord-264542-0hu5twhp 80 28 . . . cord-264542-0hu5twhp 81 1 Future future NN cord-264542-0hu5twhp 81 2 and and CC cord-264542-0hu5twhp 81 3 timed time VBN cord-264542-0hu5twhp 81 4 effects effect NNS cord-264542-0hu5twhp 81 5 can can MD cord-264542-0hu5twhp 81 6 be be VB cord-264542-0hu5twhp 81 7 achieved achieve VBN cord-264542-0hu5twhp 81 8 by by IN cord-264542-0hu5twhp 81 9 various various JJ cord-264542-0hu5twhp 81 10 technologies technology NNS cord-264542-0hu5twhp 81 11 ( ( -LRB- cord-264542-0hu5twhp 81 12 e.g. e.g. RB cord-264542-0hu5twhp 81 13 , , , cord-264542-0hu5twhp 81 14 non non JJ cord-264542-0hu5twhp 81 15 - - JJ cord-264542-0hu5twhp 81 16 volatile volatile JJ cord-264542-0hu5twhp 81 17 memory memory NN cord-264542-0hu5twhp 81 18 devices device NNS cord-264542-0hu5twhp 81 19 and and CC cord-264542-0hu5twhp 81 20 electronic electronic JJ cord-264542-0hu5twhp 81 21 circuits circuit NNS cord-264542-0hu5twhp 81 22 ) ) -RRB- cord-264542-0hu5twhp 81 23 . . . cord-264542-0hu5twhp 82 1 Yet yet RB cord-264542-0hu5twhp 82 2 , , , cord-264542-0hu5twhp 82 3 with with IN cord-264542-0hu5twhp 82 4 biotechnology biotechnology NN cord-264542-0hu5twhp 82 5 products product NNS cord-264542-0hu5twhp 82 6 there there EX cord-264542-0hu5twhp 82 7 is be VBZ cord-264542-0hu5twhp 82 8 a a DT cord-264542-0hu5twhp 82 9 decreased decrease VBN cord-264542-0hu5twhp 82 10 ability ability NN cord-264542-0hu5twhp 82 11 to to TO cord-264542-0hu5twhp 82 12 control control VB cord-264542-0hu5twhp 82 13 exposure exposure NN cord-264542-0hu5twhp 82 14 [ [ -LRB- cord-264542-0hu5twhp 82 15 50 50 CD cord-264542-0hu5twhp 82 16 ] ] -RRB- cord-264542-0hu5twhp 83 1 : : : cord-264542-0hu5twhp 83 2 They -PRON- PRP cord-264542-0hu5twhp 83 3 are be VBP cord-264542-0hu5twhp 83 4 often often RB cord-264542-0hu5twhp 83 5 designed design VBN cord-264542-0hu5twhp 83 6 to to TO cord-264542-0hu5twhp 83 7 be be VB cord-264542-0hu5twhp 83 8 easily easily RB cord-264542-0hu5twhp 83 9 dispersed disperse VBN cord-264542-0hu5twhp 83 10 ( ( -LRB- cord-264542-0hu5twhp 83 11 e.g. e.g. RB cord-264542-0hu5twhp 83 12 , , , cord-264542-0hu5twhp 83 13 with with IN cord-264542-0hu5twhp 83 14 agricultural agricultural JJ cord-264542-0hu5twhp 83 15 technologies technology NNS cord-264542-0hu5twhp 83 16 directly directly RB cord-264542-0hu5twhp 83 17 in in IN cord-264542-0hu5twhp 83 18 the the DT cord-264542-0hu5twhp 83 19 field field NN cord-264542-0hu5twhp 83 20 [ [ -LRB- cord-264542-0hu5twhp 83 21 51 51 CD cord-264542-0hu5twhp 83 22 ] ] -RRB- cord-264542-0hu5twhp 83 23 ) ) -RRB- cord-264542-0hu5twhp 83 24 , , , cord-264542-0hu5twhp 83 25 reach reach VB cord-264542-0hu5twhp 83 26 high high JJ cord-264542-0hu5twhp 83 27 scalability scalability NN cord-264542-0hu5twhp 83 28 [ [ -LRB- cord-264542-0hu5twhp 83 29 50 50 CD cord-264542-0hu5twhp 83 30 ] ] -RRB- cord-264542-0hu5twhp 83 31 , , , cord-264542-0hu5twhp 83 32 can can MD cord-264542-0hu5twhp 83 33 be be VB cord-264542-0hu5twhp 83 34 delivered deliver VBN cord-264542-0hu5twhp 83 35 in in IN cord-264542-0hu5twhp 83 36 different different JJ cord-264542-0hu5twhp 83 37 states state NNS cord-264542-0hu5twhp 83 38 ( ( -LRB- cord-264542-0hu5twhp 83 39 including include VBG cord-264542-0hu5twhp 83 40 water water NN cord-264542-0hu5twhp 83 41 [ [ -LRB- cord-264542-0hu5twhp 83 42 52 52 CD cord-264542-0hu5twhp 83 43 ] ] -RRB- cord-264542-0hu5twhp 83 44 ) ) -RRB- cord-264542-0hu5twhp 83 45 , , , cord-264542-0hu5twhp 83 46 and and CC cord-264542-0hu5twhp 83 47 can can MD cord-264542-0hu5twhp 83 48 be be VB cord-264542-0hu5twhp 83 49 activated activate VBN cord-264542-0hu5twhp 83 50 by by IN cord-264542-0hu5twhp 83 51 simple simple JJ cord-264542-0hu5twhp 83 52 environmental environmental JJ cord-264542-0hu5twhp 83 53 agents agent NNS cord-264542-0hu5twhp 83 54 ( ( -LRB- cord-264542-0hu5twhp 83 55 temperature temperature NN cord-264542-0hu5twhp 83 56 , , , cord-264542-0hu5twhp 83 57 light light NN cord-264542-0hu5twhp 83 58 , , , cord-264542-0hu5twhp 83 59 wind wind NN cord-264542-0hu5twhp 83 60 [ [ -LRB- cord-264542-0hu5twhp 83 61 53 53 CD cord-264542-0hu5twhp 83 62 , , , cord-264542-0hu5twhp 83 63 54 54 CD cord-264542-0hu5twhp 83 64 , , , cord-264542-0hu5twhp 83 65 55 55 CD cord-264542-0hu5twhp 83 66 ] ] -RRB- cord-264542-0hu5twhp 83 67 ) ) -RRB- cord-264542-0hu5twhp 83 68 . . . cord-264542-0hu5twhp 84 1 A a DT cord-264542-0hu5twhp 84 2 critical critical JJ cord-264542-0hu5twhp 84 3 issue issue NN cord-264542-0hu5twhp 84 4 with with IN cord-264542-0hu5twhp 84 5 active active JJ cord-264542-0hu5twhp 84 6 biologicals biological NNS cord-264542-0hu5twhp 84 7 is be VBZ cord-264542-0hu5twhp 84 8 that that IN cord-264542-0hu5twhp 84 9 they -PRON- PRP cord-264542-0hu5twhp 84 10 can can MD cord-264542-0hu5twhp 84 11 be be VB cord-264542-0hu5twhp 84 12 transferred transfer VBN cord-264542-0hu5twhp 84 13 by by IN cord-264542-0hu5twhp 84 14 contact contact NN cord-264542-0hu5twhp 84 15 , , , cord-264542-0hu5twhp 84 16 ingestion ingestion NN cord-264542-0hu5twhp 84 17 , , , cord-264542-0hu5twhp 84 18 J J NNP cord-264542-0hu5twhp 84 19 o o NNP cord-264542-0hu5twhp 85 1 u u NNP cord-264542-0hu5twhp 85 2 r r NNP cord-264542-0hu5twhp 85 3 n n NN cord-264542-0hu5twhp 85 4 a a DT cord-264542-0hu5twhp 85 5 l l NN cord-264542-0hu5twhp 85 6 P p NN cord-264542-0hu5twhp 85 7 r r NN cord-264542-0hu5twhp 85 8 e e NN cord-264542-0hu5twhp 85 9 -p -p NN cord-264542-0hu5twhp 86 1 r r NN cord-264542-0hu5twhp 86 2 o o NN cord-264542-0hu5twhp 86 3 o o NN cord-264542-0hu5twhp 86 4 f f NNP cord-264542-0hu5twhp 86 5 Journal Journal NNP cord-264542-0hu5twhp 86 6 Pre pre NN cord-264542-0hu5twhp 86 7 - - NN cord-264542-0hu5twhp 86 8 proof proof NN cord-264542-0hu5twhp 86 9 or or CC cord-264542-0hu5twhp 86 10 inhalation inhalation NN cord-264542-0hu5twhp 86 11 [ [ -LRB- cord-264542-0hu5twhp 86 12 50 50 CD cord-264542-0hu5twhp 86 13 ] ] -RRB- cord-264542-0hu5twhp 86 14 . . . cord-264542-0hu5twhp 87 1 While while IN cord-264542-0hu5twhp 87 2 concerns concern NNS cord-264542-0hu5twhp 87 3 about about IN cord-264542-0hu5twhp 87 4 unintended unintended JJ cord-264542-0hu5twhp 87 5 consequences consequence NNS cord-264542-0hu5twhp 87 6 and and CC cord-264542-0hu5twhp 87 7 ill ill RB cord-264542-0hu5twhp 87 8 - - HYPH cord-264542-0hu5twhp 87 9 intended intend VBN cord-264542-0hu5twhp 87 10 applications application NNS cord-264542-0hu5twhp 87 11 of of IN cord-264542-0hu5twhp 87 12 these these DT cord-264542-0hu5twhp 87 13 and and CC cord-264542-0hu5twhp 87 14 related related JJ cord-264542-0hu5twhp 87 15 technologies technology NNS cord-264542-0hu5twhp 87 16 have have VBP cord-264542-0hu5twhp 87 17 been be VBN cord-264542-0hu5twhp 87 18 raised raise VBN cord-264542-0hu5twhp 87 19 recently recently RB cord-264542-0hu5twhp 87 20 ( ( -LRB- cord-264542-0hu5twhp 87 21 see see VB cord-264542-0hu5twhp 87 22 e.g. e.g. RB cord-264542-0hu5twhp 87 23 , , , cord-264542-0hu5twhp 87 24 [ [ -LRB- cord-264542-0hu5twhp 87 25 50 50 CD cord-264542-0hu5twhp 87 26 , , , cord-264542-0hu5twhp 87 27 56 56 CD cord-264542-0hu5twhp 87 28 , , , cord-264542-0hu5twhp 87 29 57 57 CD cord-264542-0hu5twhp 87 30 , , , cord-264542-0hu5twhp 87 31 18 18 CD cord-264542-0hu5twhp 87 32 , , , cord-264542-0hu5twhp 87 33 33 33 CD cord-264542-0hu5twhp 87 34 , , , cord-264542-0hu5twhp 87 35 13 13 CD cord-264542-0hu5twhp 87 36 , , , cord-264542-0hu5twhp 87 37 7 7 CD cord-264542-0hu5twhp 87 38 ] ] -RRB- cord-264542-0hu5twhp 87 39 ) ) -RRB- cord-264542-0hu5twhp 87 40 , , , cord-264542-0hu5twhp 87 41 types type NNS cord-264542-0hu5twhp 87 42 of of IN cord-264542-0hu5twhp 87 43 biotechnologies biotechnology NNS cord-264542-0hu5twhp 87 44 that that WDT cord-264542-0hu5twhp 87 45 not not RB cord-264542-0hu5twhp 87 46 merely merely RB cord-264542-0hu5twhp 87 47 have have VBP cord-264542-0hu5twhp 87 48 a a DT cord-264542-0hu5twhp 87 49 cyber cyber NN cord-264542-0hu5twhp 87 50 - - JJ cord-264542-0hu5twhp 87 51 overlap overlap NN cord-264542-0hu5twhp 87 52 , , , cord-264542-0hu5twhp 87 53 but but CC cord-264542-0hu5twhp 87 54 which which WDT cord-264542-0hu5twhp 87 55 constitute constitute VBP cord-264542-0hu5twhp 87 56 artificial artificial JJ cord-264542-0hu5twhp 87 57 systems system NNS cord-264542-0hu5twhp 87 58 themselves -PRON- PRP cord-264542-0hu5twhp 87 59 , , , cord-264542-0hu5twhp 87 60 have have VBP cord-264542-0hu5twhp 87 61 been be VBN cord-264542-0hu5twhp 87 62 even even RB cord-264542-0hu5twhp 87 63 less less RBR cord-264542-0hu5twhp 87 64 assessed assess VBN cord-264542-0hu5twhp 87 65 . . . cord-264542-0hu5twhp 88 1 These these DT cord-264542-0hu5twhp 88 2 include include VBP cord-264542-0hu5twhp 88 3 artificially artificially RB cord-264542-0hu5twhp 88 4 generated generate VBN cord-264542-0hu5twhp 88 5 self self NN cord-264542-0hu5twhp 88 6 - - HYPH cord-264542-0hu5twhp 88 7 replicating replicate VBG cord-264542-0hu5twhp 88 8 systems system NNS cord-264542-0hu5twhp 88 9 [ [ -LRB- cord-264542-0hu5twhp 88 10 58 58 CD cord-264542-0hu5twhp 88 11 ] ] -RRB- cord-264542-0hu5twhp 88 12 , , , cord-264542-0hu5twhp 88 13 artificial artificial JJ cord-264542-0hu5twhp 88 14 cells cell NNS cord-264542-0hu5twhp 88 15 that that WDT cord-264542-0hu5twhp 88 16 mimic mimic VBP cord-264542-0hu5twhp 88 17 the the DT cord-264542-0hu5twhp 88 18 ability ability NN cord-264542-0hu5twhp 88 19 of of IN cord-264542-0hu5twhp 88 20 natural natural JJ cord-264542-0hu5twhp 88 21 cells cell NNS cord-264542-0hu5twhp 88 22 to to TO cord-264542-0hu5twhp 88 23 communicate communicate VB cord-264542-0hu5twhp 88 24 with with IN cord-264542-0hu5twhp 88 25 bacteria bacteria NNS cord-264542-0hu5twhp 88 26 [ [ -LRB- cord-264542-0hu5twhp 88 27 59 59 CD cord-264542-0hu5twhp 88 28 ] ] -RRB- cord-264542-0hu5twhp 88 29 , , , cord-264542-0hu5twhp 88 30 or or CC cord-264542-0hu5twhp 88 31 artificially artificially RB cord-264542-0hu5twhp 88 32 generated generate VBN cord-264542-0hu5twhp 88 33 processes process NNS cord-264542-0hu5twhp 88 34 to to TO cord-264542-0hu5twhp 88 35 interact interact VB cord-264542-0hu5twhp 88 36 with with IN cord-264542-0hu5twhp 88 37 one one CD cord-264542-0hu5twhp 88 38 another another DT cord-264542-0hu5twhp 88 39 and and CC cord-264542-0hu5twhp 88 40 initiate initiate VB cord-264542-0hu5twhp 88 41 various various JJ cord-264542-0hu5twhp 88 42 signaling signaling NN cord-264542-0hu5twhp 88 43 cascades cascade NNS cord-264542-0hu5twhp 88 44 [ [ -LRB- cord-264542-0hu5twhp 88 45 60 60 CD cord-264542-0hu5twhp 88 46 ] ] -RRB- cord-264542-0hu5twhp 88 47 . . . cord-264542-0hu5twhp 89 1 The the DT cord-264542-0hu5twhp 89 2 consequences consequence NNS cord-264542-0hu5twhp 89 3 of of IN cord-264542-0hu5twhp 89 4 an an DT cord-264542-0hu5twhp 89 5 ill ill RB cord-264542-0hu5twhp 89 6 - - HYPH cord-264542-0hu5twhp 89 7 intended intended JJ cord-264542-0hu5twhp 89 8 or or CC cord-264542-0hu5twhp 89 9 accidental accidental JJ cord-264542-0hu5twhp 89 10 release release NN cord-264542-0hu5twhp 89 11 of of IN cord-264542-0hu5twhp 89 12 such such JJ cord-264542-0hu5twhp 89 13 systems system NNS cord-264542-0hu5twhp 89 14 into into IN cord-264542-0hu5twhp 89 15 the the DT cord-264542-0hu5twhp 89 16 environment environment NN cord-264542-0hu5twhp 89 17 are be VBP cord-264542-0hu5twhp 89 18 not not RB cord-264542-0hu5twhp 89 19 understood understand VBN cord-264542-0hu5twhp 89 20 . . . cord-264542-0hu5twhp 90 1 One one CD cord-264542-0hu5twhp 90 2 of of IN cord-264542-0hu5twhp 90 3 the the DT cord-264542-0hu5twhp 90 4 most most RBS cord-264542-0hu5twhp 90 5 complex complex JJ cord-264542-0hu5twhp 90 6 issues issue NNS cord-264542-0hu5twhp 90 7 may may MD cord-264542-0hu5twhp 90 8 be be VB cord-264542-0hu5twhp 90 9 that that IN cord-264542-0hu5twhp 90 10 " " `` cord-264542-0hu5twhp 90 11 information information NN cord-264542-0hu5twhp 90 12 " " '' cord-264542-0hu5twhp 90 13 in in IN cord-264542-0hu5twhp 90 14 the the DT cord-264542-0hu5twhp 90 15 biological biological JJ cord-264542-0hu5twhp 90 16 context context NN cord-264542-0hu5twhp 90 17 is be VBZ cord-264542-0hu5twhp 90 18 of of IN cord-264542-0hu5twhp 90 19 a a DT cord-264542-0hu5twhp 90 20 different different JJ cord-264542-0hu5twhp 90 21 kind kind NN cord-264542-0hu5twhp 90 22 than than IN cord-264542-0hu5twhp 90 23 what what WP cord-264542-0hu5twhp 90 24 is be VBZ cord-264542-0hu5twhp 90 25 meant mean VBN cord-264542-0hu5twhp 90 26 in in IN cord-264542-0hu5twhp 90 27 the the DT cord-264542-0hu5twhp 90 28 information information NN cord-264542-0hu5twhp 90 29 sciences science NNS cord-264542-0hu5twhp 90 30 . . . cord-264542-0hu5twhp 91 1 Identifying identify VBG cord-264542-0hu5twhp 91 2 " " `` cord-264542-0hu5twhp 91 3 biological biological JJ cord-264542-0hu5twhp 91 4 information information NN cord-264542-0hu5twhp 91 5 " " '' cord-264542-0hu5twhp 91 6 is be VBZ cord-264542-0hu5twhp 91 7 not not RB cord-264542-0hu5twhp 91 8 always always RB cord-264542-0hu5twhp 91 9 straightforward straightforward JJ cord-264542-0hu5twhp 91 10 and and CC cord-264542-0hu5twhp 91 11 may may MD cord-264542-0hu5twhp 91 12 evade evade VB cord-264542-0hu5twhp 91 13 available available JJ cord-264542-0hu5twhp 91 14 technology technology NN cord-264542-0hu5twhp 91 15 from from IN cord-264542-0hu5twhp 91 16 time time NN cord-264542-0hu5twhp 91 17 to to IN cord-264542-0hu5twhp 91 18 time time NN cord-264542-0hu5twhp 91 19 : : : cord-264542-0hu5twhp 91 20 consider consider VB cord-264542-0hu5twhp 91 21 , , , cord-264542-0hu5twhp 91 22 for for IN cord-264542-0hu5twhp 91 23 instance instance NN cord-264542-0hu5twhp 91 24 , , , cord-264542-0hu5twhp 91 25 the the DT cord-264542-0hu5twhp 91 26 situation situation NN cord-264542-0hu5twhp 91 27 of of IN cord-264542-0hu5twhp 91 28 recessive recessive JJ cord-264542-0hu5twhp 91 29 alleles allele NNS cord-264542-0hu5twhp 91 30 of of IN cord-264542-0hu5twhp 91 31 a a DT cord-264542-0hu5twhp 91 32 gene gene NN cord-264542-0hu5twhp 91 33 . . . cord-264542-0hu5twhp 92 1 These these DT cord-264542-0hu5twhp 92 2 can can MD cord-264542-0hu5twhp 92 3 be be VB cord-264542-0hu5twhp 92 4 phenotypically phenotypically RB cord-264542-0hu5twhp 92 5 invisible invisible JJ cord-264542-0hu5twhp 92 6 over over IN cord-264542-0hu5twhp 92 7 a a DT cord-264542-0hu5twhp 92 8 huge huge JJ cord-264542-0hu5twhp 92 9 proportion proportion NN cord-264542-0hu5twhp 92 10 of of IN cord-264542-0hu5twhp 92 11 a a DT cord-264542-0hu5twhp 92 12 population population NN cord-264542-0hu5twhp 92 13 and and CC cord-264542-0hu5twhp 92 14 known know VBN cord-264542-0hu5twhp 92 15 for for IN cord-264542-0hu5twhp 92 16 their -PRON- PRP$ cord-264542-0hu5twhp 92 17 frequency frequency NN cord-264542-0hu5twhp 92 18 using use VBG cord-264542-0hu5twhp 92 19 tools tool NNS cord-264542-0hu5twhp 92 20 such such JJ cord-264542-0hu5twhp 92 21 as as IN cord-264542-0hu5twhp 92 22 the the DT cord-264542-0hu5twhp 92 23 Hardy Hardy NNP cord-264542-0hu5twhp 92 24 Weinberg Weinberg NNP cord-264542-0hu5twhp 92 25 equilibrium equilibrium NN cord-264542-0hu5twhp 92 26 equation equation NN cord-264542-0hu5twhp 92 27 ; ; : cord-264542-0hu5twhp 92 28 as as IN cord-264542-0hu5twhp 92 29 DNA dna NN cord-264542-0hu5twhp 92 30 sequencing sequencing NN cord-264542-0hu5twhp 92 31 and and CC cord-264542-0hu5twhp 92 32 synthesizing synthesize VBG cord-264542-0hu5twhp 92 33 technologies technology NNS cord-264542-0hu5twhp 92 34 developed develop VBN cord-264542-0hu5twhp 92 35 over over IN cord-264542-0hu5twhp 92 36 decades decade NNS cord-264542-0hu5twhp 92 37 they -PRON- PRP cord-264542-0hu5twhp 92 38 could could MD cord-264542-0hu5twhp 92 39 be be VB cord-264542-0hu5twhp 92 40 detected detect VBN cord-264542-0hu5twhp 92 41 and and CC cord-264542-0hu5twhp 92 42 linked link VBN cord-264542-0hu5twhp 92 43 to to IN cord-264542-0hu5twhp 92 44 individuals individual NNS cord-264542-0hu5twhp 92 45 . . . cord-264542-0hu5twhp 93 1 While while IN cord-264542-0hu5twhp 93 2 such such JJ cord-264542-0hu5twhp 93 3 invisibility invisibility NN cord-264542-0hu5twhp 93 4 features feature NNS cord-264542-0hu5twhp 93 5 are be VBP cord-264542-0hu5twhp 93 6 of of IN cord-264542-0hu5twhp 93 7 potential potential JJ cord-264542-0hu5twhp 93 8 benefit benefit NN cord-264542-0hu5twhp 93 9 in in IN cord-264542-0hu5twhp 93 10 the the DT cord-264542-0hu5twhp 93 11 area area NN cord-264542-0hu5twhp 93 12 of of IN cord-264542-0hu5twhp 93 13 steganography steganography NN cord-264542-0hu5twhp 93 14 , , , cord-264542-0hu5twhp 93 15 [ [ -LRB- cord-264542-0hu5twhp 93 16 61 61 CD cord-264542-0hu5twhp 93 17 ] ] -RRB- cord-264542-0hu5twhp 93 18 describes describe VBZ cord-264542-0hu5twhp 93 19 critical critical JJ cord-264542-0hu5twhp 93 20 concerns concern NNS cord-264542-0hu5twhp 93 21 that that WDT cord-264542-0hu5twhp 93 22 analogously analogously RB cord-264542-0hu5twhp 93 23 apply apply VBP cord-264542-0hu5twhp 93 24 to to IN cord-264542-0hu5twhp 93 25 cyberbiosecurity cyberbiosecurity NN cord-264542-0hu5twhp 93 26 . . . cord-264542-0hu5twhp 94 1 For for IN cord-264542-0hu5twhp 94 2 instance instance NN cord-264542-0hu5twhp 94 3 , , , cord-264542-0hu5twhp 94 4 biological biological JJ cord-264542-0hu5twhp 94 5 information information NN cord-264542-0hu5twhp 94 6 can can MD cord-264542-0hu5twhp 94 7 be be VB cord-264542-0hu5twhp 94 8 stored store VBN cord-264542-0hu5twhp 94 9 and and CC cord-264542-0hu5twhp 94 10 transmitted transmit VBN cord-264542-0hu5twhp 94 11 in in IN cord-264542-0hu5twhp 94 12 a a DT cord-264542-0hu5twhp 94 13 virtually virtually RB cord-264542-0hu5twhp 94 14 undetectable undetectable JJ cord-264542-0hu5twhp 94 15 way way NN cord-264542-0hu5twhp 94 16 : : : cord-264542-0hu5twhp 94 17 " " `` cord-264542-0hu5twhp 94 18 No no DT cord-264542-0hu5twhp 94 19 X x NN cord-264542-0hu5twhp 94 20 - - NN cord-264542-0hu5twhp 94 21 ray ray NN cord-264542-0hu5twhp 94 22 , , , cord-264542-0hu5twhp 94 23 infra infra NN cord-264542-0hu5twhp 94 24 - - HYPH cord-264542-0hu5twhp 94 25 red red JJ cord-264542-0hu5twhp 94 26 scanner scanner NN cord-264542-0hu5twhp 94 27 , , , cord-264542-0hu5twhp 94 28 chemical chemical NN cord-264542-0hu5twhp 94 29 assay assay NN cord-264542-0hu5twhp 94 30 or or CC cord-264542-0hu5twhp 94 31 body body NN cord-264542-0hu5twhp 94 32 search search NN cord-264542-0hu5twhp 94 33 will will MD cord-264542-0hu5twhp 94 34 provide provide VB cord-264542-0hu5twhp 94 35 any any DT cord-264542-0hu5twhp 94 36 immediate immediate JJ cord-264542-0hu5twhp 94 37 evidence evidence NN cord-264542-0hu5twhp 94 38 " " '' cord-264542-0hu5twhp 94 39 of of IN cord-264542-0hu5twhp 94 40 it -PRON- PRP cord-264542-0hu5twhp 94 41 [ [ -LRB- cord-264542-0hu5twhp 94 42 61 61 CD cord-264542-0hu5twhp 94 43 ] ] -RRB- cord-264542-0hu5twhp 94 44 . . . cord-264542-0hu5twhp 95 1 Further further RB cord-264542-0hu5twhp 95 2 , , , cord-264542-0hu5twhp 95 3 biological biological JJ cord-264542-0hu5twhp 95 4 media medium NNS cord-264542-0hu5twhp 95 5 can can MD cord-264542-0hu5twhp 95 6 survive survive VB cord-264542-0hu5twhp 95 7 much much RB cord-264542-0hu5twhp 95 8 longer long RBR cord-264542-0hu5twhp 95 9 than than IN cord-264542-0hu5twhp 95 10 anticipated anticipate VBN cord-264542-0hu5twhp 95 11 [ [ -LRB- cord-264542-0hu5twhp 95 12 51 51 CD cord-264542-0hu5twhp 95 13 ] ] -RRB- cord-264542-0hu5twhp 95 14 , , , cord-264542-0hu5twhp 95 15 which which WDT cord-264542-0hu5twhp 95 16 in in IN cord-264542-0hu5twhp 95 17 this this DT cord-264542-0hu5twhp 95 18 context context NN cord-264542-0hu5twhp 95 19 leads lead VBZ cord-264542-0hu5twhp 95 20 to to IN cord-264542-0hu5twhp 95 21 the the DT cord-264542-0hu5twhp 95 22 worrisome worrisome JJ cord-264542-0hu5twhp 95 23 situation situation NN cord-264542-0hu5twhp 95 24 that that WDT cord-264542-0hu5twhp 95 25 data data NN cord-264542-0hu5twhp 95 26 ( ( -LRB- cord-264542-0hu5twhp 95 27 or or CC cord-264542-0hu5twhp 95 28 biologic biologic JJ cord-264542-0hu5twhp 95 29 " " '' cord-264542-0hu5twhp 95 30 information information NN cord-264542-0hu5twhp 95 31 " " '' cord-264542-0hu5twhp 95 32 ) ) -RRB- cord-264542-0hu5twhp 95 33 can can MD cord-264542-0hu5twhp 95 34 " " `` cord-264542-0hu5twhp 95 35 literally literally RB cord-264542-0hu5twhp 95 36 run run VB cord-264542-0hu5twhp 95 37 off off RP cord-264542-0hu5twhp 95 38 on on IN cord-264542-0hu5twhp 95 39 its -PRON- PRP$ cord-264542-0hu5twhp 95 40 own own JJ cord-264542-0hu5twhp 95 41 " " '' cord-264542-0hu5twhp 95 42 [ [ -LRB- cord-264542-0hu5twhp 95 43 61 61 CD cord-264542-0hu5twhp 95 44 ] ] -RRB- cord-264542-0hu5twhp 95 45 . . . cord-264542-0hu5twhp 96 1 Notably notably RB cord-264542-0hu5twhp 96 2 , , , cord-264542-0hu5twhp 96 3 critical critical JJ cord-264542-0hu5twhp 96 4 vulnerabilities vulnerability NNS cord-264542-0hu5twhp 96 5 also also RB cord-264542-0hu5twhp 96 6 arise arise VBP cord-264542-0hu5twhp 96 7 in in IN cord-264542-0hu5twhp 96 8 the the DT cord-264542-0hu5twhp 96 9 context context NN cord-264542-0hu5twhp 96 10 of of IN cord-264542-0hu5twhp 96 11 devices device NNS cord-264542-0hu5twhp 96 12 and and CC cord-264542-0hu5twhp 96 13 mechanisms mechanism NNS cord-264542-0hu5twhp 96 14 . . . cord-264542-0hu5twhp 97 1 Among among IN cord-264542-0hu5twhp 97 2 others other NNS cord-264542-0hu5twhp 97 3 , , , cord-264542-0hu5twhp 97 4 the the DT cord-264542-0hu5twhp 97 5 above above RB cord-264542-0hu5twhp 97 6 mentioned mention VBN cord-264542-0hu5twhp 97 7 survey survey NN cord-264542-0hu5twhp 97 8 [ [ -LRB- cord-264542-0hu5twhp 97 9 8 8 CD cord-264542-0hu5twhp 97 10 ] ] -RRB- cord-264542-0hu5twhp 97 11 identified identify VBD cord-264542-0hu5twhp 97 12 " " `` cord-264542-0hu5twhp 97 13 elevated elevated JJ cord-264542-0hu5twhp 97 14 or or CC cord-264542-0hu5twhp 97 15 severe severe JJ cord-264542-0hu5twhp 97 16 risk risk NN cord-264542-0hu5twhp 97 17 " " '' cord-264542-0hu5twhp 97 18 potentials potential NNS cord-264542-0hu5twhp 97 19 for for IN cord-264542-0hu5twhp 97 20 an an DT cord-264542-0hu5twhp 97 21 unauthorized unauthorized JJ cord-264542-0hu5twhp 97 22 actor actor NN cord-264542-0hu5twhp 97 23 to to IN cord-264542-0hu5twhp 97 24 ( ( -LRB- cord-264542-0hu5twhp 97 25 1 1 LS cord-264542-0hu5twhp 97 26 ) ) -RRB- cord-264542-0hu5twhp 97 27 take take VB cord-264542-0hu5twhp 97 28 control control NN cord-264542-0hu5twhp 97 29 of of IN cord-264542-0hu5twhp 97 30 infrastructure infrastructure NN cord-264542-0hu5twhp 97 31 ( ( -LRB- cord-264542-0hu5twhp 97 32 e.g. e.g. RB cord-264542-0hu5twhp 97 33 , , , cord-264542-0hu5twhp 97 34 lab lab NN cord-264542-0hu5twhp 97 35 equipment equipment NN cord-264542-0hu5twhp 97 36 , , , cord-264542-0hu5twhp 97 37 lab lab NN cord-264542-0hu5twhp 97 38 control control NN cord-264542-0hu5twhp 97 39 systems system NNS cord-264542-0hu5twhp 97 40 , , , cord-264542-0hu5twhp 97 41 or or CC cord-264542-0hu5twhp 97 42 even even RB cord-264542-0hu5twhp 97 43 a a DT cord-264542-0hu5twhp 97 44 fully fully RB cord-264542-0hu5twhp 97 45 automated automate VBN cord-264542-0hu5twhp 97 46 robot robot NN cord-264542-0hu5twhp 97 47 lab lab NN cord-264542-0hu5twhp 97 48 ) ) -RRB- cord-264542-0hu5twhp 97 49 , , , cord-264542-0hu5twhp 97 50 ( ( -LRB- cord-264542-0hu5twhp 97 51 2 2 LS cord-264542-0hu5twhp 97 52 ) ) -RRB- cord-264542-0hu5twhp 97 53 interrupt interrupt VB cord-264542-0hu5twhp 97 54 the the DT cord-264542-0hu5twhp 97 55 functioning functioning NN cord-264542-0hu5twhp 97 56 of of IN cord-264542-0hu5twhp 97 57 lab lab NN cord-264542-0hu5twhp 97 58 systems system NNS cord-264542-0hu5twhp 97 59 , , , cord-264542-0hu5twhp 97 60 or or CC cord-264542-0hu5twhp 97 61 ( ( -LRB- cord-264542-0hu5twhp 97 62 3 3 LS cord-264542-0hu5twhp 97 63 ) ) -RRB- cord-264542-0hu5twhp 97 64 circumventing circumvent VBG cord-264542-0hu5twhp 97 65 security security NN cord-264542-0hu5twhp 97 66 controls control NNS cord-264542-0hu5twhp 97 67 . . . cord-264542-0hu5twhp 98 1 The the DT cord-264542-0hu5twhp 98 2 cyber cyber JJ cord-264542-0hu5twhp 98 3 - - HYPH cord-264542-0hu5twhp 98 4 physical physical JJ cord-264542-0hu5twhp 98 5 nature nature NN cord-264542-0hu5twhp 98 6 of of IN cord-264542-0hu5twhp 98 7 biotechnology biotechnology NN cord-264542-0hu5twhp 98 8 is be VBZ cord-264542-0hu5twhp 98 9 one one CD cord-264542-0hu5twhp 98 10 of of IN cord-264542-0hu5twhp 98 11 the the DT cord-264542-0hu5twhp 98 12 key key JJ cord-264542-0hu5twhp 98 13 concerns concern NNS cord-264542-0hu5twhp 98 14 in in IN cord-264542-0hu5twhp 98 15 cyberbiosecurity cyberbiosecurity NN cord-264542-0hu5twhp 98 16 ( ( -LRB- cord-264542-0hu5twhp 98 17 Fig Fig NNP cord-264542-0hu5twhp 98 18 . . . cord-264542-0hu5twhp 98 19 3 3 CD cord-264542-0hu5twhp 98 20 and and CC cord-264542-0hu5twhp 98 21 Table Table NNP cord-264542-0hu5twhp 98 22 1 1 CD cord-264542-0hu5twhp 98 23 ) ) -RRB- cord-264542-0hu5twhp 98 24 . . . cord-264542-0hu5twhp 99 1 With with IN cord-264542-0hu5twhp 99 2 increased increase VBN cord-264542-0hu5twhp 99 3 automation automation NN cord-264542-0hu5twhp 99 4 , , , cord-264542-0hu5twhp 99 5 dangers danger NNS cord-264542-0hu5twhp 99 6 arise arise VBP cord-264542-0hu5twhp 99 7 , , , cord-264542-0hu5twhp 99 8 for for IN cord-264542-0hu5twhp 99 9 example example NN cord-264542-0hu5twhp 99 10 , , , cord-264542-0hu5twhp 99 11 in in IN cord-264542-0hu5twhp 99 12 the the DT cord-264542-0hu5twhp 99 13 context context NN cord-264542-0hu5twhp 99 14 of of IN cord-264542-0hu5twhp 99 15 sterilization sterilization NN cord-264542-0hu5twhp 99 16 methods method NNS cord-264542-0hu5twhp 99 17 used use VBN cord-264542-0hu5twhp 99 18 in in IN cord-264542-0hu5twhp 99 19 the the DT cord-264542-0hu5twhp 99 20 healthcare healthcare NN cord-264542-0hu5twhp 99 21 and and CC cord-264542-0hu5twhp 99 22 laboratory laboratory NN cord-264542-0hu5twhp 99 23 setting setting NN cord-264542-0hu5twhp 99 24 . . . cord-264542-0hu5twhp 100 1 For for IN cord-264542-0hu5twhp 100 2 some some DT cord-264542-0hu5twhp 100 3 methods method NNS cord-264542-0hu5twhp 100 4 , , , cord-264542-0hu5twhp 100 5 a a DT cord-264542-0hu5twhp 100 6 very very RB cord-264542-0hu5twhp 100 7 recent recent JJ cord-264542-0hu5twhp 100 8 study study NN cord-264542-0hu5twhp 100 9 [ [ -LRB- cord-264542-0hu5twhp 100 10 62 62 CD cord-264542-0hu5twhp 100 11 ] ] -RRB- cord-264542-0hu5twhp 100 12 demonstrates demonstrate VBZ cord-264542-0hu5twhp 100 13 that that IN cord-264542-0hu5twhp 100 14 " " `` cord-264542-0hu5twhp 100 15 integrity integrity NN cord-264542-0hu5twhp 100 16 of of IN cord-264542-0hu5twhp 100 17 released release VBN cord-264542-0hu5twhp 100 18 DNA dna NN cord-264542-0hu5twhp 100 19 is be VBZ cord-264542-0hu5twhp 100 20 not not RB cord-264542-0hu5twhp 100 21 completely completely RB cord-264542-0hu5twhp 100 22 compromised compromised JJ cord-264542-0hu5twhp 100 23 , , , cord-264542-0hu5twhp 100 24 " " '' cord-264542-0hu5twhp 100 25 which which WDT cord-264542-0hu5twhp 100 26 is be VBZ cord-264542-0hu5twhp 100 27 leading lead VBG cord-264542-0hu5twhp 100 28 to to IN cord-264542-0hu5twhp 100 29 the the DT cord-264542-0hu5twhp 100 30 " " `` cord-264542-0hu5twhp 100 31 danger danger NN cord-264542-0hu5twhp 100 32 of of IN cord-264542-0hu5twhp 100 33 dissemination dissemination NN cord-264542-0hu5twhp 100 34 of of IN cord-264542-0hu5twhp 100 35 DNA dna NN cord-264542-0hu5twhp 100 36 and and CC cord-264542-0hu5twhp 100 37 xenogenic xenogenic JJ cord-264542-0hu5twhp 100 38 elements element NNS cord-264542-0hu5twhp 100 39 across across IN cord-264542-0hu5twhp 100 40 waterways waterway NNS cord-264542-0hu5twhp 100 41 . . . cord-264542-0hu5twhp 101 1 " " '' cord-264542-0hu5twhp 102 1 These these DT cord-264542-0hu5twhp 102 2 findings finding NNS cord-264542-0hu5twhp 102 3 were be VBD cord-264542-0hu5twhp 102 4 linked link VBN cord-264542-0hu5twhp 102 5 to to IN cord-264542-0hu5twhp 102 6 temperature temperature NN cord-264542-0hu5twhp 102 7 and and CC cord-264542-0hu5twhp 102 8 time time NN cord-264542-0hu5twhp 102 9 ( ( -LRB- cord-264542-0hu5twhp 102 10 e.g. e.g. RB cord-264542-0hu5twhp 102 11 , , , cord-264542-0hu5twhp 102 12 Journal Journal NNP cord-264542-0hu5twhp 102 13 Pre Pre NNP cord-264542-0hu5twhp 102 14 - - NNP cord-264542-0hu5twhp 102 15 proof proof JJ cord-264542-0hu5twhp 102 16 short short JJ cord-264542-0hu5twhp 102 17 microwave microwave NN cord-264542-0hu5twhp 102 18 exposure exposure NN cord-264542-0hu5twhp 102 19 times time NNS cord-264542-0hu5twhp 102 20 or or CC cord-264542-0hu5twhp 102 21 short short JJ cord-264542-0hu5twhp 102 22 exposure exposure NN cord-264542-0hu5twhp 102 23 time time NN cord-264542-0hu5twhp 102 24 to to IN cord-264542-0hu5twhp 102 25 glutaraldehyde glutaraldehyde NN cord-264542-0hu5twhp 102 26 treatment treatment NN cord-264542-0hu5twhp 102 27 were be VBD cord-264542-0hu5twhp 102 28 least least JJS cord-264542-0hu5twhp 102 29 effective effective JJ cord-264542-0hu5twhp 102 30 ) ) -RRB- cord-264542-0hu5twhp 102 31 . . . cord-264542-0hu5twhp 103 1 Parameters parameter NNS cord-264542-0hu5twhp 103 2 like like IN cord-264542-0hu5twhp 103 3 these these DT cord-264542-0hu5twhp 103 4 are be VBP cord-264542-0hu5twhp 103 5 both both DT cord-264542-0hu5twhp 103 6 highly highly RB cord-264542-0hu5twhp 103 7 malleable malleable JJ cord-264542-0hu5twhp 103 8 and and CC cord-264542-0hu5twhp 103 9 susceptible susceptible JJ cord-264542-0hu5twhp 103 10 to to IN cord-264542-0hu5twhp 103 11 manipulation manipulation NN cord-264542-0hu5twhp 103 12 , , , cord-264542-0hu5twhp 103 13 which which WDT cord-264542-0hu5twhp 103 14 will will MD cord-264542-0hu5twhp 103 15 become become VB cord-264542-0hu5twhp 103 16 an an DT cord-264542-0hu5twhp 103 17 even even RB cord-264542-0hu5twhp 103 18 bigger big JJR cord-264542-0hu5twhp 103 19 concern concern NN cord-264542-0hu5twhp 103 20 with with IN cord-264542-0hu5twhp 103 21 " " `` cord-264542-0hu5twhp 103 22 smart smart JJ cord-264542-0hu5twhp 103 23 labs lab NNS cord-264542-0hu5twhp 103 24 " " '' cord-264542-0hu5twhp 103 25 of of IN cord-264542-0hu5twhp 103 26 the the DT cord-264542-0hu5twhp 103 27 future future NN cord-264542-0hu5twhp 103 28 [ [ -LRB- cord-264542-0hu5twhp 103 29 21 21 CD cord-264542-0hu5twhp 103 30 ] ] -RRB- cord-264542-0hu5twhp 103 31 . . . cord-264542-0hu5twhp 104 1 In in IN cord-264542-0hu5twhp 104 2 the the DT cord-264542-0hu5twhp 104 3 context context NN cord-264542-0hu5twhp 104 4 of of IN cord-264542-0hu5twhp 104 5 food food NN cord-264542-0hu5twhp 104 6 and and CC cord-264542-0hu5twhp 104 7 agricultural agricultural JJ cord-264542-0hu5twhp 104 8 systems system NNS cord-264542-0hu5twhp 104 9 , , , cord-264542-0hu5twhp 104 10 cyberphysical cyberphysical JJ cord-264542-0hu5twhp 104 11 interconnections interconnection NNS cord-264542-0hu5twhp 104 12 lead lead VBP cord-264542-0hu5twhp 104 13 to to IN cord-264542-0hu5twhp 104 14 the the DT cord-264542-0hu5twhp 104 15 danger danger NN cord-264542-0hu5twhp 104 16 of of IN cord-264542-0hu5twhp 104 17 " " `` cord-264542-0hu5twhp 104 18 [ [ -LRB- cord-264542-0hu5twhp 104 19 m]anipulation m]anipulation NN cord-264542-0hu5twhp 104 20 of of IN cord-264542-0hu5twhp 104 21 critical critical JJ cord-264542-0hu5twhp 104 22 automated automate VBN cord-264542-0hu5twhp 104 23 ( ( -LRB- cord-264542-0hu5twhp 104 24 computer computer NN cord-264542-0hu5twhp 104 25 - - HYPH cord-264542-0hu5twhp 104 26 based base VBN cord-264542-0hu5twhp 104 27 ) ) -RRB- cord-264542-0hu5twhp 104 28 processes process NNS cord-264542-0hu5twhp 104 29 ( ( -LRB- cord-264542-0hu5twhp 104 30 e.g. e.g. RB cord-264542-0hu5twhp 104 31 , , , cord-264542-0hu5twhp 104 32 thermal thermal JJ cord-264542-0hu5twhp 104 33 processing processing NN cord-264542-0hu5twhp 104 34 time time NN cord-264542-0hu5twhp 104 35 and and CC cord-264542-0hu5twhp 104 36 temperature temperature NN cord-264542-0hu5twhp 104 37 for for IN cord-264542-0hu5twhp 104 38 food food NN cord-264542-0hu5twhp 104 39 safety safety NN cord-264542-0hu5twhp 104 40 ) ) -RRB- cord-264542-0hu5twhp 104 41 " " `` cord-264542-0hu5twhp 104 42 and and CC cord-264542-0hu5twhp 104 43 " " `` cord-264542-0hu5twhp 104 44 [ [ -LRB- cord-264542-0hu5twhp 104 45 l]ack l]ack ADD cord-264542-0hu5twhp 104 46 of of IN cord-264542-0hu5twhp 104 47 ability ability NN cord-264542-0hu5twhp 104 48 to to TO cord-264542-0hu5twhp 104 49 perform perform VB cord-264542-0hu5twhp 104 50 vulnerability vulnerability NN cord-264542-0hu5twhp 104 51 assessment assessment NN cord-264542-0hu5twhp 104 52 " " '' cord-264542-0hu5twhp 104 53 [ [ -LRB- cord-264542-0hu5twhp 104 54 34 34 CD cord-264542-0hu5twhp 104 55 ] ] -RRB- cord-264542-0hu5twhp 104 56 . . . cord-264542-0hu5twhp 105 1 Traditionally traditionally RB cord-264542-0hu5twhp 105 2 , , , cord-264542-0hu5twhp 105 3 the the DT cord-264542-0hu5twhp 105 4 reliance reliance NN cord-264542-0hu5twhp 105 5 on on IN cord-264542-0hu5twhp 105 6 tacit tacit JJ cord-264542-0hu5twhp 105 7 knowledge knowledge NN cord-264542-0hu5twhp 105 8 and and CC cord-264542-0hu5twhp 105 9 direct direct JJ cord-264542-0hu5twhp 105 10 hands hand NNS cord-264542-0hu5twhp 105 11 - - HYPH cord-264542-0hu5twhp 105 12 on on RP cord-264542-0hu5twhp 105 13 processes process NNS cord-264542-0hu5twhp 105 14 and and CC cord-264542-0hu5twhp 105 15 applications application NNS cord-264542-0hu5twhp 105 16 has have VBZ cord-264542-0hu5twhp 105 17 shielded shield VBN cord-264542-0hu5twhp 105 18 the the DT cord-264542-0hu5twhp 105 19 bioscience bioscience NN cord-264542-0hu5twhp 105 20 field field NN cord-264542-0hu5twhp 105 21 from from IN cord-264542-0hu5twhp 105 22 many many JJ cord-264542-0hu5twhp 105 23 forms form NNS cord-264542-0hu5twhp 105 24 of of IN cord-264542-0hu5twhp 105 25 attack attack NN cord-264542-0hu5twhp 105 26 . . . cord-264542-0hu5twhp 106 1 Beyond beyond IN cord-264542-0hu5twhp 106 2 doubt doubt NN cord-264542-0hu5twhp 106 3 , , , cord-264542-0hu5twhp 106 4 the the DT cord-264542-0hu5twhp 106 5 digitization digitization NN cord-264542-0hu5twhp 106 6 of of IN cord-264542-0hu5twhp 106 7 biology biology NN cord-264542-0hu5twhp 106 8 and and CC cord-264542-0hu5twhp 106 9 biotechnology biotechnology NN cord-264542-0hu5twhp 106 10 automation automation NN cord-264542-0hu5twhp 106 11 are be VBP cord-264542-0hu5twhp 106 12 key key JJ cord-264542-0hu5twhp 106 13 drivers driver NNS cord-264542-0hu5twhp 106 14 that that WDT cord-264542-0hu5twhp 106 15 enable enable VBP cord-264542-0hu5twhp 106 16 the the DT cord-264542-0hu5twhp 106 17 bioeconomy bioeconomy NN cord-264542-0hu5twhp 106 18 . . . cord-264542-0hu5twhp 107 1 Nonetheless nonetheless RB cord-264542-0hu5twhp 107 2 , , , cord-264542-0hu5twhp 107 3 these these DT cord-264542-0hu5twhp 107 4 are be VBP cord-264542-0hu5twhp 107 5 creating create VBG cord-264542-0hu5twhp 107 6 yet yet RB cord-264542-0hu5twhp 107 7 a a DT cord-264542-0hu5twhp 107 8 different different JJ cord-264542-0hu5twhp 107 9 type type NN cord-264542-0hu5twhp 107 10 of of IN cord-264542-0hu5twhp 107 11 risk risk NN cord-264542-0hu5twhp 107 12 than than IN cord-264542-0hu5twhp 107 13 described describe VBN cord-264542-0hu5twhp 107 14 above above RB cord-264542-0hu5twhp 107 15 . . . cord-264542-0hu5twhp 108 1 The the DT cord-264542-0hu5twhp 108 2 Internet internet NN cord-264542-0hu5twhp 108 3 makes make VBZ cord-264542-0hu5twhp 108 4 it -PRON- PRP cord-264542-0hu5twhp 108 5 easier easy JJR cord-264542-0hu5twhp 108 6 to to TO cord-264542-0hu5twhp 108 7 bypass bypass VB cord-264542-0hu5twhp 108 8 our -PRON- PRP$ cord-264542-0hu5twhp 108 9 existing exist VBG cord-264542-0hu5twhp 108 10 controls control NNS cord-264542-0hu5twhp 108 11 ( ( -LRB- cord-264542-0hu5twhp 108 12 be be VB cord-264542-0hu5twhp 108 13 they -PRON- PRP cord-264542-0hu5twhp 108 14 personal personal JJ cord-264542-0hu5twhp 108 15 intuitions intuition NNS cord-264542-0hu5twhp 108 16 , , , cord-264542-0hu5twhp 108 17 company company NN cord-264542-0hu5twhp 108 18 procedures procedure NNS cord-264542-0hu5twhp 108 19 or or CC cord-264542-0hu5twhp 108 20 even even RB cord-264542-0hu5twhp 108 21 laws law NNS cord-264542-0hu5twhp 108 22 ) ) -RRB- cord-264542-0hu5twhp 108 23 [ [ -LRB- cord-264542-0hu5twhp 108 24 63 63 CD cord-264542-0hu5twhp 108 25 ] ] -RRB- cord-264542-0hu5twhp 108 26 . . . cord-264542-0hu5twhp 109 1 We -PRON- PRP cord-264542-0hu5twhp 109 2 have have VBP cord-264542-0hu5twhp 109 3 evolved evolve VBN cord-264542-0hu5twhp 109 4 social social JJ cord-264542-0hu5twhp 109 5 and and CC cord-264542-0hu5twhp 109 6 psychological psychological JJ cord-264542-0hu5twhp 109 7 tools tool NNS cord-264542-0hu5twhp 109 8 over over IN cord-264542-0hu5twhp 109 9 millions million NNS cord-264542-0hu5twhp 109 10 of of IN cord-264542-0hu5twhp 109 11 years year NNS cord-264542-0hu5twhp 109 12 to to TO cord-264542-0hu5twhp 109 13 help help VB cord-264542-0hu5twhp 109 14 us -PRON- PRP cord-264542-0hu5twhp 109 15 deal deal VB cord-264542-0hu5twhp 109 16 with with IN cord-264542-0hu5twhp 109 17 deception deception NN cord-264542-0hu5twhp 109 18 in in IN cord-264542-0hu5twhp 109 19 face face NN cord-264542-0hu5twhp 109 20 - - HYPH cord-264542-0hu5twhp 109 21 to to IN cord-264542-0hu5twhp 109 22 - - HYPH cord-264542-0hu5twhp 109 23 face face NN cord-264542-0hu5twhp 109 24 contexts context NNS cord-264542-0hu5twhp 109 25 . . . cord-264542-0hu5twhp 110 1 But but CC cord-264542-0hu5twhp 110 2 when when WRB cord-264542-0hu5twhp 110 3 we -PRON- PRP cord-264542-0hu5twhp 110 4 lose lose VBP cord-264542-0hu5twhp 110 5 both both DT cord-264542-0hu5twhp 110 6 physical physical JJ cord-264542-0hu5twhp 110 7 and and CC cord-264542-0hu5twhp 110 8 human human JJ cord-264542-0hu5twhp 110 9 context context NN cord-264542-0hu5twhp 110 10 ( ( -LRB- cord-264542-0hu5twhp 110 11 as as IN cord-264542-0hu5twhp 110 12 in in IN cord-264542-0hu5twhp 110 13 online online JJ cord-264542-0hu5twhp 110 14 communication communication NN cord-264542-0hu5twhp 110 15 ) ) -RRB- cord-264542-0hu5twhp 110 16 , , , cord-264542-0hu5twhp 110 17 forgery forgery NN cord-264542-0hu5twhp 110 18 and and CC cord-264542-0hu5twhp 110 19 intrusion intrusion NN cord-264542-0hu5twhp 110 20 become become VBP cord-264542-0hu5twhp 110 21 more more JJR cord-264542-0hu5twhp 110 22 of of IN cord-264542-0hu5twhp 110 23 a a DT cord-264542-0hu5twhp 110 24 risk risk NN cord-264542-0hu5twhp 110 25 . . . cord-264542-0hu5twhp 111 1 It -PRON- PRP cord-264542-0hu5twhp 111 2 is be VBZ cord-264542-0hu5twhp 111 3 now now RB cord-264542-0hu5twhp 111 4 known know VBN cord-264542-0hu5twhp 111 5 that that IN cord-264542-0hu5twhp 111 6 in in IN cord-264542-0hu5twhp 111 7 the the DT cord-264542-0hu5twhp 111 8 cyber cyber JJ cord-264542-0hu5twhp 111 9 fields field NNS cord-264542-0hu5twhp 111 10 " " `` cord-264542-0hu5twhp 111 11 Deception deception NN cord-264542-0hu5twhp 111 12 , , , cord-264542-0hu5twhp 111 13 of of IN cord-264542-0hu5twhp 111 14 various various JJ cord-264542-0hu5twhp 111 15 kinds kind NNS cord-264542-0hu5twhp 111 16 , , , cord-264542-0hu5twhp 111 17 is be VBZ cord-264542-0hu5twhp 111 18 now now RB cord-264542-0hu5twhp 111 19 the the DT cord-264542-0hu5twhp 111 20 principal principal JJ cord-264542-0hu5twhp 111 21 mechanism mechanism NN cord-264542-0hu5twhp 111 22 used use VBN cord-264542-0hu5twhp 111 23 to to TO cord-264542-0hu5twhp 111 24 defeat defeat VB cord-264542-0hu5twhp 111 25 online online JJ cord-264542-0hu5twhp 111 26 security security NN cord-264542-0hu5twhp 111 27 " " '' cord-264542-0hu5twhp 111 28 [ [ -LRB- cord-264542-0hu5twhp 111 29 63 63 CD cord-264542-0hu5twhp 111 30 ] ] -RRB- cord-264542-0hu5twhp 111 31 . . . cord-264542-0hu5twhp 112 1 Online online JJ cord-264542-0hu5twhp 112 2 frauds fraud NNS cord-264542-0hu5twhp 112 3 are be VBP cord-264542-0hu5twhp 112 4 often often RB cord-264542-0hu5twhp 112 5 easier easy JJR cord-264542-0hu5twhp 112 6 to to TO cord-264542-0hu5twhp 112 7 do do VB cord-264542-0hu5twhp 112 8 , , , cord-264542-0hu5twhp 112 9 and and CC cord-264542-0hu5twhp 112 10 harder hard JJR cord-264542-0hu5twhp 112 11 to to TO cord-264542-0hu5twhp 112 12 stop stop VB cord-264542-0hu5twhp 112 13 , , , cord-264542-0hu5twhp 112 14 than than IN cord-264542-0hu5twhp 112 15 similar similar JJ cord-264542-0hu5twhp 112 16 real real JJ cord-264542-0hu5twhp 112 17 - - HYPH cord-264542-0hu5twhp 112 18 world world NN cord-264542-0hu5twhp 112 19 frauds fraud NNS cord-264542-0hu5twhp 112 20 . . . cord-264542-0hu5twhp 113 1 And and CC cord-264542-0hu5twhp 113 2 according accord VBG cord-264542-0hu5twhp 113 3 to to IN cord-264542-0hu5twhp 113 4 [ [ -LRB- cord-264542-0hu5twhp 113 5 64 64 CD cord-264542-0hu5twhp 113 6 ] ] -RRB- cord-264542-0hu5twhp 113 7 , , , cord-264542-0hu5twhp 113 8 " " `` cord-264542-0hu5twhp 113 9 more more JJR cord-264542-0hu5twhp 113 10 and and CC cord-264542-0hu5twhp 113 11 more more JJR cord-264542-0hu5twhp 113 12 crimes crime NNS cord-264542-0hu5twhp 113 13 involve involve VBP cord-264542-0hu5twhp 113 14 deception deception NN cord-264542-0hu5twhp 113 15 ; ; : cord-264542-0hu5twhp 113 16 as as IN cord-264542-0hu5twhp 113 17 security security NN cord-264542-0hu5twhp 113 18 engineering engineering NN cord-264542-0hu5twhp 113 19 gets get VBZ cord-264542-0hu5twhp 113 20 better well JJR cord-264542-0hu5twhp 113 21 , , , cord-264542-0hu5twhp 113 22 it"s it"s CD cord-264542-0hu5twhp 113 23 easier easy JJR cord-264542-0hu5twhp 113 24 to to TO cord-264542-0hu5twhp 113 25 mislead mislead VB cord-264542-0hu5twhp 113 26 people people NNS cord-264542-0hu5twhp 113 27 than than IN cord-264542-0hu5twhp 113 28 to to TO cord-264542-0hu5twhp 113 29 hack hack VB cord-264542-0hu5twhp 113 30 computers computer NNS cord-264542-0hu5twhp 113 31 or or CC cord-264542-0hu5twhp 113 32 hack hack VB cord-264542-0hu5twhp 113 33 through through IN cord-264542-0hu5twhp 113 34 walls wall NNS cord-264542-0hu5twhp 113 35 . . . cord-264542-0hu5twhp 114 1 " " '' cord-264542-0hu5twhp 115 1 While while IN cord-264542-0hu5twhp 115 2 only only RB cord-264542-0hu5twhp 115 3 recently recently RB cord-264542-0hu5twhp 115 4 recognized recognize VBN cord-264542-0hu5twhp 115 5 as as IN cord-264542-0hu5twhp 115 6 one one CD cord-264542-0hu5twhp 115 7 of of IN cord-264542-0hu5twhp 115 8 the the DT cord-264542-0hu5twhp 115 9 most most RBS cord-264542-0hu5twhp 115 10 important important JJ cord-264542-0hu5twhp 115 11 factors factor NNS cord-264542-0hu5twhp 115 12 in in IN cord-264542-0hu5twhp 115 13 security security NN cord-264542-0hu5twhp 115 14 engineering engineering NN cord-264542-0hu5twhp 115 15 [ [ -LRB- cord-264542-0hu5twhp 115 16 63 63 CD cord-264542-0hu5twhp 115 17 ] ] -RRB- cord-264542-0hu5twhp 115 18 , , , cord-264542-0hu5twhp 115 19 the the DT cord-264542-0hu5twhp 115 20 entire entire JJ cord-264542-0hu5twhp 115 21 life life NN cord-264542-0hu5twhp 115 22 - - HYPH cord-264542-0hu5twhp 115 23 science science NN cord-264542-0hu5twhp 115 24 enterprise enterprise NN cord-264542-0hu5twhp 115 25 is be VBZ cord-264542-0hu5twhp 115 26 not not RB cord-264542-0hu5twhp 115 27 adequately adequately RB cord-264542-0hu5twhp 115 28 prepared prepare VBN cord-264542-0hu5twhp 115 29 for for IN cord-264542-0hu5twhp 115 30 attacks attack NNS cord-264542-0hu5twhp 115 31 that that WDT cord-264542-0hu5twhp 115 32 exploit exploit VBP cord-264542-0hu5twhp 115 33 psychology psychology NN cord-264542-0hu5twhp 115 34 ( ( -LRB- cord-264542-0hu5twhp 115 35 social social JJ cord-264542-0hu5twhp 115 36 engineering engineering NN cord-264542-0hu5twhp 115 37 attacks attack NNS cord-264542-0hu5twhp 115 38 , , , cord-264542-0hu5twhp 115 39 Table table NN cord-264542-0hu5twhp 115 40 2 2 CD cord-264542-0hu5twhp 115 41 ) ) -RRB- cord-264542-0hu5twhp 115 42 . . . cord-264542-0hu5twhp 116 1 At at IN cord-264542-0hu5twhp 116 2 the the DT cord-264542-0hu5twhp 116 3 same same JJ cord-264542-0hu5twhp 116 4 time time NN cord-264542-0hu5twhp 116 5 , , , cord-264542-0hu5twhp 116 6 hackers hacker NNS cord-264542-0hu5twhp 116 7 are be VBP cord-264542-0hu5twhp 116 8 getting get VBG cord-264542-0hu5twhp 116 9 better well JJR cord-264542-0hu5twhp 116 10 at at IN cord-264542-0hu5twhp 116 11 technology technology NN cord-264542-0hu5twhp 116 12 : : : cord-264542-0hu5twhp 116 13 " " `` cord-264542-0hu5twhp 116 14 designers designer NNS cord-264542-0hu5twhp 116 15 learn learn VBP cord-264542-0hu5twhp 116 16 how how WRB cord-264542-0hu5twhp 116 17 to to TO cord-264542-0hu5twhp 116 18 forestall forestall VB cord-264542-0hu5twhp 116 19 the the DT cord-264542-0hu5twhp 116 20 easier easy JJR cord-264542-0hu5twhp 116 21 technical technical JJ cord-264542-0hu5twhp 116 22 attacks attack NNS cord-264542-0hu5twhp 116 23 ... ... : cord-264542-0hu5twhp 116 24 " " '' cord-264542-0hu5twhp 116 25 [ [ -LRB- cord-264542-0hu5twhp 116 26 63 63 CD cord-264542-0hu5twhp 116 27 ] ] -RRB- cord-264542-0hu5twhp 116 28 . . . cord-264542-0hu5twhp 117 1 Thus thus RB cord-264542-0hu5twhp 117 2 , , , cord-264542-0hu5twhp 117 3 through through IN cord-264542-0hu5twhp 117 4 various various JJ cord-264542-0hu5twhp 117 5 forms form NNS cord-264542-0hu5twhp 117 6 of of IN cord-264542-0hu5twhp 117 7 fraud fraud NN cord-264542-0hu5twhp 117 8 and and CC cord-264542-0hu5twhp 117 9 deception deception NN cord-264542-0hu5twhp 117 10 , , , cord-264542-0hu5twhp 117 11 attackers attacker NNS cord-264542-0hu5twhp 117 12 may may MD cord-264542-0hu5twhp 117 13 be be VB cord-264542-0hu5twhp 117 14 able able JJ cord-264542-0hu5twhp 117 15 to to TO cord-264542-0hu5twhp 117 16 circumvent circumvent VB cord-264542-0hu5twhp 117 17 many many JJ cord-264542-0hu5twhp 117 18 of of IN cord-264542-0hu5twhp 117 19 the the DT cord-264542-0hu5twhp 117 20 existing exist VBG cord-264542-0hu5twhp 117 21 cyber cyber NN cord-264542-0hu5twhp 117 22 - - HYPH cord-264542-0hu5twhp 117 23 based base VBN cord-264542-0hu5twhp 117 24 safeguarding safeguarding NN cord-264542-0hu5twhp 117 25 mechanisms mechanism NNS cord-264542-0hu5twhp 117 26 and and CC cord-264542-0hu5twhp 117 27 get get VB cord-264542-0hu5twhp 117 28 direct direct JJ cord-264542-0hu5twhp 117 29 access access NN cord-264542-0hu5twhp 117 30 to to IN cord-264542-0hu5twhp 117 31 their -PRON- PRP$ cord-264542-0hu5twhp 117 32 victim"s victim"s NNP cord-264542-0hu5twhp 117 33 system system NN cord-264542-0hu5twhp 117 34 . . . cord-264542-0hu5twhp 118 1 Once once IN cord-264542-0hu5twhp 118 2 they -PRON- PRP cord-264542-0hu5twhp 118 3 have have VBP cord-264542-0hu5twhp 118 4 entry entry NN cord-264542-0hu5twhp 118 5 to to IN cord-264542-0hu5twhp 118 6 a a DT cord-264542-0hu5twhp 118 7 target target NN cord-264542-0hu5twhp 118 8 system system NN cord-264542-0hu5twhp 118 9 , , , cord-264542-0hu5twhp 118 10 this this DT cord-264542-0hu5twhp 118 11 may may MD cord-264542-0hu5twhp 118 12 allow allow VB cord-264542-0hu5twhp 118 13 them -PRON- PRP cord-264542-0hu5twhp 118 14 to to TO cord-264542-0hu5twhp 118 15 exploit exploit VB cord-264542-0hu5twhp 118 16 not not RB cord-264542-0hu5twhp 118 17 only only RB cord-264542-0hu5twhp 118 18 the the DT cord-264542-0hu5twhp 118 19 data datum NNS cord-264542-0hu5twhp 118 20 and and CC cord-264542-0hu5twhp 118 21 cyber cyber JJ cord-264542-0hu5twhp 118 22 side side NN cord-264542-0hu5twhp 118 23 ; ; : cord-264542-0hu5twhp 118 24 it -PRON- PRP cord-264542-0hu5twhp 118 25 could could MD cord-264542-0hu5twhp 118 26 also also RB cord-264542-0hu5twhp 118 27 facilitate facilitate VB cord-264542-0hu5twhp 118 28 attacks attack NNS cord-264542-0hu5twhp 118 29 on on IN cord-264542-0hu5twhp 118 30 control control NN cord-264542-0hu5twhp 118 31 and and CC cord-264542-0hu5twhp 118 32 processes process NNS cord-264542-0hu5twhp 118 33 underlying underlie VBG cord-264542-0hu5twhp 118 34 various various JJ cord-264542-0hu5twhp 118 35 cyber cyber JJ cord-264542-0hu5twhp 118 36 - - HYPH cord-264542-0hu5twhp 118 37 physical physical JJ cord-264542-0hu5twhp 118 38 applications application NNS cord-264542-0hu5twhp 119 1 ( ( -LRB- cord-264542-0hu5twhp 119 2 Fig Fig NNP cord-264542-0hu5twhp 119 3 . . . cord-264542-0hu5twhp 120 1 3 3 LS cord-264542-0hu5twhp 120 2 ) ) -RRB- cord-264542-0hu5twhp 120 3 with with IN cord-264542-0hu5twhp 120 4 consequences consequence NNS cord-264542-0hu5twhp 120 5 that that WDT cord-264542-0hu5twhp 120 6 directly directly RB cord-264542-0hu5twhp 120 7 affect affect VBP cord-264542-0hu5twhp 120 8 biophysical biophysical JJ cord-264542-0hu5twhp 120 9 components component NNS cord-264542-0hu5twhp 120 10 ( ( -LRB- cord-264542-0hu5twhp 120 11 Fig Fig NNP cord-264542-0hu5twhp 120 12 . . NNP cord-264542-0hu5twhp 120 13 4 4 CD cord-264542-0hu5twhp 120 14 ) ) -RRB- cord-264542-0hu5twhp 120 15 . . . cord-264542-0hu5twhp 120 16 _SP cord-264542-0hu5twhp 121 1 Cyberbiosecurity Cyberbiosecurity NNP cord-264542-0hu5twhp 121 2 is be VBZ cord-264542-0hu5twhp 121 3 highly highly RB cord-264542-0hu5twhp 121 4 cross cross JJ cord-264542-0hu5twhp 121 5 - - JJ cord-264542-0hu5twhp 121 6 disciplinary disciplinary JJ cord-264542-0hu5twhp 121 7 and and CC cord-264542-0hu5twhp 121 8 will will MD cord-264542-0hu5twhp 121 9 benefit benefit VB cord-264542-0hu5twhp 121 10 from from IN cord-264542-0hu5twhp 121 11 integrating integrate VBG cord-264542-0hu5twhp 121 12 existing exist VBG cord-264542-0hu5twhp 121 13 capabilities capability NNS cord-264542-0hu5twhp 121 14 and and CC cord-264542-0hu5twhp 121 15 proven prove VBN cord-264542-0hu5twhp 121 16 methodologies methodology NNS cord-264542-0hu5twhp 121 17 from from IN cord-264542-0hu5twhp 121 18 a a DT cord-264542-0hu5twhp 121 19 wide wide JJ cord-264542-0hu5twhp 121 20 range range NN cord-264542-0hu5twhp 121 21 of of IN cord-264542-0hu5twhp 121 22 fields field NNS cord-264542-0hu5twhp 121 23 ( ( -LRB- cord-264542-0hu5twhp 121 24 e.g. e.g. RB cord-264542-0hu5twhp 121 25 security security NN cord-264542-0hu5twhp 121 26 engineering engineering NN cord-264542-0hu5twhp 121 27 , , , cord-264542-0hu5twhp 121 28 physical physical JJ cord-264542-0hu5twhp 121 29 security security NN cord-264542-0hu5twhp 121 30 and and CC cord-264542-0hu5twhp 121 31 privacy privacy NN cord-264542-0hu5twhp 121 32 , , , cord-264542-0hu5twhp 121 33 infrastructure infrastructure NN cord-264542-0hu5twhp 121 34 resilience resilience NN cord-264542-0hu5twhp 121 35 , , , cord-264542-0hu5twhp 121 36 and and CC cord-264542-0hu5twhp 121 37 security security NN cord-264542-0hu5twhp 121 38 psychology psychology NN cord-264542-0hu5twhp 121 39 ) ) -RRB- cord-264542-0hu5twhp 121 40 , , , cord-264542-0hu5twhp 121 41 with with IN cord-264542-0hu5twhp 121 42 requirements requirement NNS cord-264542-0hu5twhp 121 43 from from IN cord-264542-0hu5twhp 121 44 the the DT cord-264542-0hu5twhp 121 45 life life NN cord-264542-0hu5twhp 121 46 - - HYPH cord-264542-0hu5twhp 121 47 science science NN cord-264542-0hu5twhp 121 48 realm realm NN cord-264542-0hu5twhp 121 49 . . . cord-264542-0hu5twhp 122 1 As as IN cord-264542-0hu5twhp 122 2 cyberbiosecurity cyberbiosecurity NN cord-264542-0hu5twhp 122 3 may may MD cord-264542-0hu5twhp 122 4 profit profit VB cord-264542-0hu5twhp 122 5 the the DT cord-264542-0hu5twhp 122 6 most most JJS cord-264542-0hu5twhp 122 7 from from IN cord-264542-0hu5twhp 122 8 lessons lesson NNS cord-264542-0hu5twhp 122 9 learned learn VBN cord-264542-0hu5twhp 122 10 in in IN cord-264542-0hu5twhp 122 11 the the DT cord-264542-0hu5twhp 122 12 information information NN cord-264542-0hu5twhp 122 13 security security NN cord-264542-0hu5twhp 122 14 domains domain NNS cord-264542-0hu5twhp 122 15 , , , cord-264542-0hu5twhp 122 16 this this DT cord-264542-0hu5twhp 122 17 section section NN cord-264542-0hu5twhp 122 18 focuses focus VBZ cord-264542-0hu5twhp 122 19 on on IN cord-264542-0hu5twhp 122 20 this this DT cord-264542-0hu5twhp 122 21 arena arena NN cord-264542-0hu5twhp 122 22 . . . cord-264542-0hu5twhp 123 1 Several several JJ cord-264542-0hu5twhp 123 2 suggestions suggestion NNS cord-264542-0hu5twhp 123 3 have have VBP cord-264542-0hu5twhp 123 4 been be VBN cord-264542-0hu5twhp 123 5 made make VBN cord-264542-0hu5twhp 123 6 to to TO cord-264542-0hu5twhp 123 7 secure secure VB cord-264542-0hu5twhp 123 8 specific specific JJ cord-264542-0hu5twhp 123 9 new new JJ cord-264542-0hu5twhp 123 10 cyberbio cyberbio NN cord-264542-0hu5twhp 123 11 challenges challenge NNS cord-264542-0hu5twhp 123 12 via via IN cord-264542-0hu5twhp 123 13 various various JJ cord-264542-0hu5twhp 123 14 cyber cyber JJ cord-264542-0hu5twhp 123 15 applications application NNS cord-264542-0hu5twhp 123 16 ( ( -LRB- cord-264542-0hu5twhp 123 17 e.g. e.g. RB cord-264542-0hu5twhp 123 18 [ [ -LRB- cord-264542-0hu5twhp 123 19 66 66 CD cord-264542-0hu5twhp 123 20 , , , cord-264542-0hu5twhp 123 21 12 12 CD cord-264542-0hu5twhp 123 22 , , , cord-264542-0hu5twhp 123 23 38 38 CD cord-264542-0hu5twhp 123 24 , , , cord-264542-0hu5twhp 123 25 14 14 CD cord-264542-0hu5twhp 123 26 , , , cord-264542-0hu5twhp 123 27 21 21 CD cord-264542-0hu5twhp 123 28 , , , cord-264542-0hu5twhp 123 29 5 5 CD cord-264542-0hu5twhp 123 30 , , , cord-264542-0hu5twhp 123 31 10 10 CD cord-264542-0hu5twhp 123 32 ] ] -RRB- cord-264542-0hu5twhp 123 33 ) ) -RRB- cord-264542-0hu5twhp 123 34 . . . cord-264542-0hu5twhp 124 1 Nonetheless nonetheless RB cord-264542-0hu5twhp 124 2 , , , cord-264542-0hu5twhp 124 3 their -PRON- PRP$ cord-264542-0hu5twhp 124 4 practical practical JJ cord-264542-0hu5twhp 124 5 realization realization NN cord-264542-0hu5twhp 124 6 is be VBZ cord-264542-0hu5twhp 124 7 not not RB cord-264542-0hu5twhp 124 8 always always RB cord-264542-0hu5twhp 124 9 straightforward straightforward JJ cord-264542-0hu5twhp 124 10 as as IN cord-264542-0hu5twhp 124 11 even even RB cord-264542-0hu5twhp 124 12 most most JJS cord-264542-0hu5twhp 124 13 basic basic JJ cord-264542-0hu5twhp 124 14 information information NN cord-264542-0hu5twhp 124 15 security security NN cord-264542-0hu5twhp 124 16 notions notion NNS cord-264542-0hu5twhp 124 17 still still RB cord-264542-0hu5twhp 124 18 need need VBP cord-264542-0hu5twhp 124 19 to to TO cord-264542-0hu5twhp 124 20 be be VB cord-264542-0hu5twhp 124 21 better well RBR cord-264542-0hu5twhp 124 22 adapted adapt VBN cord-264542-0hu5twhp 124 23 to to IN cord-264542-0hu5twhp 124 24 the the DT cord-264542-0hu5twhp 124 25 bioscience bioscience NN cord-264542-0hu5twhp 124 26 framework framework NN cord-264542-0hu5twhp 124 27 ( ( -LRB- cord-264542-0hu5twhp 124 28 see see VB cord-264542-0hu5twhp 124 29 e.g. e.g. JJ cord-264542-0hu5twhp 124 30 [ [ -LRB- cord-264542-0hu5twhp 124 31 14 14 CD cord-264542-0hu5twhp 124 32 , , , cord-264542-0hu5twhp 124 33 Table Table NNP cord-264542-0hu5twhp 124 34 1 1 CD cord-264542-0hu5twhp 124 35 ] ] -RRB- cord-264542-0hu5twhp 124 36 ) ) -RRB- cord-264542-0hu5twhp 124 37 . . . cord-264542-0hu5twhp 125 1 Similarly similarly RB cord-264542-0hu5twhp 125 2 , , , cord-264542-0hu5twhp 125 3 it -PRON- PRP cord-264542-0hu5twhp 125 4 will will MD cord-264542-0hu5twhp 125 5 be be VB cord-264542-0hu5twhp 125 6 necessary necessary JJ cord-264542-0hu5twhp 125 7 to to TO cord-264542-0hu5twhp 125 8 refine refine VB cord-264542-0hu5twhp 125 9 and and CC cord-264542-0hu5twhp 125 10 extend extend VB cord-264542-0hu5twhp 125 11 the the DT cord-264542-0hu5twhp 125 12 classic classic JJ cord-264542-0hu5twhp 125 13 CIA CIA NNP cord-264542-0hu5twhp 125 14 triad triad NN cord-264542-0hu5twhp 125 15 ( ( -LRB- cord-264542-0hu5twhp 125 16 which which WDT cord-264542-0hu5twhp 125 17 long long RB cord-264542-0hu5twhp 125 18 has have VBZ cord-264542-0hu5twhp 125 19 been be VBN cord-264542-0hu5twhp 125 20 the the DT cord-264542-0hu5twhp 125 21 heart heart NN cord-264542-0hu5twhp 125 22 of of IN cord-264542-0hu5twhp 125 23 information information NN cord-264542-0hu5twhp 125 24 security security NN cord-264542-0hu5twhp 125 25 ) ) -RRB- cord-264542-0hu5twhp 125 26 , , , cord-264542-0hu5twhp 125 27 to to TO cord-264542-0hu5twhp 125 28 extend extend VB cord-264542-0hu5twhp 125 29 the the DT cord-264542-0hu5twhp 125 30 suggestions suggestion NNS cord-264542-0hu5twhp 125 31 made make VBN cord-264542-0hu5twhp 125 32 previously previously RB cord-264542-0hu5twhp 125 33 ( ( -LRB- cord-264542-0hu5twhp 125 34 e.g. e.g. RB cord-264542-0hu5twhp 125 35 [ [ -LRB- cord-264542-0hu5twhp 125 36 14 14 CD cord-264542-0hu5twhp 125 37 , , , cord-264542-0hu5twhp 125 38 Fig Fig NNP cord-264542-0hu5twhp 125 39 . . NNP cord-264542-0hu5twhp 125 40 3 3 CD cord-264542-0hu5twhp 125 41 ] ] -RRB- cord-264542-0hu5twhp 125 42 ) ) -RRB- cord-264542-0hu5twhp 125 43 , , , cord-264542-0hu5twhp 125 44 to to TO cord-264542-0hu5twhp 125 45 optimally optimally RB cord-264542-0hu5twhp 125 46 align align VB cord-264542-0hu5twhp 125 47 them -PRON- PRP cord-264542-0hu5twhp 125 48 with with IN cord-264542-0hu5twhp 125 49 the the DT cord-264542-0hu5twhp 125 50 new new JJ cord-264542-0hu5twhp 125 51 demands demand NNS cord-264542-0hu5twhp 125 52 . . . cord-264542-0hu5twhp 126 1 J J NNP cord-264542-0hu5twhp 126 2 o o NN cord-264542-0hu5twhp 126 3 u u NN cord-264542-0hu5twhp 126 4 r r NN cord-264542-0hu5twhp 126 5 n n NN cord-264542-0hu5twhp 126 6 a a DT cord-264542-0hu5twhp 126 7 l l NN cord-264542-0hu5twhp 126 8 P p NN cord-264542-0hu5twhp 126 9 r r NN cord-264542-0hu5twhp 126 10 e e NN cord-264542-0hu5twhp 126 11 -p -p NN cord-264542-0hu5twhp 127 1 r r LS cord-264542-0hu5twhp 128 1 o o UH cord-264542-0hu5twhp 129 1 o o UH cord-264542-0hu5twhp 129 2 f f NNP cord-264542-0hu5twhp 130 1 As as IN cord-264542-0hu5twhp 130 2 argued argue VBN cord-264542-0hu5twhp 130 3 ( ( -LRB- cord-264542-0hu5twhp 130 4 Sect Sect NNP cord-264542-0hu5twhp 130 5 . . . cord-264542-0hu5twhp 130 6 4.1 4.1 CD cord-264542-0hu5twhp 130 7 ) ) -RRB- cord-264542-0hu5twhp 130 8 , , , cord-264542-0hu5twhp 130 9 not not RB cord-264542-0hu5twhp 130 10 all all DT cord-264542-0hu5twhp 130 11 of of IN cord-264542-0hu5twhp 130 12 the the DT cord-264542-0hu5twhp 130 13 new new JJ cord-264542-0hu5twhp 130 14 problems problem NNS cord-264542-0hu5twhp 130 15 can can MD cord-264542-0hu5twhp 130 16 be be VB cord-264542-0hu5twhp 130 17 linked link VBN cord-264542-0hu5twhp 130 18 to to IN cord-264542-0hu5twhp 130 19 traditional traditional JJ cord-264542-0hu5twhp 130 20 cyber cyber JJ cord-264542-0hu5twhp 130 21 issues issue NNS cord-264542-0hu5twhp 130 22 . . . cord-264542-0hu5twhp 131 1 Thus thus RB cord-264542-0hu5twhp 131 2 , , , cord-264542-0hu5twhp 131 3 it -PRON- PRP cord-264542-0hu5twhp 131 4 will will MD cord-264542-0hu5twhp 131 5 be be VB cord-264542-0hu5twhp 131 6 important important JJ cord-264542-0hu5twhp 131 7 to to TO cord-264542-0hu5twhp 131 8 distinguish distinguish VB cord-264542-0hu5twhp 131 9 which which WDT cord-264542-0hu5twhp 131 10 challenges challenge NNS cord-264542-0hu5twhp 131 11 could could MD cord-264542-0hu5twhp 131 12 , , , cord-264542-0hu5twhp 131 13 or or CC cord-264542-0hu5twhp 131 14 could could MD cord-264542-0hu5twhp 131 15 not not RB cord-264542-0hu5twhp 131 16 , , , cord-264542-0hu5twhp 131 17 be be VB cord-264542-0hu5twhp 131 18 identified identify VBN cord-264542-0hu5twhp 131 19 / / SYM cord-264542-0hu5twhp 131 20 safeguarded safeguard VBN cord-264542-0hu5twhp 131 21 by by IN cord-264542-0hu5twhp 131 22 existing exist VBG cord-264542-0hu5twhp 131 23 cyber cyber NN cord-264542-0hu5twhp 131 24 - - HYPH cord-264542-0hu5twhp 131 25 approaches approach NNS cord-264542-0hu5twhp 131 26 ( ( -LRB- cord-264542-0hu5twhp 131 27 or or CC cord-264542-0hu5twhp 131 28 slight slight JJ cord-264542-0hu5twhp 131 29 modifications modification NNS cord-264542-0hu5twhp 131 30 thereof thereof RB cord-264542-0hu5twhp 131 31 ) ) -RRB- cord-264542-0hu5twhp 131 32 . . . cord-264542-0hu5twhp 132 1 To to TO cord-264542-0hu5twhp 132 2 aid aid VB cord-264542-0hu5twhp 132 3 this this DT cord-264542-0hu5twhp 132 4 distinction distinction NN cord-264542-0hu5twhp 132 5 and and CC cord-264542-0hu5twhp 132 6 develop develop VB cord-264542-0hu5twhp 132 7 a a DT cord-264542-0hu5twhp 132 8 hierarchy hierarchy NN cord-264542-0hu5twhp 132 9 of of IN cord-264542-0hu5twhp 132 10 risk risk NN cord-264542-0hu5twhp 132 11 severity severity NN cord-264542-0hu5twhp 132 12 , , , cord-264542-0hu5twhp 132 13 it -PRON- PRP cord-264542-0hu5twhp 132 14 will will MD cord-264542-0hu5twhp 132 15 be be VB cord-264542-0hu5twhp 132 16 helpful helpful JJ cord-264542-0hu5twhp 132 17 to to TO cord-264542-0hu5twhp 132 18 pinpoint pinpoint VB cord-264542-0hu5twhp 132 19 the the DT cord-264542-0hu5twhp 132 20 following following NN cord-264542-0hu5twhp 132 21 . . . cord-264542-0hu5twhp 133 1 Identify identify VB cord-264542-0hu5twhp 133 2 challenges challenge NNS cord-264542-0hu5twhp 133 3 to to TO cord-264542-0hu5twhp 133 4 assure assure VB cord-264542-0hu5twhp 133 5 authenticity authenticity NN cord-264542-0hu5twhp 133 6 and and CC cord-264542-0hu5twhp 133 7 integrity integrity NN cord-264542-0hu5twhp 133 8 . . . cord-264542-0hu5twhp 134 1 The the DT cord-264542-0hu5twhp 134 2 cyber cyber NN cord-264542-0hu5twhp 134 3 - - HYPH cord-264542-0hu5twhp 134 4 based base VBN cord-264542-0hu5twhp 134 5 interface interface NN cord-264542-0hu5twhp 134 6 to to TO cord-264542-0hu5twhp 134 7 measure measure VB cord-264542-0hu5twhp 134 8 and and CC cord-264542-0hu5twhp 134 9 assess assess VB cord-264542-0hu5twhp 134 10 a a DT cord-264542-0hu5twhp 134 11 bioengineered bioengineered JJ cord-264542-0hu5twhp 134 12 product product NN cord-264542-0hu5twhp 134 13 or or CC cord-264542-0hu5twhp 134 14 service service NN cord-264542-0hu5twhp 134 15 creates create VBZ cord-264542-0hu5twhp 134 16 a a DT cord-264542-0hu5twhp 134 17 gap gap NN cord-264542-0hu5twhp 134 18 , , , cord-264542-0hu5twhp 134 19 potentially potentially RB cord-264542-0hu5twhp 134 20 allowing allow VBG cord-264542-0hu5twhp 134 21 a a DT cord-264542-0hu5twhp 134 22 range range NN cord-264542-0hu5twhp 134 23 of of IN cord-264542-0hu5twhp 134 24 vulnerabilities vulnerability NNS cord-264542-0hu5twhp 134 25 , , , cord-264542-0hu5twhp 134 26 from from IN cord-264542-0hu5twhp 134 27 falsifiable falsifiable JJ cord-264542-0hu5twhp 134 28 entries entry NNS cord-264542-0hu5twhp 134 29 of of IN cord-264542-0hu5twhp 134 30 biological biological JJ cord-264542-0hu5twhp 134 31 databases database NNS cord-264542-0hu5twhp 134 32 and and CC cord-264542-0hu5twhp 134 33 sequence sequence NN cord-264542-0hu5twhp 134 34 errors error NNS cord-264542-0hu5twhp 134 35 [ [ -LRB- cord-264542-0hu5twhp 134 36 38 38 CD cord-264542-0hu5twhp 134 37 , , , cord-264542-0hu5twhp 134 38 12 12 CD cord-264542-0hu5twhp 134 39 ] ] -RRB- cord-264542-0hu5twhp 135 1 -which -which JJS cord-264542-0hu5twhp 135 2 in in IN cord-264542-0hu5twhp 135 3 a a DT cord-264542-0hu5twhp 135 4 context context NN cord-264542-0hu5twhp 135 5 like like IN cord-264542-0hu5twhp 135 6 pathogens pathogen NNS cord-264542-0hu5twhp 135 7 could could MD cord-264542-0hu5twhp 135 8 lead lead VB cord-264542-0hu5twhp 135 9 to to IN cord-264542-0hu5twhp 135 10 entry entry NN cord-264542-0hu5twhp 135 11 errors error NNS cord-264542-0hu5twhp 135 12 with with IN cord-264542-0hu5twhp 135 13 rather rather RB cord-264542-0hu5twhp 135 14 disturbing disturbing JJ cord-264542-0hu5twhp 135 15 effects effect NNS cord-264542-0hu5twhp 135 16 -the -the DT cord-264542-0hu5twhp 135 17 intentional intentional JJ cord-264542-0hu5twhp 135 18 tampering tampering NN cord-264542-0hu5twhp 135 19 of of IN cord-264542-0hu5twhp 135 20 data datum NNS cord-264542-0hu5twhp 135 21 related relate VBN cord-264542-0hu5twhp 135 22 to to IN cord-264542-0hu5twhp 135 23 forensics forensic NNS cord-264542-0hu5twhp 135 24 [ [ -LRB- cord-264542-0hu5twhp 135 25 67 67 CD cord-264542-0hu5twhp 135 26 ] ] -RRB- cord-264542-0hu5twhp 135 27 , , , cord-264542-0hu5twhp 135 28 cyber cyber NN cord-264542-0hu5twhp 135 29 - - HYPH cord-264542-0hu5twhp 135 30 enabled enable VBN cord-264542-0hu5twhp 135 31 attacks attack NNS cord-264542-0hu5twhp 135 32 on on IN cord-264542-0hu5twhp 135 33 systems system NNS cord-264542-0hu5twhp 135 34 monitoring monitor VBG cord-264542-0hu5twhp 135 35 water water NN cord-264542-0hu5twhp 135 36 security security NN cord-264542-0hu5twhp 135 37 [ [ -LRB- cord-264542-0hu5twhp 135 38 68 68 CD cord-264542-0hu5twhp 135 39 ] ] -RRB- cord-264542-0hu5twhp 135 40 , , , cord-264542-0hu5twhp 135 41 to to IN cord-264542-0hu5twhp 135 42 the the DT cord-264542-0hu5twhp 135 43 actual actual JJ cord-264542-0hu5twhp 135 44 exchange exchange NN cord-264542-0hu5twhp 135 45 of of IN cord-264542-0hu5twhp 135 46 the the DT cord-264542-0hu5twhp 135 47 purported purport VBN cord-264542-0hu5twhp 135 48 actual actual NN cord-264542-0hu5twhp 135 49 ( ( -LRB- cord-264542-0hu5twhp 135 50 CPS CPS NNP cord-264542-0hu5twhp 135 51 produced produce VBN cord-264542-0hu5twhp 135 52 ) ) -RRB- cord-264542-0hu5twhp 135 53 entity entity NN cord-264542-0hu5twhp 135 54 . . . cord-264542-0hu5twhp 136 1 The the DT cord-264542-0hu5twhp 136 2 latter latter JJ cord-264542-0hu5twhp 136 3 may may MD cord-264542-0hu5twhp 136 4 enable enable VB cord-264542-0hu5twhp 136 5 the the DT cord-264542-0hu5twhp 136 6 distribution distribution NN cord-264542-0hu5twhp 136 7 of of IN cord-264542-0hu5twhp 136 8 accidentally accidentally RB cord-264542-0hu5twhp 136 9 exchanged exchange VBN cord-264542-0hu5twhp 136 10 / / SYM cord-264542-0hu5twhp 136 11 counterfeit counterfeit JJ cord-264542-0hu5twhp 136 12 products product NNS cord-264542-0hu5twhp 136 13 such such JJ cord-264542-0hu5twhp 136 14 as as IN cord-264542-0hu5twhp 136 15 plasmids plasmid NNS cord-264542-0hu5twhp 136 16 [ [ -LRB- cord-264542-0hu5twhp 136 17 20 20 CD cord-264542-0hu5twhp 136 18 ] ] -RRB- cord-264542-0hu5twhp 136 19 . . . cord-264542-0hu5twhp 137 1 which which WDT cord-264542-0hu5twhp 137 2 give give VBP cord-264542-0hu5twhp 137 3 rise rise NN cord-264542-0hu5twhp 137 4 to to IN cord-264542-0hu5twhp 137 5 unique unique JJ cord-264542-0hu5twhp 137 6 concerns concern NNS cord-264542-0hu5twhp 137 7 where where WRB cord-264542-0hu5twhp 137 8 , , , cord-264542-0hu5twhp 137 9 e.g. e.g. IN cord-264542-0hu5twhp 137 10 some some DT cord-264542-0hu5twhp 137 11 undeclared undeclared JJ cord-264542-0hu5twhp 137 12 and and CC cord-264542-0hu5twhp 137 13 " " `` cord-264542-0hu5twhp 137 14 invisible invisible JJ cord-264542-0hu5twhp 137 15 " " '' cord-264542-0hu5twhp 137 16 protein protein NN cord-264542-0hu5twhp 137 17 or or CC cord-264542-0hu5twhp 137 18 nucleic nucleic JJ cord-264542-0hu5twhp 137 19 acid acid NN cord-264542-0hu5twhp 137 20 in in IN cord-264542-0hu5twhp 137 21 a a DT cord-264542-0hu5twhp 137 22 suspended suspend VBN cord-264542-0hu5twhp 137 23 formulation formulation NN cord-264542-0hu5twhp 137 24 contacts contact NNS cord-264542-0hu5twhp 137 25 the the DT cord-264542-0hu5twhp 137 26 stated state VBN cord-264542-0hu5twhp 137 27 product product NN cord-264542-0hu5twhp 137 28 on on IN cord-264542-0hu5twhp 137 29 release release NN cord-264542-0hu5twhp 137 30 from from IN cord-264542-0hu5twhp 137 31 the the DT cord-264542-0hu5twhp 137 32 packaging packaging NN cord-264542-0hu5twhp 137 33 or or CC cord-264542-0hu5twhp 137 34 in in IN cord-264542-0hu5twhp 137 35 the the DT cord-264542-0hu5twhp 137 36 retail retail JJ cord-264542-0hu5twhp 137 37 chain chain NN cord-264542-0hu5twhp 137 38 ( ( -LRB- cord-264542-0hu5twhp 137 39 see see VB cord-264542-0hu5twhp 137 40 [ [ -LRB- cord-264542-0hu5twhp 137 41 50 50 CD cord-264542-0hu5twhp 137 42 ] ] -RRB- cord-264542-0hu5twhp 137 43 ) ) -RRB- cord-264542-0hu5twhp 137 44 . . . cord-264542-0hu5twhp 138 1 " " `` cord-264542-0hu5twhp 138 2 information information NN cord-264542-0hu5twhp 138 3 " " '' cord-264542-0hu5twhp 138 4 in in IN cord-264542-0hu5twhp 138 5 the the DT cord-264542-0hu5twhp 138 6 biological biological JJ cord-264542-0hu5twhp 138 7 sciences science NNS cord-264542-0hu5twhp 138 8 [ [ -LRB- cord-264542-0hu5twhp 138 9 61 61 CD cord-264542-0hu5twhp 138 10 ] ] -RRB- cord-264542-0hu5twhp 138 11 , , , cord-264542-0hu5twhp 138 12 the the DT cord-264542-0hu5twhp 138 13 information information NN cord-264542-0hu5twhp 138 14 life life NN cord-264542-0hu5twhp 138 15 - - HYPH cord-264542-0hu5twhp 138 16 cycle cycle NN cord-264542-0hu5twhp 138 17 at at IN cord-264542-0hu5twhp 138 18 large large JJ cord-264542-0hu5twhp 138 19 , , , cord-264542-0hu5twhp 138 20 logically logically RB cord-264542-0hu5twhp 138 21 - - HYPH cord-264542-0hu5twhp 138 22 based base VBN cord-264542-0hu5twhp 138 23 game game NN cord-264542-0hu5twhp 138 24 strategies strategy NNS cord-264542-0hu5twhp 138 25 , , , cord-264542-0hu5twhp 138 26 mechanisms mechanism NNS cord-264542-0hu5twhp 138 27 for for IN cord-264542-0hu5twhp 138 28 dual dual JJ cord-264542-0hu5twhp 138 29 - - HYPH cord-264542-0hu5twhp 138 30 use use NN cord-264542-0hu5twhp 138 31 appropriation appropriation NN cord-264542-0hu5twhp 138 32 , , , cord-264542-0hu5twhp 138 33 end end NN cord-264542-0hu5twhp 138 34 - - HYPH cord-264542-0hu5twhp 138 35 to to IN cord-264542-0hu5twhp 138 36 - - HYPH cord-264542-0hu5twhp 138 37 end end NN cord-264542-0hu5twhp 138 38 assessments assessment NNS cord-264542-0hu5twhp 138 39 , , , cord-264542-0hu5twhp 138 40 " " '' cord-264542-0hu5twhp 138 41 routes route NNS cord-264542-0hu5twhp 138 42 to to TO cord-264542-0hu5twhp 138 43 harm harm VB cord-264542-0hu5twhp 138 44 , , , cord-264542-0hu5twhp 138 45 " " '' cord-264542-0hu5twhp 138 46 context context NN cord-264542-0hu5twhp 138 47 , , , cord-264542-0hu5twhp 138 48 and and CC cord-264542-0hu5twhp 138 49 multiple multiple JJ cord-264542-0hu5twhp 138 50 exposure exposure NN cord-264542-0hu5twhp 138 51 pathways pathway NNS cord-264542-0hu5twhp 138 52 [ [ -LRB- cord-264542-0hu5twhp 138 53 57 57 CD cord-264542-0hu5twhp 138 54 , , , cord-264542-0hu5twhp 138 55 13 13 CD cord-264542-0hu5twhp 138 56 , , , cord-264542-0hu5twhp 138 57 66 66 CD cord-264542-0hu5twhp 138 58 , , , cord-264542-0hu5twhp 138 59 40 40 CD cord-264542-0hu5twhp 138 60 , , , cord-264542-0hu5twhp 138 61 10 10 CD cord-264542-0hu5twhp 138 62 , , , cord-264542-0hu5twhp 138 63 35 35 CD cord-264542-0hu5twhp 138 64 , , , cord-264542-0hu5twhp 138 65 50 50 CD cord-264542-0hu5twhp 138 66 ] ] -RRB- cord-264542-0hu5twhp 138 67 . . . cord-264542-0hu5twhp 139 1 Identify identify VB cord-264542-0hu5twhp 139 2 the the DT cord-264542-0hu5twhp 139 3 possibility possibility NN cord-264542-0hu5twhp 139 4 of of IN cord-264542-0hu5twhp 139 5 future future NN cord-264542-0hu5twhp 139 6 and and CC cord-264542-0hu5twhp 139 7 off off IN cord-264542-0hu5twhp 139 8 - - HYPH cord-264542-0hu5twhp 139 9 target target NN cord-264542-0hu5twhp 139 10 effects effect NNS cord-264542-0hu5twhp 139 11 . . . cord-264542-0hu5twhp 140 1 These these DT cord-264542-0hu5twhp 140 2 are be VBP cord-264542-0hu5twhp 140 3 situations situation NNS cord-264542-0hu5twhp 140 4 where where WRB cord-264542-0hu5twhp 140 5 clear clear JJ cord-264542-0hu5twhp 140 6 predictions prediction NNS cord-264542-0hu5twhp 140 7 as as IN cord-264542-0hu5twhp 140 8 required require VBN cord-264542-0hu5twhp 140 9 for for IN cord-264542-0hu5twhp 140 10 various various JJ cord-264542-0hu5twhp 140 11 " " `` cord-264542-0hu5twhp 140 12 if if IN cord-264542-0hu5twhp 140 13 - - HYPH cord-264542-0hu5twhp 140 14 then then RB cord-264542-0hu5twhp 140 15 " " '' cord-264542-0hu5twhp 140 16 paradigms paradigm NNS cord-264542-0hu5twhp 140 17 employed employ VBN cord-264542-0hu5twhp 140 18 in in IN cord-264542-0hu5twhp 140 19 the the DT cord-264542-0hu5twhp 140 20 cyber cyber JJ cord-264542-0hu5twhp 140 21 domains domain NNS cord-264542-0hu5twhp 140 22 are be VBP cord-264542-0hu5twhp 140 23 inapplicable inapplicable JJ cord-264542-0hu5twhp 140 24 . . . cord-264542-0hu5twhp 141 1 Deterrence deterrence NN cord-264542-0hu5twhp 141 2 measures measure NNS cord-264542-0hu5twhp 141 3 will will MD cord-264542-0hu5twhp 141 4 need need VB cord-264542-0hu5twhp 141 5 to to TO cord-264542-0hu5twhp 141 6 consider consider VB cord-264542-0hu5twhp 141 7 emerging emerge VBG cord-264542-0hu5twhp 141 8 actors actor NNS cord-264542-0hu5twhp 141 9 and and CC cord-264542-0hu5twhp 141 10 their -PRON- PRP$ cord-264542-0hu5twhp 141 11 pathways pathway NNS cord-264542-0hu5twhp 141 12 of of IN cord-264542-0hu5twhp 141 13 action action NN cord-264542-0hu5twhp 141 14 , , , cord-264542-0hu5twhp 141 15 including include VBG cord-264542-0hu5twhp 141 16 interactions interaction NNS cord-264542-0hu5twhp 141 17 between between IN cord-264542-0hu5twhp 141 18 synthetic synthetic JJ cord-264542-0hu5twhp 141 19 and and CC cord-264542-0hu5twhp 141 20 natural natural JJ cord-264542-0hu5twhp 141 21 entities entity NNS cord-264542-0hu5twhp 141 22 , , , cord-264542-0hu5twhp 141 23 as as RB cord-264542-0hu5twhp 141 24 well well RB cord-264542-0hu5twhp 141 25 as as IN cord-264542-0hu5twhp 141 26 mechanisms mechanism NNS cord-264542-0hu5twhp 141 27 , , , cord-264542-0hu5twhp 141 28 vesicles vesicle NNS cord-264542-0hu5twhp 141 29 and and CC cord-264542-0hu5twhp 141 30 actions action NNS cord-264542-0hu5twhp 141 31 that that WDT cord-264542-0hu5twhp 141 32 can can MD cord-264542-0hu5twhp 141 33 be be VB cord-264542-0hu5twhp 141 34 activated activate VBN cord-264542-0hu5twhp 141 35 by by IN cord-264542-0hu5twhp 141 36 various various JJ cord-264542-0hu5twhp 141 37 physical physical JJ cord-264542-0hu5twhp 141 38 and and CC cord-264542-0hu5twhp 141 39 mechanical mechanical JJ cord-264542-0hu5twhp 141 40 forces force NNS cord-264542-0hu5twhp 141 41 or or CC cord-264542-0hu5twhp 141 42 combinations combination NNS cord-264542-0hu5twhp 141 43 thereof thereof IN cord-264542-0hu5twhp 141 44 [ [ -LRB- cord-264542-0hu5twhp 141 45 68 68 CD cord-264542-0hu5twhp 141 46 , , , cord-264542-0hu5twhp 141 47 50 50 CD cord-264542-0hu5twhp 141 48 ] ] -RRB- cord-264542-0hu5twhp 141 49 . . . cord-264542-0hu5twhp 142 1 Cyberbio Cyberbio NNP cord-264542-0hu5twhp 142 2 efforts effort NNS cord-264542-0hu5twhp 142 3 will will MD cord-264542-0hu5twhp 142 4 benefit benefit VB cord-264542-0hu5twhp 142 5 from from IN cord-264542-0hu5twhp 142 6 the the DT cord-264542-0hu5twhp 142 7 CPS CPS NNP cord-264542-0hu5twhp 142 8 arena arena NN cord-264542-0hu5twhp 142 9 as as IN cord-264542-0hu5twhp 142 10 these these DT cord-264542-0hu5twhp 142 11 provide provide VBP cord-264542-0hu5twhp 142 12 unique unique JJ cord-264542-0hu5twhp 142 13 insights insight NNS cord-264542-0hu5twhp 142 14 relative relative JJ cord-264542-0hu5twhp 142 15 to to IN cord-264542-0hu5twhp 142 16 " " `` cord-264542-0hu5twhp 142 17 hardware hardware NN cord-264542-0hu5twhp 142 18 " " '' cord-264542-0hu5twhp 142 19 ( ( -LRB- cord-264542-0hu5twhp 142 20 incl incl NNS cord-264542-0hu5twhp 142 21 . . . cord-264542-0hu5twhp 143 1 devices device NNS cord-264542-0hu5twhp 143 2 and and CC cord-264542-0hu5twhp 143 3 systems system NNS cord-264542-0hu5twhp 143 4 ) ) -RRB- cord-264542-0hu5twhp 143 5 and and CC cord-264542-0hu5twhp 143 6 " " `` cord-264542-0hu5twhp 143 7 software software NN cord-264542-0hu5twhp 143 8 " " '' cord-264542-0hu5twhp 143 9 interdependencies interdependency NNS cord-264542-0hu5twhp 143 10 . . . cord-264542-0hu5twhp 144 1 The the DT cord-264542-0hu5twhp 144 2 cyber cyber NN cord-264542-0hu5twhp 144 3 - - HYPH cord-264542-0hu5twhp 144 4 interactions interaction NNS cord-264542-0hu5twhp 144 5 and and CC cord-264542-0hu5twhp 144 6 the the DT cord-264542-0hu5twhp 144 7 interconnectedness interconnectedness NN cord-264542-0hu5twhp 144 8 of of IN cord-264542-0hu5twhp 144 9 such such JJ cord-264542-0hu5twhp 144 10 systems system NNS cord-264542-0hu5twhp 144 11 necessitate necessitate VBP cord-264542-0hu5twhp 144 12 a a DT cord-264542-0hu5twhp 144 13 drastic drastic JJ cord-264542-0hu5twhp 144 14 modification modification NN cord-264542-0hu5twhp 144 15 of of IN cord-264542-0hu5twhp 144 16 previous previous JJ cord-264542-0hu5twhp 144 17 security security NN cord-264542-0hu5twhp 144 18 principles principle NNS cord-264542-0hu5twhp 144 19 ( ( -LRB- cord-264542-0hu5twhp 144 20 see see VB cord-264542-0hu5twhp 144 21 e.g. e.g. RB cord-264542-0hu5twhp 144 22 , , , cord-264542-0hu5twhp 144 23 [ [ -LRB- cord-264542-0hu5twhp 144 24 29 29 CD cord-264542-0hu5twhp 144 25 , , , cord-264542-0hu5twhp 144 26 72 72 CD cord-264542-0hu5twhp 144 27 ] ] -RRB- cord-264542-0hu5twhp 144 28 ) ) -RRB- cord-264542-0hu5twhp 144 29 . . . cord-264542-0hu5twhp 145 1 Analogously analogously RB cord-264542-0hu5twhp 145 2 , , , cord-264542-0hu5twhp 145 3 for for IN cord-264542-0hu5twhp 145 4 cyberbio cyberbio NN cord-264542-0hu5twhp 145 5 systems system NNS cord-264542-0hu5twhp 145 6 and and CC cord-264542-0hu5twhp 145 7 mechanisms mechanism NNS cord-264542-0hu5twhp 145 8 , , , cord-264542-0hu5twhp 145 9 it -PRON- PRP cord-264542-0hu5twhp 145 10 will will MD cord-264542-0hu5twhp 145 11 be be VB cord-264542-0hu5twhp 145 12 necessary necessary JJ cord-264542-0hu5twhp 145 13 to to TO cord-264542-0hu5twhp 145 14 refine refine VB cord-264542-0hu5twhp 145 15 a a DT cord-264542-0hu5twhp 145 16 list list NN cord-264542-0hu5twhp 145 17 of of IN cord-264542-0hu5twhp 145 18 security security NN cord-264542-0hu5twhp 145 19 principles principle NNS cord-264542-0hu5twhp 145 20 and and CC cord-264542-0hu5twhp 145 21 goals goal NNS cord-264542-0hu5twhp 145 22 , , , cord-264542-0hu5twhp 145 23 by by IN cord-264542-0hu5twhp 145 24 incorporating incorporate VBG cord-264542-0hu5twhp 145 25 CPS CPS NNP cord-264542-0hu5twhp 145 26 lessons lesson NNS cord-264542-0hu5twhp 145 27 , , , cord-264542-0hu5twhp 145 28 to to TO cord-264542-0hu5twhp 145 29 optimally optimally RB cord-264542-0hu5twhp 145 30 align align VB cord-264542-0hu5twhp 145 31 them -PRON- PRP cord-264542-0hu5twhp 145 32 with with IN cord-264542-0hu5twhp 145 33 the the DT cord-264542-0hu5twhp 145 34 bioscience bioscience NN cord-264542-0hu5twhp 145 35 fields field NNS cord-264542-0hu5twhp 145 36 . . . cord-264542-0hu5twhp 146 1 Cyberbiosecurity Cyberbiosecurity NNP cord-264542-0hu5twhp 146 2 is be VBZ cord-264542-0hu5twhp 146 3 an an DT cord-264542-0hu5twhp 146 4 evolving evolve VBG cord-264542-0hu5twhp 146 5 paradigm paradigm NN cord-264542-0hu5twhp 146 6 that that WDT cord-264542-0hu5twhp 146 7 points point VBZ cord-264542-0hu5twhp 146 8 to to IN cord-264542-0hu5twhp 146 9 new new JJ cord-264542-0hu5twhp 146 10 gaps gap NNS cord-264542-0hu5twhp 146 11 and and CC cord-264542-0hu5twhp 146 12 risks risk NNS cord-264542-0hu5twhp 146 13 , , , cord-264542-0hu5twhp 146 14 fostered foster VBN cord-264542-0hu5twhp 146 15 by by IN cord-264542-0hu5twhp 146 16 the the DT cord-264542-0hu5twhp 146 17 cyber cyber NN cord-264542-0hu5twhp 146 18 - - , cord-264542-0hu5twhp 146 19 overlaps overlap NNS cord-264542-0hu5twhp 146 20 of of IN cord-264542-0hu5twhp 146 21 modern modern JJ cord-264542-0hu5twhp 146 22 biotechnologies biotechnology NNS cord-264542-0hu5twhp 146 23 . . . cord-264542-0hu5twhp 147 1 The the DT cord-264542-0hu5twhp 147 2 enormous enormous JJ cord-264542-0hu5twhp 147 3 increase increase NN cord-264542-0hu5twhp 147 4 in in IN cord-264542-0hu5twhp 147 5 computational computational JJ cord-264542-0hu5twhp 147 6 capabilities capability NNS cord-264542-0hu5twhp 147 7 , , , cord-264542-0hu5twhp 147 8 artificial artificial JJ cord-264542-0hu5twhp 147 9 intelligence intelligence NN cord-264542-0hu5twhp 147 10 , , , cord-264542-0hu5twhp 147 11 automation automation NN cord-264542-0hu5twhp 147 12 and and CC cord-264542-0hu5twhp 147 13 use use NN cord-264542-0hu5twhp 147 14 of of IN cord-264542-0hu5twhp 147 15 engineering engineering NN cord-264542-0hu5twhp 147 16 principles principle NNS cord-264542-0hu5twhp 147 17 in in IN cord-264542-0hu5twhp 147 18 the the DT cord-264542-0hu5twhp 147 19 bioscience bioscience NN cord-264542-0hu5twhp 147 20 field field NN cord-264542-0hu5twhp 147 21 have have VBP cord-264542-0hu5twhp 147 22 created create VBN cord-264542-0hu5twhp 147 23 a a DT cord-264542-0hu5twhp 147 24 realm realm NN cord-264542-0hu5twhp 147 25 with with IN cord-264542-0hu5twhp 147 26 a a DT cord-264542-0hu5twhp 147 27 glaring glaring JJ cord-264542-0hu5twhp 147 28 gap gap NN cord-264542-0hu5twhp 147 29 of of IN cord-264542-0hu5twhp 147 30 adequate adequate JJ cord-264542-0hu5twhp 147 31 controls control NNS cord-264542-0hu5twhp 147 32 . . . cord-264542-0hu5twhp 148 1 Vulnerabilities vulnerability NNS cord-264542-0hu5twhp 148 2 exist exist VBP cord-264542-0hu5twhp 148 3 within within IN cord-264542-0hu5twhp 148 4 biomanufacturing biomanufacturing NN cord-264542-0hu5twhp 148 5 , , , cord-264542-0hu5twhp 148 6 cyber cyber NN cord-264542-0hu5twhp 148 7 - - HYPH cord-264542-0hu5twhp 148 8 enabled enable VBN cord-264542-0hu5twhp 148 9 laboratory laboratory NN cord-264542-0hu5twhp 148 10 instrumentation instrumentation NN cord-264542-0hu5twhp 148 11 and and CC cord-264542-0hu5twhp 148 12 patient patient NN cord-264542-0hu5twhp 148 13 - - HYPH cord-264542-0hu5twhp 148 14 focused focus VBN cord-264542-0hu5twhp 148 15 systems system NNS cord-264542-0hu5twhp 148 16 , , , cord-264542-0hu5twhp 148 17 " " `` cord-264542-0hu5twhp 148 18 Big Big NNP cord-264542-0hu5twhp 148 19 Data data NN cord-264542-0hu5twhp 148 20 " " '' cord-264542-0hu5twhp 148 21 generated generate VBN cord-264542-0hu5twhp 148 22 from from IN cord-264542-0hu5twhp 148 23 " " `` cord-264542-0hu5twhp 148 24 omics omic NNS cord-264542-0hu5twhp 148 25 " " '' cord-264542-0hu5twhp 148 26 studies study NNS cord-264542-0hu5twhp 148 27 , , , cord-264542-0hu5twhp 148 28 and and CC cord-264542-0hu5twhp 148 29 throughout throughout IN cord-264542-0hu5twhp 148 30 the the DT cord-264542-0hu5twhp 148 31 farm farm NN cord-264542-0hu5twhp 148 32 - - HYPH cord-264542-0hu5twhp 148 33 to to IN cord-264542-0hu5twhp 148 34 - - HYPH cord-264542-0hu5twhp 148 35 table table NN cord-264542-0hu5twhp 148 36 enterprise enterprise NN cord-264542-0hu5twhp 148 37 ... ... : cord-264542-0hu5twhp 148 38 " " '' cord-264542-0hu5twhp 148 39 [ [ -LRB- cord-264542-0hu5twhp 148 40 39 39 CD cord-264542-0hu5twhp 148 41 ] ] -RRB- cord-264542-0hu5twhp 148 42 . . . cord-264542-0hu5twhp 149 1 Numerous numerous JJ cord-264542-0hu5twhp 149 2 security security NN cord-264542-0hu5twhp 149 3 risks risk NNS cord-264542-0hu5twhp 149 4 in in IN cord-264542-0hu5twhp 149 5 the the DT cord-264542-0hu5twhp 149 6 biological biological JJ cord-264542-0hu5twhp 149 7 sciences science NNS cord-264542-0hu5twhp 149 8 and and CC cord-264542-0hu5twhp 149 9 attack attack NN cord-264542-0hu5twhp 149 10 potentials potential NNS cord-264542-0hu5twhp 149 11 based base VBN cord-264542-0hu5twhp 149 12 on on IN cord-264542-0hu5twhp 149 13 psychology psychology NN cord-264542-0hu5twhp 149 14 have have VBP cord-264542-0hu5twhp 149 15 not not RB cord-264542-0hu5twhp 149 16 been be VBN cord-264542-0hu5twhp 149 17 adequately adequately RB cord-264542-0hu5twhp 149 18 assessed assess VBN cord-264542-0hu5twhp 149 19 , , , cord-264542-0hu5twhp 149 20 let let VB cord-264542-0hu5twhp 149 21 alone alone RB cord-264542-0hu5twhp 149 22 captured capture VBN cord-264542-0hu5twhp 149 23 . . . cord-264542-0hu5twhp 150 1 They -PRON- PRP cord-264542-0hu5twhp 150 2 will will MD cord-264542-0hu5twhp 150 3 require require VB cord-264542-0hu5twhp 150 4 completely completely RB cord-264542-0hu5twhp 150 5 new new JJ cord-264542-0hu5twhp 150 6 approaches approach NNS cord-264542-0hu5twhp 150 7 towards towards IN cord-264542-0hu5twhp 150 8 their -PRON- PRP$ cord-264542-0hu5twhp 150 9 protection protection NN cord-264542-0hu5twhp 150 10 to to TO cord-264542-0hu5twhp 150 11 avoid avoid VB cord-264542-0hu5twhp 150 12 emergencies emergency NNS cord-264542-0hu5twhp 150 13 at at IN cord-264542-0hu5twhp 150 14 the the DT cord-264542-0hu5twhp 150 15 scale scale NN cord-264542-0hu5twhp 150 16 of of IN cord-264542-0hu5twhp 150 17 COVID-19 covid-19 NN cord-264542-0hu5twhp 150 18 or or CC cord-264542-0hu5twhp 150 19 more more JJR cord-264542-0hu5twhp 150 20 . . . cord-264542-0hu5twhp 151 1 Yet yet RB cord-264542-0hu5twhp 151 2 , , , cord-264542-0hu5twhp 151 3 the the DT cord-264542-0hu5twhp 151 4 current current JJ cord-264542-0hu5twhp 151 5 situation situation NN cord-264542-0hu5twhp 151 6 regarding regard VBG cord-264542-0hu5twhp 151 7 cyberbiosecurity cyberbiosecurity NN cord-264542-0hu5twhp 151 8 is be VBZ cord-264542-0hu5twhp 151 9 sobering sobering JJ cord-264542-0hu5twhp 152 1 ( ( -LRB- cord-264542-0hu5twhp 152 2 Fig Fig NNP cord-264542-0hu5twhp 152 3 . . NNP cord-264542-0hu5twhp 152 4 5 5 CD cord-264542-0hu5twhp 152 5 ) ) -RRB- cord-264542-0hu5twhp 152 6 . . . cord-264542-0hu5twhp 153 1 The the DT cord-264542-0hu5twhp 153 2 private private JJ cord-264542-0hu5twhp 153 3 sector sector NN cord-264542-0hu5twhp 153 4 , , , cord-264542-0hu5twhp 153 5 small small JJ cord-264542-0hu5twhp 153 6 and and CC cord-264542-0hu5twhp 153 7 moderate moderate JJ cord-264542-0hu5twhp 153 8 - - HYPH cord-264542-0hu5twhp 153 9 sized sized JJ cord-264542-0hu5twhp 153 10 companies company NNS cord-264542-0hu5twhp 153 11 , , , cord-264542-0hu5twhp 153 12 and and CC cord-264542-0hu5twhp 153 13 the the DT cord-264542-0hu5twhp 153 14 larger large JJR cord-264542-0hu5twhp 153 15 DIY diy NN cord-264542-0hu5twhp 153 16 community community NN cord-264542-0hu5twhp 153 17 itself -PRON- PRP cord-264542-0hu5twhp 153 18 are be VBP cord-264542-0hu5twhp 153 19 particularly particularly RB cord-264542-0hu5twhp 153 20 vulnerable vulnerable JJ cord-264542-0hu5twhp 153 21 [ [ -LRB- cord-264542-0hu5twhp 153 22 7 7 CD cord-264542-0hu5twhp 153 23 , , , cord-264542-0hu5twhp 153 24 34 34 CD cord-264542-0hu5twhp 153 25 , , , cord-264542-0hu5twhp 153 26 11 11 CD cord-264542-0hu5twhp 153 27 ] ] -RRB- cord-264542-0hu5twhp 153 28 . . . cord-264542-0hu5twhp 154 1 Rather rather RB cord-264542-0hu5twhp 154 2 than than IN cord-264542-0hu5twhp 154 3 spending spend VBG cord-264542-0hu5twhp 154 4 enormous enormous JJ cord-264542-0hu5twhp 154 5 amounts amount NNS cord-264542-0hu5twhp 154 6 of of IN cord-264542-0hu5twhp 154 7 resources resource NNS cord-264542-0hu5twhp 154 8 in in IN cord-264542-0hu5twhp 154 9 looking look VBG cord-264542-0hu5twhp 154 10 back back RB cord-264542-0hu5twhp 154 11 to to TO cord-264542-0hu5twhp 154 12 identify identify VB cord-264542-0hu5twhp 154 13 the the DT cord-264542-0hu5twhp 154 14 exact exact JJ cord-264542-0hu5twhp 154 15 J J NNP cord-264542-0hu5twhp 154 16 o o NN cord-264542-0hu5twhp 154 17 u u NN cord-264542-0hu5twhp 154 18 r r NN cord-264542-0hu5twhp 154 19 n n NN cord-264542-0hu5twhp 154 20 a a DT cord-264542-0hu5twhp 154 21 l l NN cord-264542-0hu5twhp 154 22 P p NN cord-264542-0hu5twhp 154 23 r r NN cord-264542-0hu5twhp 154 24 e e NN cord-264542-0hu5twhp 154 25 -p -p NN cord-264542-0hu5twhp 155 1 r r NN cord-264542-0hu5twhp 155 2 o o NN cord-264542-0hu5twhp 155 3 o o NN cord-264542-0hu5twhp 155 4 f f NNP cord-264542-0hu5twhp 155 5 Journal Journal NNP cord-264542-0hu5twhp 155 6 Pre Pre NNP cord-264542-0hu5twhp 155 7 - - JJ cord-264542-0hu5twhp 155 8 proof proof JJ cord-264542-0hu5twhp 155 9 genesis genesis NN cord-264542-0hu5twhp 155 10 of of IN cord-264542-0hu5twhp 155 11 SARS SARS NNP cord-264542-0hu5twhp 155 12 - - HYPH cord-264542-0hu5twhp 155 13 CoV-2 CoV-2 NNP cord-264542-0hu5twhp 155 14 , , , cord-264542-0hu5twhp 155 15 cause cause VB cord-264542-0hu5twhp 155 16 of of IN cord-264542-0hu5twhp 155 17 the the DT cord-264542-0hu5twhp 155 18 pandemic pandemic NN cord-264542-0hu5twhp 155 19 , , , cord-264542-0hu5twhp 155 20 and and CC cord-264542-0hu5twhp 155 21 the the DT cord-264542-0hu5twhp 155 22 emphasized emphasize VBN cord-264542-0hu5twhp 155 23 singularity singularity NN cord-264542-0hu5twhp 155 24 of of IN cord-264542-0hu5twhp 155 25 our -PRON- PRP$ cord-264542-0hu5twhp 155 26 current current JJ cord-264542-0hu5twhp 155 27 global global JJ cord-264542-0hu5twhp 155 28 situation situation NN cord-264542-0hu5twhp 155 29 , , , cord-264542-0hu5twhp 155 30 a a DT cord-264542-0hu5twhp 155 31 concerted concerted JJ cord-264542-0hu5twhp 155 32 effort effort NN cord-264542-0hu5twhp 155 33 to to TO cord-264542-0hu5twhp 155 34 better better RB cord-264542-0hu5twhp 155 35 understand understand VB cord-264542-0hu5twhp 155 36 and and CC cord-264542-0hu5twhp 155 37 mitigate mitigate VB cord-264542-0hu5twhp 155 38 the the DT cord-264542-0hu5twhp 155 39 emerging emerge VBG cord-264542-0hu5twhp 155 40 cyberbio cyberbio NN cord-264542-0hu5twhp 155 41 challenges challenge NNS cord-264542-0hu5twhp 155 42 faced face VBN cord-264542-0hu5twhp 155 43 by by IN cord-264542-0hu5twhp 155 44 the the DT cord-264542-0hu5twhp 155 45 entire entire JJ cord-264542-0hu5twhp 155 46 bioeconomy bioeconomy NN cord-264542-0hu5twhp 155 47 sector sector NN cord-264542-0hu5twhp 155 48 should should MD cord-264542-0hu5twhp 155 49 be be VB cord-264542-0hu5twhp 155 50 a a DT cord-264542-0hu5twhp 155 51 top top JJ cord-264542-0hu5twhp 155 52 priority priority NN cord-264542-0hu5twhp 155 53 . . . cord-264542-0hu5twhp 156 1 This this DT cord-264542-0hu5twhp 156 2 paper paper NN cord-264542-0hu5twhp 156 3 summarizes summarize VBZ cord-264542-0hu5twhp 156 4 existing exist VBG cord-264542-0hu5twhp 156 5 critical critical JJ cord-264542-0hu5twhp 156 6 issues issue NNS cord-264542-0hu5twhp 156 7 that that WDT cord-264542-0hu5twhp 156 8 must must MD cord-264542-0hu5twhp 156 9 be be VB cord-264542-0hu5twhp 156 10 considered consider VBN cord-264542-0hu5twhp 156 11 . . . cord-264542-0hu5twhp 157 1 It -PRON- PRP cord-264542-0hu5twhp 157 2 also also RB cord-264542-0hu5twhp 157 3 suggests suggest VBZ cord-264542-0hu5twhp 157 4 steps step NNS cord-264542-0hu5twhp 157 5 that that WDT cord-264542-0hu5twhp 157 6 can can MD cord-264542-0hu5twhp 157 7 be be VB cord-264542-0hu5twhp 157 8 leveraged leverage VBN cord-264542-0hu5twhp 157 9 to to TO cord-264542-0hu5twhp 157 10 help help VB cord-264542-0hu5twhp 157 11 assess assess VB cord-264542-0hu5twhp 157 12 and and CC cord-264542-0hu5twhp 157 13 ensure ensure VB cord-264542-0hu5twhp 157 14 that that IN cord-264542-0hu5twhp 157 15 the the DT cord-264542-0hu5twhp 157 16 many many JJ cord-264542-0hu5twhp 157 17 bioscience bioscience NN cord-264542-0hu5twhp 157 18 capabilities capability NNS cord-264542-0hu5twhp 157 19 remain remain VBP cord-264542-0hu5twhp 157 20 dependable dependable JJ cord-264542-0hu5twhp 157 21 in in IN cord-264542-0hu5twhp 157 22 the the DT cord-264542-0hu5twhp 157 23 face face NN cord-264542-0hu5twhp 157 24 of of IN cord-264542-0hu5twhp 157 25 malice malice NN cord-264542-0hu5twhp 157 26 , , , cord-264542-0hu5twhp 157 27 error error NN cord-264542-0hu5twhp 157 28 , , , cord-264542-0hu5twhp 157 29 or or CC cord-264542-0hu5twhp 157 30 mischance mischance NN cord-264542-0hu5twhp 157 31 . . . cord-264542-0hu5twhp 158 1 The the DT cord-264542-0hu5twhp 158 2 author author NN cord-264542-0hu5twhp 158 3 confirms confirm VBZ cord-264542-0hu5twhp 158 4 sole sole JJ cord-264542-0hu5twhp 158 5 responsibility responsibility NN cord-264542-0hu5twhp 158 6 for for IN cord-264542-0hu5twhp 158 7 the the DT cord-264542-0hu5twhp 158 8 following follow VBG cord-264542-0hu5twhp 158 9 : : : cord-264542-0hu5twhp 158 10 Conceptualization Conceptualization NNP cord-264542-0hu5twhp 158 11 , , , cord-264542-0hu5twhp 158 12 Investigation Investigation NNP cord-264542-0hu5twhp 158 13 , , , cord-264542-0hu5twhp 158 14 Methodology Methodology NNP cord-264542-0hu5twhp 158 15 , , , cord-264542-0hu5twhp 158 16 Validation Validation NNP cord-264542-0hu5twhp 158 17 , , , cord-264542-0hu5twhp 158 18 Visualization Visualization NNP cord-264542-0hu5twhp 158 19 , , , cord-264542-0hu5twhp 158 20 Writing write VBG cord-264542-0hu5twhp 158 21 -original -original JJ cord-264542-0hu5twhp 158 22 draft draft NN cord-264542-0hu5twhp 158 23 , , , cord-264542-0hu5twhp 158 24 Writing writing NN cord-264542-0hu5twhp 158 25 - - HYPH cord-264542-0hu5twhp 158 26 Reviewing reviewing NN cord-264542-0hu5twhp 158 27 and and CC cord-264542-0hu5twhp 158 28 Editing editing NN cord-264542-0hu5twhp 158 29 . . . cord-264542-0hu5twhp 159 1 The the DT cord-264542-0hu5twhp 159 2 author author NN cord-264542-0hu5twhp 159 3 declares declare VBZ cord-264542-0hu5twhp 159 4 there there EX cord-264542-0hu5twhp 159 5 is be VBZ cord-264542-0hu5twhp 159 6 no no DT cord-264542-0hu5twhp 159 7 conflict conflict NN cord-264542-0hu5twhp 159 8 of of IN cord-264542-0hu5twhp 159 9 interest interest NN cord-264542-0hu5twhp 159 10 . . . cord-264542-0hu5twhp 160 1 I -PRON- PRP cord-264542-0hu5twhp 160 2 would would MD cord-264542-0hu5twhp 160 3 like like VB cord-264542-0hu5twhp 160 4 to to TO cord-264542-0hu5twhp 160 5 thank thank VB cord-264542-0hu5twhp 160 6 the the DT cord-264542-0hu5twhp 160 7 reviewers reviewer NNS cord-264542-0hu5twhp 160 8 who who WP cord-264542-0hu5twhp 160 9 provided provide VBD cord-264542-0hu5twhp 160 10 expertise expertise NN cord-264542-0hu5twhp 160 11 and and CC cord-264542-0hu5twhp 160 12 comments comment NNS cord-264542-0hu5twhp 160 13 that that WDT cord-264542-0hu5twhp 160 14 greatly greatly RB cord-264542-0hu5twhp 160 15 improved improve VBD cord-264542-0hu5twhp 160 16 this this DT cord-264542-0hu5twhp 160 17 paper paper NN cord-264542-0hu5twhp 160 18 . . . cord-264542-0hu5twhp 161 1 • • NNP cord-264542-0hu5twhp 162 1 The the DT cord-264542-0hu5twhp 162 2 attacker attacker NN cord-264542-0hu5twhp 162 3 was be VBD cord-264542-0hu5twhp 162 4 able able JJ cord-264542-0hu5twhp 162 5 to to TO cord-264542-0hu5twhp 162 6 view view VB cord-264542-0hu5twhp 162 7 personal personal JJ cord-264542-0hu5twhp 162 8 information information NN cord-264542-0hu5twhp 162 9 including include VBG cord-264542-0hu5twhp 162 10 email email NN cord-264542-0hu5twhp 162 11 addresses address NNS cord-264542-0hu5twhp 162 12 and and CC cord-264542-0hu5twhp 162 13 phone phone NN cord-264542-0hu5twhp 162 14 numbers number NNS cord-264542-0hu5twhp 162 15 , , , cord-264542-0hu5twhp 162 16 which which WDT cord-264542-0hu5twhp 162 17 are be VBP cord-264542-0hu5twhp 162 18 displayed display VBN cord-264542-0hu5twhp 162 19 to to IN cord-264542-0hu5twhp 162 20 some some DT cord-264542-0hu5twhp 162 21 users user NNS cord-264542-0hu5twhp 162 22 of of IN cord-264542-0hu5twhp 162 23 Twitter"s twitter"s CD cord-264542-0hu5twhp 162 24 internal internal JJ cord-264542-0hu5twhp 162 25 support support NN cord-264542-0hu5twhp 162 26 tools tool NNS cord-264542-0hu5twhp 162 27 [ [ -LRB- cord-264542-0hu5twhp 162 28 73 73 CD cord-264542-0hu5twhp 162 29 ] ] -RRB- cord-264542-0hu5twhp 162 30 . . . cord-264542-0hu5twhp 163 1 • • NNP cord-264542-0hu5twhp 164 1 These these DT cord-264542-0hu5twhp 164 2 credentials credential NNS cord-264542-0hu5twhp 164 3 can can MD cord-264542-0hu5twhp 164 4 give give VB cord-264542-0hu5twhp 164 5 them -PRON- PRP cord-264542-0hu5twhp 164 6 access access NN cord-264542-0hu5twhp 164 7 to to IN cord-264542-0hu5twhp 164 8 internal internal JJ cord-264542-0hu5twhp 164 9 network network NN cord-264542-0hu5twhp 164 10 tools tool NNS cord-264542-0hu5twhp 164 11 and and CC cord-264542-0hu5twhp 164 12 enable enable VB cord-264542-0hu5twhp 164 13 them -PRON- PRP cord-264542-0hu5twhp 164 14 to to TO cord-264542-0hu5twhp 164 15 sabotage sabotage VB cord-264542-0hu5twhp 164 16 cyber cyber NN cord-264542-0hu5twhp 164 17 - - HYPH cord-264542-0hu5twhp 164 18 based base VBN cord-264542-0hu5twhp 164 19 controls control NNS cord-264542-0hu5twhp 164 20 of of IN cord-264542-0hu5twhp 164 21 CPS CPS NNP cord-264542-0hu5twhp 164 22 ( ( -LRB- cord-264542-0hu5twhp 164 23 Figs fig NNS cord-264542-0hu5twhp 164 24 . . . cord-264542-0hu5twhp 165 1 3 3 CD cord-264542-0hu5twhp 165 2 and and CC cord-264542-0hu5twhp 165 3 4 4 CD cord-264542-0hu5twhp 165 4 ) ) -RRB- cord-264542-0hu5twhp 165 5 . . . cord-264542-0hu5twhp 166 1 Exploratory exploratory JJ cord-264542-0hu5twhp 166 2 fact fact NN cord-264542-0hu5twhp 166 3 - - HYPH cord-264542-0hu5twhp 166 4 finding find VBG cord-264542-0hu5twhp 166 5 scoping scoping NN cord-264542-0hu5twhp 166 6 study study NN cord-264542-0hu5twhp 166 7 on on IN cord-264542-0hu5twhp 166 8 " " `` cord-264542-0hu5twhp 166 9 digital digital JJ cord-264542-0hu5twhp 166 10 sequence sequence NN cord-264542-0hu5twhp 166 11 information information NN cord-264542-0hu5twhp 166 12 " " '' cord-264542-0hu5twhp 166 13 on on IN cord-264542-0hu5twhp 166 14 genetic genetic JJ cord-264542-0hu5twhp 166 15 resources resource NNS cord-264542-0hu5twhp 166 16 for for IN cord-264542-0hu5twhp 166 17 food food NN cord-264542-0hu5twhp 166 18 and and CC cord-264542-0hu5twhp 166 19 agriculture agriculture NN cord-264542-0hu5twhp 166 20 . . . cord-264542-0hu5twhp 167 1 , , , cord-264542-0hu5twhp 167 2 report report VB cord-264542-0hu5twhp 167 3 on on IN cord-264542-0hu5twhp 167 4 the the DT cord-264542-0hu5twhp 167 5 Exploratory Exploratory NNP cord-264542-0hu5twhp 167 6 Fact Fact NNP cord-264542-0hu5twhp 167 7 - - HYPH cord-264542-0hu5twhp 167 8 Finding Finding NNP cord-264542-0hu5twhp 167 9 Scoping Scoping NNP cord-264542-0hu5twhp 167 10 Study Study NNP cord-264542-0hu5twhp 167 11 on on IN cord-264542-0hu5twhp 167 12 Comments comment NNS cord-264542-0hu5twhp 167 13 of of IN cord-264542-0hu5twhp 167 14 third third JJ cord-264542-0hu5twhp 167 15 world world NN cord-264542-0hu5twhp 167 16 network network NN cord-264542-0hu5twhp 167 17 on on IN cord-264542-0hu5twhp 167 18 digital digital JJ cord-264542-0hu5twhp 167 19 sequence sequence NN cord-264542-0hu5twhp 167 20 information information NN cord-264542-0hu5twhp 167 21 Editorial editorial NN cord-264542-0hu5twhp 167 22 : : : cord-264542-0hu5twhp 167 23 Mapping map VBG cord-264542-0hu5twhp 167 24 the the DT cord-264542-0hu5twhp 167 25 cyberbiosecurity cyberbiosecurity NN cord-264542-0hu5twhp 167 26 enterprise enterprise NN cord-264542-0hu5twhp 167 27 Cyberbiosecurity Cyberbiosecurity NNP cord-264542-0hu5twhp 167 28 : : : cord-264542-0hu5twhp 167 29 An an DT cord-264542-0hu5twhp 167 30 emerging emerge VBG cord-264542-0hu5twhp 167 31 new new JJ cord-264542-0hu5twhp 167 32 discipline discipline NN cord-264542-0hu5twhp 167 33 to to TO cord-264542-0hu5twhp 167 34 help help VB cord-264542-0hu5twhp 167 35 safeguard safeguard VB cord-264542-0hu5twhp 167 36 the the DT cord-264542-0hu5twhp 167 37 bioeconomy bioeconomy NNP cord-264542-0hu5twhp 167 38 Cyber Cyber NNP cord-264542-0hu5twhp 167 39 - - HYPH cord-264542-0hu5twhp 167 40 biosecurity biosecurity NN cord-264542-0hu5twhp 167 41 risk risk NN cord-264542-0hu5twhp 167 42 perceptions perception NNS cord-264542-0hu5twhp 167 43 in in IN cord-264542-0hu5twhp 168 1 the the DT cord-264542-0hu5twhp 168 2 biotech biotech NN cord-264542-0hu5twhp 168 3 sector sector NN cord-264542-0hu5twhp 168 4 Researchers researcher NNS cord-264542-0hu5twhp 168 5 are be VBP cord-264542-0hu5twhp 168 6 sounding sound VBG cord-264542-0hu5twhp 168 7 the the DT cord-264542-0hu5twhp 168 8 alarm alarm NN cord-264542-0hu5twhp 168 9 on on IN cord-264542-0hu5twhp 168 10 cyberbiosecurity cyberbiosecurity NNP cord-264542-0hu5twhp 168 11 National national JJ cord-264542-0hu5twhp 168 12 and and CC cord-264542-0hu5twhp 168 13 transnational transnational JJ cord-264542-0hu5twhp 168 14 security security NN cord-264542-0hu5twhp 168 15 implications implication NNS cord-264542-0hu5twhp 168 16 of of IN cord-264542-0hu5twhp 168 17 asymmetric asymmetric JJ cord-264542-0hu5twhp 168 18 access access NN cord-264542-0hu5twhp 168 19 to to IN cord-264542-0hu5twhp 168 20 and and CC cord-264542-0hu5twhp 168 21 use use NN cord-264542-0hu5twhp 168 22 of of IN cord-264542-0hu5twhp 168 23 biological biological JJ cord-264542-0hu5twhp 168 24 data datum NNS cord-264542-0hu5twhp 169 1 The the DT cord-264542-0hu5twhp 169 2 national national JJ cord-264542-0hu5twhp 169 3 security security NN cord-264542-0hu5twhp 169 4 implications implication NNS cord-264542-0hu5twhp 169 5 of of IN cord-264542-0hu5twhp 169 6 cyberbiosecurity cyberbiosecurity NN cord-264542-0hu5twhp 169 7 Cyberbiosecurity Cyberbiosecurity NNP cord-264542-0hu5twhp 169 8 challenges challenge NNS cord-264542-0hu5twhp 169 9 of of IN cord-264542-0hu5twhp 169 10 pathogen pathogen NN cord-264542-0hu5twhp 169 11 genome genome NN cord-264542-0hu5twhp 169 12 databases database NNS cord-264542-0hu5twhp 170 1 The the DT cord-264542-0hu5twhp 170 2 digitization digitization NN cord-264542-0hu5twhp 170 3 of of IN cord-264542-0hu5twhp 170 4 biology biology NN cord-264542-0hu5twhp 170 5 : : : cord-264542-0hu5twhp 170 6 Understanding understand VBG cord-264542-0hu5twhp 170 7 the the DT cord-264542-0hu5twhp 170 8 new new JJ cord-264542-0hu5twhp 170 9 risks risk NNS cord-264542-0hu5twhp 170 10 and and CC cord-264542-0hu5twhp 170 11 implications implication NNS cord-264542-0hu5twhp 170 12 for for IN cord-264542-0hu5twhp 170 13 governance governance NN cord-264542-0hu5twhp 170 14 On on IN cord-264542-0hu5twhp 170 15 DNA dna NN cord-264542-0hu5twhp 170 16 signatures signature NNS cord-264542-0hu5twhp 170 17 , , , cord-264542-0hu5twhp 170 18 their -PRON- PRP$ cord-264542-0hu5twhp 170 19 dual dual JJ cord-264542-0hu5twhp 170 20 - - HYPH cord-264542-0hu5twhp 170 21 use use NN cord-264542-0hu5twhp 170 22 potential potential NN cord-264542-0hu5twhp 170 23 for for IN cord-264542-0hu5twhp 170 24 GMO GMO NNP cord-264542-0hu5twhp 170 25 counterfeiting counterfeiting NN cord-264542-0hu5twhp 170 26 , , , cord-264542-0hu5twhp 170 27 and and CC cord-264542-0hu5twhp 170 28 a a DT cord-264542-0hu5twhp 170 29 second second JJ cord-264542-0hu5twhp 170 30 ) ) -RRB- cord-264542-0hu5twhp 170 31 dissertation dissertation NN cord-264542-0hu5twhp 170 32 , , , cord-264542-0hu5twhp 170 33 Biomedical Biomedical NNP cord-264542-0hu5twhp 170 34 Sciences Sciences NNPS cord-264542-0hu5twhp 171 1 A a DT cord-264542-0hu5twhp 171 2 covert covert JJ cord-264542-0hu5twhp 171 3 authentication authentication NN cord-264542-0hu5twhp 171 4 and and CC cord-264542-0hu5twhp 171 5 security security NN cord-264542-0hu5twhp 171 6 solution solution NN cord-264542-0hu5twhp 171 7 for for IN cord-264542-0hu5twhp 171 8 GMOs GMOs NNP cord-264542-0hu5twhp 171 9 A a DT cord-264542-0hu5twhp 171 10 covert covert JJ cord-264542-0hu5twhp 171 11 authentication authentication NN cord-264542-0hu5twhp 171 12 and and CC cord-264542-0hu5twhp 171 13 security security NN cord-264542-0hu5twhp 171 14 solution solution NN cord-264542-0hu5twhp 171 15 for for IN cord-264542-0hu5twhp 171 16 GMOs GMOs NNP cord-264542-0hu5twhp 171 17 Point Point NNP cord-264542-0hu5twhp 171 18 of of IN cord-264542-0hu5twhp 171 19 view view NN cord-264542-0hu5twhp 171 20 : : : cord-264542-0hu5twhp 171 21 A a DT cord-264542-0hu5twhp 171 22 transatlantic transatlantic JJ cord-264542-0hu5twhp 171 23 perspective perspective NN cord-264542-0hu5twhp 171 24 on on IN cord-264542-0hu5twhp 171 25 20 20 CD cord-264542-0hu5twhp 171 26 emerging emerge VBG cord-264542-0hu5twhp 171 27 issues issue NNS cord-264542-0hu5twhp 171 28 in in IN cord-264542-0hu5twhp 171 29 biological biological JJ cord-264542-0hu5twhp 171 30 engineering engineering NN cord-264542-0hu5twhp 172 1 The the DT cord-264542-0hu5twhp 172 2 intelligent intelligent JJ cord-264542-0hu5twhp 172 3 and and CC cord-264542-0hu5twhp 172 4 connected connected JJ cord-264542-0hu5twhp 172 5 bio bio NNP cord-264542-0hu5twhp 172 6 - - HYPH cord-264542-0hu5twhp 172 7 labs lab NNS cord-264542-0hu5twhp 172 8 of of IN cord-264542-0hu5twhp 172 9 the the DT cord-264542-0hu5twhp 172 10 future future JJ cord-264542-0hu5twhp 172 11 Cyberbiosecurity Cyberbiosecurity NNP cord-264542-0hu5twhp 172 12 : : : cord-264542-0hu5twhp 172 13 from from IN cord-264542-0hu5twhp 172 14 naive naive JJ cord-264542-0hu5twhp 172 15 trust trust NN cord-264542-0hu5twhp 172 16 to to TO cord-264542-0hu5twhp 172 17 risk risk VB cord-264542-0hu5twhp 172 18 awareness awareness NN cord-264542-0hu5twhp 172 19 Cyberbiosecurity Cyberbiosecurity NNP cord-264542-0hu5twhp 172 20 implications implication NNS cord-264542-0hu5twhp 172 21 for for IN cord-264542-0hu5twhp 172 22 the the DT cord-264542-0hu5twhp 172 23 laboratory laboratory NN cord-264542-0hu5twhp 172 24 of of IN cord-264542-0hu5twhp 172 25 the the DT cord-264542-0hu5twhp 172 26 future future JJ cord-264542-0hu5twhp 172 27 Building Building NNP cord-264542-0hu5twhp 172 28 capacity capacity NN cord-264542-0hu5twhp 172 29 for for IN cord-264542-0hu5twhp 172 30 cyberbiosecurity cyberbiosecurity NN cord-264542-0hu5twhp 172 31 training training NN cord-264542-0hu5twhp 172 32 Cyberbiosecurity Cyberbiosecurity NNP cord-264542-0hu5twhp 172 33 in in IN cord-264542-0hu5twhp 172 34 advanced advanced JJ cord-264542-0hu5twhp 172 35 cyber cyber JJ cord-264542-0hu5twhp 172 36 safety safety NN cord-264542-0hu5twhp 172 37 US US NNP cord-264542-0hu5twhp 172 38 hospitals hospital NNS cord-264542-0hu5twhp 172 39 turn turn VBP cord-264542-0hu5twhp 172 40 away away RB cord-264542-0hu5twhp 172 41 patients patient NNS cord-264542-0hu5twhp 172 42 as as IN cord-264542-0hu5twhp 172 43 ransomware ransomware NN cord-264542-0hu5twhp 172 44 strikes strike VBZ cord-264542-0hu5twhp 172 45 Bloomberg Bloomberg NNP cord-264542-0hu5twhp 172 46 , , , cord-264542-0hu5twhp 172 47 Hackers hacker NNS cord-264542-0hu5twhp 172 48 " " `` cord-264542-0hu5twhp 172 49 without without IN cord-264542-0hu5twhp 172 50 conscience conscience NN cord-264542-0hu5twhp 172 51 " " '' cord-264542-0hu5twhp 172 52 demand demand NN cord-264542-0hu5twhp 172 53 ransom ransom NN cord-264542-0hu5twhp 172 54 from from IN cord-264542-0hu5twhp 172 55 dozens dozen NNS cord-264542-0hu5twhp 172 56 of of IN cord-264542-0hu5twhp 172 57 hospitals hospital NNS cord-264542-0hu5twhp 172 58 and and CC cord-264542-0hu5twhp 172 59 labs lab NNS cord-264542-0hu5twhp 172 60 working work VBG cord-264542-0hu5twhp 172 61 on on IN cord-264542-0hu5twhp 172 62 coronavirus coronavirus NN cord-264542-0hu5twhp 172 63 Cybersecurity Cybersecurity NNP cord-264542-0hu5twhp 172 64 in in IN cord-264542-0hu5twhp 172 65 healthcare healthcare NN cord-264542-0hu5twhp 172 66 : : : cord-264542-0hu5twhp 173 1 A a DT cord-264542-0hu5twhp 173 2 systematic systematic JJ cord-264542-0hu5twhp 173 3 review review NN cord-264542-0hu5twhp 173 4 of of IN cord-264542-0hu5twhp 173 5 modern modern JJ cord-264542-0hu5twhp 173 6 threats threat NNS cord-264542-0hu5twhp 173 7 and and CC cord-264542-0hu5twhp 173 8 trends trends NNPS cord-264542-0hu5twhp 173 9 Institute Institute NNP cord-264542-0hu5twhp 173 10 for for IN cord-264542-0hu5twhp 173 11 Critical Critical NNP cord-264542-0hu5twhp 173 12 Infrastructure Infrastructure NNP cord-264542-0hu5twhp 173 13 Technology Technology NNP cord-264542-0hu5twhp 173 14 , , , cord-264542-0hu5twhp 173 15 The the DT cord-264542-0hu5twhp 173 16 cybersecurity cybersecurity NN cord-264542-0hu5twhp 173 17 think think VBP cord-264542-0hu5twhp 173 18 tank tank NN cord-264542-0hu5twhp 173 19 ( ( -LRB- cord-264542-0hu5twhp 173 20 nd nd NNP cord-264542-0hu5twhp 173 21 Overview Overview NNP cord-264542-0hu5twhp 173 22 of of IN cord-264542-0hu5twhp 173 23 security security NN cord-264542-0hu5twhp 173 24 and and CC cord-264542-0hu5twhp 173 25 privacy privacy NN cord-264542-0hu5twhp 173 26 in in IN cord-264542-0hu5twhp 173 27 cyber cyber JJ cord-264542-0hu5twhp 173 28 - - HYPH cord-264542-0hu5twhp 173 29 physical physical JJ cord-264542-0hu5twhp 173 30 systems system NNS cord-264542-0hu5twhp 174 1 Mysterious mysterious JJ cord-264542-0hu5twhp 174 2 08 08 CD cord-264542-0hu5twhp 174 3 turkey turkey NNP cord-264542-0hu5twhp 174 4 pipeline pipeline NN cord-264542-0hu5twhp 174 5 blast blast NN cord-264542-0hu5twhp 174 6 opened open VBD cord-264542-0hu5twhp 174 7 new new JJ cord-264542-0hu5twhp 174 8 cyberwar cyberwar NN cord-264542-0hu5twhp 174 9 era era NN cord-264542-0hu5twhp 174 10 Adaptations Adaptations NNPS cord-264542-0hu5twhp 174 11 of of IN cord-264542-0hu5twhp 174 12 avian avian JJ cord-264542-0hu5twhp 174 13 flu flu NN cord-264542-0hu5twhp 174 14 virus virus NN cord-264542-0hu5twhp 174 15 are be VBP cord-264542-0hu5twhp 174 16 a a DT cord-264542-0hu5twhp 174 17 cause cause NN cord-264542-0hu5twhp 174 18 for for IN cord-264542-0hu5twhp 174 19 concern concern NN cord-264542-0hu5twhp 174 20 Cyberbiosecurity cyberbiosecurity NN cord-264542-0hu5twhp 174 21 : : : cord-264542-0hu5twhp 175 1 A a DT cord-264542-0hu5twhp 175 2 new new JJ cord-264542-0hu5twhp 175 3 perspective perspective NN cord-264542-0hu5twhp 175 4 on on IN cord-264542-0hu5twhp 175 5 protecting protect VBG cord-264542-0hu5twhp 175 6 U.S. U.S. NNP cord-264542-0hu5twhp 175 7 food food NN cord-264542-0hu5twhp 175 8 and and CC cord-264542-0hu5twhp 175 9 agricultural agricultural JJ cord-264542-0hu5twhp 175 10 system system NN cord-264542-0hu5twhp 175 11 Cyberbiosecurity Cyberbiosecurity NNP cord-264542-0hu5twhp 175 12 for for IN cord-264542-0hu5twhp 175 13 biopharmaceutical biopharmaceutical JJ cord-264542-0hu5twhp 175 14 products product NNS cord-264542-0hu5twhp 175 15 Defending defend VBG cord-264542-0hu5twhp 175 16 our -PRON- PRP$ cord-264542-0hu5twhp 175 17 public public JJ cord-264542-0hu5twhp 175 18 biological biological JJ cord-264542-0hu5twhp 175 19 databases database NNS cord-264542-0hu5twhp 175 20 as as IN cord-264542-0hu5twhp 175 21 a a DT cord-264542-0hu5twhp 175 22 global global JJ cord-264542-0hu5twhp 175 23 critical critical JJ cord-264542-0hu5twhp 175 24 infrastructure infrastructure NN cord-264542-0hu5twhp 175 25 Cyberbiosecurity cyberbiosecurity NN cord-264542-0hu5twhp 175 26 : : : cord-264542-0hu5twhp 175 27 A a DT cord-264542-0hu5twhp 175 28 call call NN cord-264542-0hu5twhp 175 29 for for IN cord-264542-0hu5twhp 175 30 cooperation cooperation NN cord-264542-0hu5twhp 175 31 in in IN cord-264542-0hu5twhp 175 32 a a DT cord-264542-0hu5twhp 175 33 new new JJ cord-264542-0hu5twhp 175 34 threat threat NN cord-264542-0hu5twhp 175 35 landscape landscape NN cord-264542-0hu5twhp 175 36 Are be VBP cord-264542-0hu5twhp 175 37 market market NN cord-264542-0hu5twhp 175 38 GM GM NNP cord-264542-0hu5twhp 175 39 plants plant VBZ cord-264542-0hu5twhp 175 40 an an DT cord-264542-0hu5twhp 175 41 unrecognized unrecognized JJ cord-264542-0hu5twhp 175 42 platform platform NN cord-264542-0hu5twhp 175 43 for for IN cord-264542-0hu5twhp 175 44 bioterrorism bioterrorism NN cord-264542-0hu5twhp 175 45 and and CC cord-264542-0hu5twhp 175 46 biocrime biocrime NN cord-264542-0hu5twhp 175 47 ? ? . cord-264542-0hu5twhp 176 1 The the DT cord-264542-0hu5twhp 176 2 Australia Australia NNP cord-264542-0hu5twhp 176 3 Group Group NNP cord-264542-0hu5twhp 176 4 ( ( -LRB- cord-264542-0hu5twhp 176 5 nd nd NNP cord-264542-0hu5twhp 176 6 ) ) -RRB- cord-264542-0hu5twhp 176 7 THE the DT cord-264542-0hu5twhp 176 8 NUCLEAR NUCLEAR NNP cord-264542-0hu5twhp 176 9 THREAT THREAT NNP cord-264542-0hu5twhp 176 10 INITIATIVE initiative NN cord-264542-0hu5twhp 176 11 , , , cord-264542-0hu5twhp 176 12 Biosecurity Biosecurity NNP cord-264542-0hu5twhp 176 13 reducing reduce VBG cord-264542-0hu5twhp 176 14 biological biological JJ cord-264542-0hu5twhp 176 15 risk risk NN cord-264542-0hu5twhp 176 16 and and CC cord-264542-0hu5twhp 176 17 enhancing enhance VBG cord-264542-0hu5twhp 176 18 global global JJ cord-264542-0hu5twhp 176 19 biosecurity biosecurity NN cord-264542-0hu5twhp 176 20 ( ( -LRB- cord-264542-0hu5twhp 176 21 nd nd NNP cord-264542-0hu5twhp 176 22 ) ) -RRB- cord-264542-0hu5twhp 177 1 Vbc Vbc NNP cord-264542-0hu5twhp 177 2 launches launch VBZ cord-264542-0hu5twhp 177 3 biosecurity biosecurity NN cord-264542-0hu5twhp 177 4 codes code NNS cord-264542-0hu5twhp 177 5 section section NN cord-264542-0hu5twhp 177 6 National National NNP cord-264542-0hu5twhp 177 7 Institutes Institutes NNPS cord-264542-0hu5twhp 177 8 of of IN cord-264542-0hu5twhp 177 9 Health Health NNP cord-264542-0hu5twhp 177 10 , , , cord-264542-0hu5twhp 177 11 National National NNP cord-264542-0hu5twhp 177 12 science science NNP cord-264542-0hu5twhp 177 13 advisory advisory NNP cord-264542-0hu5twhp 177 14 board board NN cord-264542-0hu5twhp 177 15 for for IN cord-264542-0hu5twhp 177 16 biosecurity biosecurity NNP cord-264542-0hu5twhp 177 17 ( ( -LRB- cord-264542-0hu5twhp 177 18 nd nd NNP cord-264542-0hu5twhp 177 19 Blue Blue NNP cord-264542-0hu5twhp 177 20 ribbon ribbon NN cord-264542-0hu5twhp 177 21 study study NN cord-264542-0hu5twhp 177 22 panel panel NN cord-264542-0hu5twhp 177 23 on on IN cord-264542-0hu5twhp 177 24 biodefense biodefense NNP cord-264542-0hu5twhp 178 1 ( ( -LRB- cord-264542-0hu5twhp 178 2 nd nd NNP cord-264542-0hu5twhp 178 3 ) ) -RRB- cord-264542-0hu5twhp 178 4 Top top JJ cord-264542-0hu5twhp 178 5 cyber cyber JJ cord-264542-0hu5twhp 178 6 security security NN cord-264542-0hu5twhp 178 7 experts expert NNS cord-264542-0hu5twhp 178 8 report report VBP cord-264542-0hu5twhp 178 9 : : : cord-264542-0hu5twhp 178 10 4,000 4,000 CD cord-264542-0hu5twhp 178 11 cyber cyber JJ cord-264542-0hu5twhp 178 12 attacks attack NNS cord-264542-0hu5twhp 178 13 a a DT cord-264542-0hu5twhp 178 14 day day NN cord-264542-0hu5twhp 178 15 since since IN cord-264542-0hu5twhp 178 16 covid-19 covid-19 CD cord-264542-0hu5twhp 178 17 pandemic pandemic NN cord-264542-0hu5twhp 179 1 The the DT cord-264542-0hu5twhp 179 2 covid-19 covid-19 CD cord-264542-0hu5twhp 179 3 pandemic pandemic NN cord-264542-0hu5twhp 179 4 and and CC cord-264542-0hu5twhp 179 5 its -PRON- PRP$ cord-264542-0hu5twhp 179 6 impact impact NN cord-264542-0hu5twhp 179 7 on on IN cord-264542-0hu5twhp 179 8 cybersecurity cybersecurity NN cord-264542-0hu5twhp 179 9 Environmentally environmentally RB cord-264542-0hu5twhp 179 10 applied apply VBN cord-264542-0hu5twhp 179 11 nucleic nucleic JJ cord-264542-0hu5twhp 179 12 acids acid NNS cord-264542-0hu5twhp 179 13 and and CC cord-264542-0hu5twhp 179 14 proteins protein NNS cord-264542-0hu5twhp 179 15 for for IN cord-264542-0hu5twhp 179 16 purposes purpose NNS cord-264542-0hu5twhp 179 17 of of IN cord-264542-0hu5twhp 179 18 engineering engineering NN cord-264542-0hu5twhp 179 19 changes change NNS cord-264542-0hu5twhp 179 20 to to IN cord-264542-0hu5twhp 179 21 genes gene NNS cord-264542-0hu5twhp 179 22 and and CC cord-264542-0hu5twhp 179 23 other other JJ cord-264542-0hu5twhp 179 24 genetic genetic JJ cord-264542-0hu5twhp 179 25 material material NN cord-264542-0hu5twhp 179 26 Agricultural agricultural JJ cord-264542-0hu5twhp 179 27 research research NN cord-264542-0hu5twhp 179 28 , , , cord-264542-0hu5twhp 179 29 or or CC cord-264542-0hu5twhp 179 30 a a DT cord-264542-0hu5twhp 179 31 new new JJ cord-264542-0hu5twhp 179 32 bioweapon bioweapon NN cord-264542-0hu5twhp 179 33 system system NN cord-264542-0hu5twhp 179 34 ? ? . cord-264542-0hu5twhp 180 1 Plant plant NN cord-264542-0hu5twhp 180 2 - - HYPH cord-264542-0hu5twhp 180 3 protecting protect VBG cord-264542-0hu5twhp 180 4 RNAi RNAi NNP cord-264542-0hu5twhp 180 5 compositions composition NNS cord-264542-0hu5twhp 180 6 comprising comprise VBG cord-264542-0hu5twhp 180 7 plant plant NN cord-264542-0hu5twhp 180 8 - - HYPH cord-264542-0hu5twhp 180 9 protecting protect VBG cord-264542-0hu5twhp 180 10 double double RB cord-264542-0hu5twhp 180 11 - - HYPH cord-264542-0hu5twhp 180 12 stranded strand VBN cord-264542-0hu5twhp 180 13 RNA rna NN cord-264542-0hu5twhp 180 14 adsorbed adsorb VBN cord-264542-0hu5twhp 180 15 onto onto IN cord-264542-0hu5twhp 180 16 layered layered JJ cord-264542-0hu5twhp 180 17 double double JJ cord-264542-0hu5twhp 180 18 hydroxide hydroxide NN cord-264542-0hu5twhp 180 19 particles particle NNS cord-264542-0hu5twhp 180 20 Systems system NNS cord-264542-0hu5twhp 180 21 and and CC cord-264542-0hu5twhp 180 22 methods method NNS cord-264542-0hu5twhp 180 23 for for IN cord-264542-0hu5twhp 180 24 delivering deliver VBG cord-264542-0hu5twhp 180 25 nucleic nucleic JJ cord-264542-0hu5twhp 180 26 acids acid NNS cord-264542-0hu5twhp 180 27 to to IN cord-264542-0hu5twhp 180 28 a a DT cord-264542-0hu5twhp 180 29 plant plant NN cord-264542-0hu5twhp 180 30 Methods method NNS cord-264542-0hu5twhp 180 31 and and CC cord-264542-0hu5twhp 180 32 compositions composition NNS cord-264542-0hu5twhp 180 33 for for IN cord-264542-0hu5twhp 180 34 introducing introduce VBG cord-264542-0hu5twhp 180 35 nucleic nucleic JJ cord-264542-0hu5twhp 180 36 acids acid NNS cord-264542-0hu5twhp 180 37 into into IN cord-264542-0hu5twhp 180 38 plants plant NNS cord-264542-0hu5twhp 181 1 The the DT cord-264542-0hu5twhp 181 2 next next JJ cord-264542-0hu5twhp 181 3 generation generation NN cord-264542-0hu5twhp 181 4 of of IN cord-264542-0hu5twhp 181 5 insecticides insecticide NNS cord-264542-0hu5twhp 181 6 : : : cord-264542-0hu5twhp 181 7 dsRNA dsrna NN cord-264542-0hu5twhp 181 8 is be VBZ cord-264542-0hu5twhp 181 9 stable stable JJ cord-264542-0hu5twhp 181 10 as as IN cord-264542-0hu5twhp 181 11 a a DT cord-264542-0hu5twhp 181 12 foliar foliar NN cord-264542-0hu5twhp 181 13 - - HYPH cord-264542-0hu5twhp 181 14 applied apply VBN cord-264542-0hu5twhp 181 15 insecticide insecticide NN cord-264542-0hu5twhp 182 1 The the DT cord-264542-0hu5twhp 182 2 New New NNP cord-264542-0hu5twhp 182 3 Alchemists Alchemists NNPS cord-264542-0hu5twhp 182 4 : : : cord-264542-0hu5twhp 183 1 The the DT cord-264542-0hu5twhp 183 2 Risks risk NNS cord-264542-0hu5twhp 183 3 of of IN cord-264542-0hu5twhp 183 4 Genetic genetic JJ cord-264542-0hu5twhp 183 5 Modification Modification NNP cord-264542-0hu5twhp 183 6 , , , cord-264542-0hu5twhp 183 7 The the DT cord-264542-0hu5twhp 183 8 New New NNP cord-264542-0hu5twhp 183 9 Alchemists Alchemists NNPS cord-264542-0hu5twhp 183 10 : : : cord-264542-0hu5twhp 184 1 The the DT cord-264542-0hu5twhp 184 2 Risks risk NNS cord-264542-0hu5twhp 184 3 of of IN cord-264542-0hu5twhp 184 4 Genetic genetic JJ cord-264542-0hu5twhp 184 5 Modification modification NN cord-264542-0hu5twhp 185 1 Why why WRB cord-264542-0hu5twhp 185 2 gene gene NN cord-264542-0hu5twhp 185 3 editors editor NNS cord-264542-0hu5twhp 185 4 like like IN cord-264542-0hu5twhp 185 5 CRISPR CRISPR NNP cord-264542-0hu5twhp 185 6 / / SYM cord-264542-0hu5twhp 185 7 Cas Cas NNP cord-264542-0hu5twhp 185 8 may may MD cord-264542-0hu5twhp 185 9 be be VB cord-264542-0hu5twhp 185 10 a a DT cord-264542-0hu5twhp 185 11 game game NN cord-264542-0hu5twhp 185 12 - - HYPH cord-264542-0hu5twhp 185 13 changer changer NN cord-264542-0hu5twhp 185 14 for for IN cord-264542-0hu5twhp 185 15 neuroweapons neuroweapon NNS cord-264542-0hu5twhp 185 16 Development Development NNP cord-264542-0hu5twhp 185 17 of of IN cord-264542-0hu5twhp 185 18 an an DT cord-264542-0hu5twhp 185 19 artificial artificial JJ cord-264542-0hu5twhp 185 20 cell cell NN cord-264542-0hu5twhp 185 21 , , , cord-264542-0hu5twhp 185 22 from from IN cord-264542-0hu5twhp 185 23 self self NN cord-264542-0hu5twhp 185 24 - - HYPH cord-264542-0hu5twhp 185 25 organization organization NN cord-264542-0hu5twhp 185 26 to to IN cord-264542-0hu5twhp 185 27 computation computation NN cord-264542-0hu5twhp 185 28 and and CC cord-264542-0hu5twhp 185 29 self self NN cord-264542-0hu5twhp 185 30 - - HYPH cord-264542-0hu5twhp 185 31 reproduction reproduction NN cord-264542-0hu5twhp 185 32 Vesicle Vesicle NNP cord-264542-0hu5twhp 185 33 - - HYPH cord-264542-0hu5twhp 185 34 based base VBN cord-264542-0hu5twhp 185 35 artificial artificial JJ cord-264542-0hu5twhp 185 36 cells cell NNS cord-264542-0hu5twhp 185 37 as as IN cord-264542-0hu5twhp 185 38 chemical chemical NN cord-264542-0hu5twhp 185 39 microreactors microreactor NNS cord-264542-0hu5twhp 185 40 with with IN cord-264542-0hu5twhp 185 41 spatially spatially RB cord-264542-0hu5twhp 185 42 segregated segregate VBN cord-264542-0hu5twhp 185 43 reaction reaction NN cord-264542-0hu5twhp 185 44 pathways pathway NNS cord-264542-0hu5twhp 185 45 Aims aim VBZ cord-264542-0hu5twhp 185 46 and and CC cord-264542-0hu5twhp 185 47 methods method NNS cord-264542-0hu5twhp 185 48 of of IN cord-264542-0hu5twhp 185 49 biosteganography biosteganography NN cord-264542-0hu5twhp 185 50 Anticipating anticipate VBG cord-264542-0hu5twhp 185 51 xenogenic xenogenic JJ cord-264542-0hu5twhp 185 52 pollution pollution NN cord-264542-0hu5twhp 185 53 at at IN cord-264542-0hu5twhp 185 54 the the DT cord-264542-0hu5twhp 185 55 source source NN cord-264542-0hu5twhp 185 56 : : : cord-264542-0hu5twhp 186 1 Impact impact NN cord-264542-0hu5twhp 186 2 of of IN cord-264542-0hu5twhp 186 3 sterilizations sterilization NNS cord-264542-0hu5twhp 186 4 on on IN cord-264542-0hu5twhp 186 5 DNA dna NN cord-264542-0hu5twhp 186 6 release release NN cord-264542-0hu5twhp 186 7 from from IN cord-264542-0hu5twhp 186 8 microbial microbial JJ cord-264542-0hu5twhp 186 9 cultures culture NNS cord-264542-0hu5twhp 186 10 Psychology psychology NN cord-264542-0hu5twhp 186 11 and and CC cord-264542-0hu5twhp 186 12 security security NN cord-264542-0hu5twhp 186 13 resource resource NN cord-264542-0hu5twhp 186 14 page page NN cord-264542-0hu5twhp 186 15 ( ( -LRB- cord-264542-0hu5twhp 186 16 nd nd NNP cord-264542-0hu5twhp 186 17 ) ) -RRB- cord-264542-0hu5twhp 186 18 Is be VBZ cord-264542-0hu5twhp 186 19 confidence confidence NN cord-264542-0hu5twhp 186 20 in in IN cord-264542-0hu5twhp 186 21 the the DT cord-264542-0hu5twhp 186 22 monitoring monitoring NN cord-264542-0hu5twhp 186 23 of of IN cord-264542-0hu5twhp 186 24 ge ge NNP cord-264542-0hu5twhp 186 25 foods food NNS cord-264542-0hu5twhp 186 26 justified justify VBN cord-264542-0hu5twhp 186 27 ? ? . cord-264542-0hu5twhp 187 1 Next next JJ cord-264542-0hu5twhp 187 2 steps step NNS cord-264542-0hu5twhp 187 3 for for IN cord-264542-0hu5twhp 187 4 access access NN cord-264542-0hu5twhp 187 5 to to IN cord-264542-0hu5twhp 187 6 safe safe JJ cord-264542-0hu5twhp 187 7 , , , cord-264542-0hu5twhp 187 8 secure secure JJ cord-264542-0hu5twhp 187 9 DNA dna NN cord-264542-0hu5twhp 187 10 synthesis synthesis NN cord-264542-0hu5twhp 187 11 Identifying identify VBG cord-264542-0hu5twhp 187 12 personal personal JJ cord-264542-0hu5twhp 187 13 microbiomes microbiome NNS cord-264542-0hu5twhp 187 14 using use VBG cord-264542-0hu5twhp 187 15 metagenomic metagenomic NNP cord-264542-0hu5twhp 187 16 codes code VBZ cord-264542-0hu5twhp 187 17 Perspectives Perspectives NNPS cord-264542-0hu5twhp 187 18 on on IN cord-264542-0hu5twhp 187 19 harmful harmful JJ cord-264542-0hu5twhp 187 20 algal algal NN cord-264542-0hu5twhp 187 21 blooms bloom NNS cord-264542-0hu5twhp 187 22 ( ( -LRB- cord-264542-0hu5twhp 187 23 HABs HABs NNP cord-264542-0hu5twhp 187 24 ) ) -RRB- cord-264542-0hu5twhp 187 25 and and CC cord-264542-0hu5twhp 187 26 the the DT cord-264542-0hu5twhp 187 27 cyberbiosecurity cyberbiosecurity NN cord-264542-0hu5twhp 187 28 of of IN cord-264542-0hu5twhp 187 29 freshwater freshwater JJ cord-264542-0hu5twhp 187 30 systems system NNS cord-264542-0hu5twhp 187 31 Genetically genetically RB cord-264542-0hu5twhp 187 32 modified modify VBN cord-264542-0hu5twhp 187 33 seeds seed NNS cord-264542-0hu5twhp 187 34 and and CC cord-264542-0hu5twhp 187 35 plant plant NN cord-264542-0hu5twhp 187 36 propagating propagate VBG cord-264542-0hu5twhp 187 37 material material NN cord-264542-0hu5twhp 187 38 in in IN cord-264542-0hu5twhp 187 39 europe europe NNP cord-264542-0hu5twhp 187 40 : : : cord-264542-0hu5twhp 187 41 potential potential JJ cord-264542-0hu5twhp 187 42 routes route NNS cord-264542-0hu5twhp 187 43 of of IN cord-264542-0hu5twhp 187 44 entrance entrance NN cord-264542-0hu5twhp 187 45 and and CC cord-264542-0hu5twhp 187 46 current current JJ cord-264542-0hu5twhp 187 47 status status NN cord-264542-0hu5twhp 187 48 Methods method NNS cord-264542-0hu5twhp 187 49 for for IN cord-264542-0hu5twhp 187 50 data datum NNS cord-264542-0hu5twhp 187 51 encoding encoding NN cord-264542-0hu5twhp 187 52 in in IN cord-264542-0hu5twhp 187 53 DNA dna NN cord-264542-0hu5twhp 187 54 and and CC cord-264542-0hu5twhp 187 55 genetically genetically RB cord-264542-0hu5twhp 187 56 modified modify VBN cord-264542-0hu5twhp 187 57 organism organism NN cord-264542-0hu5twhp 187 58 authentication authentication NN cord-264542-0hu5twhp 187 59 , , , cord-264542-0hu5twhp 187 60 united united NNP cord-264542-0hu5twhp 187 61 States States NNP cord-264542-0hu5twhp 187 62 Patent Patent NNP cord-264542-0hu5twhp 187 63 A a DT cord-264542-0hu5twhp 187 64 reference reference NN cord-264542-0hu5twhp 187 65 model model NN cord-264542-0hu5twhp 187 66 of of IN cord-264542-0hu5twhp 187 67 information information NNP cord-264542-0hu5twhp 187 68 assurance assurance NNP cord-264542-0hu5twhp 187 69 & & CC cord-264542-0hu5twhp 187 70 security security NNP cord-264542-0hu5twhp 187 71 An an DT cord-264542-0hu5twhp 187 72 update update NN cord-264542-0hu5twhp 187 73 on on IN cord-264542-0hu5twhp 187 74 our -PRON- PRP$ cord-264542-0hu5twhp 187 75 security security NN cord-264542-0hu5twhp 187 76 incident incident NN