Search results for "attack"
showing 10 items of 221 documents
Timing and Side Channel Attacks
2015
How would you know the US pentagon is planning an attack on Iraq? One possible plan is to infiltrate the pentagon using spies, flipping traitors etc. But this sounds like lots of work and it is a dangerous work. That is the direct approach. Another possible plan is to ask the pizza delivery guys in the area. People planning an attack probably adds up to lots of people urgently trying to meet deadlines, staying late in the office and ordering pizza. So the pizza delivery guys know about a pending attack! The pizza delivery guys do not know the nature of the attack but they know “something is up” in the pentagon because for a few days people are staying late at the office and ordering pizza a…
Expression of the human complement C8 subunits is independently regulated by interleukin 1β, interleukin 6, and interferon γ
1998
The eighth component of human complement (C8) is composed of two subunits which are products from three separate genes. The alpha-gamma- and the beta-subunit of C8 are expressed independently, and are part of the membrane attack complex. C8 is primarily synthesized in the liver. It has been shown in previous studies that the human hepatoma cell line HepG2 constitutively expresses C8, and thus is a suitable model system for studying C8 biosynthesis in vitro. Expression is modulated by the cytokines IL-1 beta, IL-6 and IFN-gamma. The effect of the different cytokines on the expression of these subunits was examined using biosynthetical labelling and immunoprecipitation methods. C8 alpha-gamma…
Complement and Atherogenesis
1999
Abstract —Complement activation occurs in temporal correlation with the subendothelial deposition of LDL during early atherogenesis, and complement also plays a pathogenetic role in promoting lesion progression. Two lesion components have been identified that may be responsible for complement activation. First, enzymatic degradation of LDL generates a derivative that can spontaneously activate complement, and enzymatically degraded LDL (E-LDL) has been detected in the lesions. Second, C-reactive protein (CRP) colocalizes with complement C5b-9, as evidenced by immunohistological studies of early atherosclerotic lesions, so the possibility exists that this acute phase protein also fulfills a…
Negatīvo pārliecību saistība ar pēctraumas stresa traucējumiem un panikas lēkmju izpausmēm
2014
Elektroniskā versija nesatur pielikumus
C7 is expressed on endothelial cells as a trap for the assembling terminal complement complex and may exert anti-inflammatory function.
2009
AbstractWe describe a novel localization of C7 as a membrane-bound molecule on endothelial cells (ECs). Data obtained by sodium dodecyl sulfate–polyacrylamide gel electrophoresis (SDS-PAGE), Western blot analysis, Northern blot analysis, and mass spectrometry revealed that membrane-associated C7 (mC7) was indistinguishable from soluble C7 and was associated with vimentin on the cell surface. mC7 interacted with the other late complement components to form membrane-bound TCC (mTCC). Unlike the soluble SC5b-9, mTCC failed to stimulate ECs to express adhesion molecules, to secrete IL-8, and to induce albumin leakage through a monolayer of ECs, and more importantly protected ECs from the proinf…
Domain Generation Algorithm Detection Using Machine Learning Methods
2018
A botnet is a network of private computers infected with malicious software and controlled as a group without the knowledge of the owners. Botnets are used by cybercriminals for various malicious activities, such as stealing sensitive data, sending spam, launching Distributed Denial of Service (DDoS) attacks, etc. A Command and Control (C&C) server sends commands to the compromised hosts to execute those malicious activities. In order to avoid detection, recent botnets such as Conficker, Zeus, and Cryptolocker apply a technique called Domain-Fluxing or Domain Name Generation Algorithms (DGA), in which the infected bot periodically generates and tries to resolve a large number of pseudorando…
Long-term performance of the bovine pericardium patch in conventional carotid endarterectomy.
2014
Objective The aim of the study was to analyze long-term results of carotid endarterectomy (CEA) using bovine pericardium patch. Patients and Methods This study is a retrospective analysis of 274 consecutive cases (173 in CEA group and 101 patients in an internal control group of eversion endarterectomy [EEA]) operated between January 2005 and May 2007. Operations were performed according to standard surgical technique. Primary endpoints of the study were 30-day mortality, ipsilateral neurologic event rate, and high-grade restenosis in the long-term follow-up. Results No statistically significance between both groups was found in terms of gender, age, risk factors, medication (statine, plate…
Incidence and prognostic factors related to major adverse cerebrovascular events in patients with complex aortic diseases treated by the chimney tech…
2018
Abstract Objective Endovascular aneurysm repair (EVAR) with the chimney technique (ch-EVAR) has been used for the treatment of aortic aneurysms as an alternative approach to fenestrated endografting or open repair. Nonetheless, the need for an upper extremity arterial access may contribute to a higher risk for periprocedural cerebrovascular events. This study reports on the perioperative cerebral and major adverse cardiac and cerebrovascular events (MACCE) after ch-EVAR. Methods The PERICLES registry (PERformance of the chImney technique for the treatment of Complex aortic pathoLogiES) is an international, retrospective multicenter study evaluating the performance of ch-EVAR for the treatme…
Algorithmic Complexity Vulnerability Analysis of a Stateful Firewall
2016
Algorithmic complexity vulnerabilities are an opportunity for an ad-versary to conduct a sophisticated kind of attack i.e. on network infrastructure services. Such attacks take advantage of worst case time or space complexity of algorithms implemented on devices in their software. In this paper we address potential risks introduced by such algorithmic behavior in computer networks in particular on a stateful firewall. First we introduce the idea and theoretical background for the attack. We then describe in full detail a successfully con-ducted attack which takes advantage of the worst case computational complexi-ty of O(n2) of a hash table data structure used to store active sessions. The …
An intrusion detection system for selective forwarding attack in IPv6-based mobile WSNs
2017
Selective forwarding attack is considered among the most dangerous attack in wireless sensor networks, particularly in mobile environment. The attackers compromise legitimate nodes and selectively drop some packets. In addition to that, the movement of some nodes increases link failures, collisions and packet loss. So, it will be more difficult to detect malicious nodes from legitimates ones. This paper focuses on detecting selective forwarding attackers in IPv6-based mobile wireless sensor networks when the standardized IPv6 Routing Protocol for Low Power and Lossy Networks (RPL) is used. Contrarily to previous works which propose solutions to detect selective forwarding attack in static w…