Search results for "attack"

showing 10 items of 221 documents

Timing and Side Channel Attacks

2015

How would you know the US pentagon is planning an attack on Iraq? One possible plan is to infiltrate the pentagon using spies, flipping traitors etc. But this sounds like lots of work and it is a dangerous work. That is the direct approach. Another possible plan is to ask the pizza delivery guys in the area. People planning an attack probably adds up to lots of people urgently trying to meet deadlines, staying late in the office and ordering pizza. So the pizza delivery guys know about a pending attack! The pizza delivery guys do not know the nature of the attack but they know “something is up” in the pentagon because for a few days people are staying late at the office and ordering pizza a…

PentagonMemory cycleBusinessSide channel attackComputer securitycomputer.software_genreCloud servercomputer
researchProduct

Expression of the human complement C8 subunits is independently regulated by interleukin 1β, interleukin 6, and interferon γ

1998

The eighth component of human complement (C8) is composed of two subunits which are products from three separate genes. The alpha-gamma- and the beta-subunit of C8 are expressed independently, and are part of the membrane attack complex. C8 is primarily synthesized in the liver. It has been shown in previous studies that the human hepatoma cell line HepG2 constitutively expresses C8, and thus is a suitable model system for studying C8 biosynthesis in vitro. Expression is modulated by the cytokines IL-1 beta, IL-6 and IFN-gamma. The effect of the different cytokines on the expression of these subunits was examined using biosynthetical labelling and immunoprecipitation methods. C8 alpha-gamma…

PharmacologybiologyInterleukin-6ImmunoprecipitationAntineoplastic AgentsSulfur RadioisotopesComplement C8Precipitin TestsMolecular biologyIn vitroComplement systemInterferon-gammaGene expressionTumor Cells Culturedbiology.proteinHumansSecretionInterleukin 6Beta (finance)Complement membrane attack complexInterleukin-1Immunopharmacology
researchProduct

Complement and Atherogenesis

1999

Abstract —Complement activation occurs in temporal correlation with the subendothelial deposition of LDL during early atherogenesis, and complement also plays a pathogenetic role in promoting lesion progression. Two lesion components have been identified that may be responsible for complement activation. First, enzymatic degradation of LDL generates a derivative that can spontaneously activate complement, and enzymatically degraded LDL (E-LDL) has been detected in the lesions. Second, C-reactive protein (CRP) colocalizes with complement C5b-9, as evidenced by immunohistological studies of early atherosclerotic lesions, so the possibility exists that this acute phase protein also fulfills a…

PhosphorylcholineNeuraminidaseComplement Membrane Attack ComplexCoronary Artery DiseaseBiologyPhospholipaseLesionPathogenesismedicineHumansElectrophoresis Gel Two-DimensionalTrypsinComplement Activationchemistry.chemical_classificationPhosphorylcholineC-reactive proteinAcute-phase proteinCholesterol LDLComplement C3Coronary VesselsMolecular biologyComplement systemC-Reactive ProteinEnzymeBiochemistrychemistryType C Phospholipasesbiology.proteinCalciummedicine.symptomCardiology and Cardiovascular MedicineProtein BindingArteriosclerosis, Thrombosis, and Vascular Biology
researchProduct

Negatīvo pārliecību saistība ar pēctraumas stresa traucējumiem un panikas lēkmju izpausmēm

2014

Elektroniskā versija nesatur pielikumus

Post-traumatic stress disorderClinical psychologynegatīvās pārliecībastrauma-related cognitionsPTSTpanic attacksPsiholoģijapanikas lēkmes
researchProduct

C7 is expressed on endothelial cells as a trap for the assembling terminal complement complex and may exert anti-inflammatory function.

2009

AbstractWe describe a novel localization of C7 as a membrane-bound molecule on endothelial cells (ECs). Data obtained by sodium dodecyl sulfate–polyacrylamide gel electrophoresis (SDS-PAGE), Western blot analysis, Northern blot analysis, and mass spectrometry revealed that membrane-associated C7 (mC7) was indistinguishable from soluble C7 and was associated with vimentin on the cell surface. mC7 interacted with the other late complement components to form membrane-bound TCC (mTCC). Unlike the soluble SC5b-9, mTCC failed to stimulate ECs to express adhesion molecules, to secrete IL-8, and to induce albumin leakage through a monolayer of ECs, and more importantly protected ECs from the proinf…

ProteomicsVasculitisUmbilical VeinsVasculitiImmunologyComplementComplement; C7; endothelial cells; inflammationComplement Membrane Attack ComplexBiologyBiochemistryProinflammatory cytokineWestern blotmedicineHumansVimentinC7Interleukin 8Northern blotRNA MessengerMembrane ProteinCells CulturedGel electrophoresisEndothelial Cellmedicine.diagnostic_testCell adhesion moleculeComplement; endothelial cells; inflammationInterleukin-8Endothelial CellsMembrane ProteinsProteomicUmbilical VeinHematologyCell BiologyMolecular biologyComplement C7Endothelial stem cellCells Cultured; Complement C7; Complement Membrane Attack Complex; Endothelial Cells; Humans; Interleukin-8; Membrane Proteins; Proteomics; RNA Messenger; Umbilical Veins; Vasculitis; Vimentin; Hematology; Biochemistry; Cell Biology; Immunologyinflammationendothelial cellComplement membrane attack complexHuman
researchProduct

Domain Generation Algorithm Detection Using Machine Learning Methods

2018

A botnet is a network of private computers infected with malicious software and controlled as a group without the knowledge of the owners. Botnets are used by cybercriminals for various malicious activities, such as stealing sensitive data, sending spam, launching Distributed Denial of Service (DDoS) attacks, etc. A Command and Control (C&C) server sends commands to the compromised hosts to execute those malicious activities. In order to avoid detection, recent botnets such as Conficker, Zeus, and Cryptolocker apply a technique called Domain-Fluxing or Domain Name Generation Algorithms (DGA), in which the infected bot periodically generates and tries to resolve a large number of pseudorando…

Pseudorandom number generatorDomain generation algorithmAlphanumericComputer sciencebusiness.industryDomain Name SystemComputerSystemsOrganization_COMPUTER-COMMUNICATIONNETWORKSBotnetDenial-of-service attackMachine learningcomputer.software_genreComputingMilieux_MANAGEMENTOFCOMPUTINGANDINFORMATIONSYSTEMSCryptoLockerMalwareArtificial intelligencebusinesscomputer
researchProduct

Long-term performance of the bovine pericardium patch in conventional carotid endarterectomy.

2014

Objective The aim of the study was to analyze long-term results of carotid endarterectomy (CEA) using bovine pericardium patch. Patients and Methods This study is a retrospective analysis of 274 consecutive cases (173 in CEA group and 101 patients in an internal control group of eversion endarterectomy [EEA]) operated between January 2005 and May 2007. Operations were performed according to standard surgical technique. Primary endpoints of the study were 30-day mortality, ipsilateral neurologic event rate, and high-grade restenosis in the long-term follow-up. Results No statistically significance between both groups was found in terms of gender, age, risk factors, medication (statine, plate…

Pulmonary and Respiratory MedicineAdultMalemedicine.medical_specialtyTime Factorsmedicine.medical_treatmentCarotid endarterectomyKaplan-Meier EstimateRestenosisRecurrenceRisk FactorsInternal medicinemedicinePericardiumAnimalsHumansCarotid StenosisStrokeEndarterectomyAgedProportional Hazards ModelsRetrospective StudiesAged 80 and overEndarterectomy Carotidbusiness.industryProportional hazards modelRetrospective cohort studyPerioperativeMiddle Agedmedicine.diseaseSurgeryStrokemedicine.anatomical_structureTreatment OutcomeIschemic Attack TransientCardiologySurgeryCattleFemaleCardiology and Cardiovascular MedicinebusinessPericardiumThe Thoracic and cardiovascular surgeon
researchProduct

Incidence and prognostic factors related to major adverse cerebrovascular events in patients with complex aortic diseases treated by the chimney tech…

2018

Abstract Objective Endovascular aneurysm repair (EVAR) with the chimney technique (ch-EVAR) has been used for the treatment of aortic aneurysms as an alternative approach to fenestrated endografting or open repair. Nonetheless, the need for an upper extremity arterial access may contribute to a higher risk for periprocedural cerebrovascular events. This study reports on the perioperative cerebral and major adverse cardiac and cerebrovascular events (MACCE) after ch-EVAR. Methods The PERICLES registry (PERformance of the chImney technique for the treatment of Complex aortic pathoLogiES) is an international, retrospective multicenter study evaluating the performance of ch-EVAR for the treatme…

RegistrieMaleTime Factorsmedicine.medical_treatment030204 cardiovascular system & hematologySettore MED/22 - Chirurgia VascolareEndovascular aneurysm repair0302 clinical medicineRetrospective StudieRisk FactorsCause of DeathCarotid artery diseaseOdds RatioRegistries030212 general & internal medicineMultivariate AnalysiStrokeCause of deathAged 80 and overIncidenceEndovascular ProceduresAtrial fibrillationchimney technique; stroke; aortic archMiddle AgedStrokeHeart DiseaseTreatment OutcomeIschemic Attack TransientCerebrovascular DisorderCardiologyFemaleCardiology and Cardiovascular MedicineHumanAdultmedicine.medical_specialtyAcute coronary syndromeLogistic ModelTime FactorHeart DiseasesOperative TimeAortic DiseasesBlood Vessel Prosthesis Implantation03 medical and health sciencesInternal medicinemedicineHumanscardiovascular diseasesAgedRetrospective StudiesEndovascular ProcedureChi-Square Distributionbusiness.industryRisk FactorOdds ratioPerioperativeAortic Diseasemedicine.diseaseSurgeryCerebrovascular DisordersLogistic ModelsMultivariate AnalysisSurgerybusiness
researchProduct

Algorithmic Complexity Vulnerability Analysis of a Stateful Firewall

2016

Algorithmic complexity vulnerabilities are an opportunity for an ad-versary to conduct a sophisticated kind of attack i.e. on network infrastructure services. Such attacks take advantage of worst case time or space complexity of algorithms implemented on devices in their software. In this paper we address potential risks introduced by such algorithmic behavior in computer networks in particular on a stateful firewall. First we introduce the idea and theoretical background for the attack. We then describe in full detail a successfully con-ducted attack which takes advantage of the worst case computational complexi-ty of O(n2) of a hash table data structure used to store active sessions. The …

RouterComputer sciencenetwork vulnerabilitiesDenial-of-service attack02 engineering and technologyNetwork topologyComputer securitycomputer.software_genreFirewall (construction)Stateful firewall0202 electrical engineering electronic engineering information engineeringDenial of Servicecomplexity attackcomputational complexitybusiness.industryComputerSystemsOrganization_COMPUTER-COMMUNICATIONNETWORKS020206 networking & telecommunicationsHash tablese-curitycomputer networksDoSbusinessSegmentation faultcomputerRebootComputer network
researchProduct

An intrusion detection system for selective forwarding attack in IPv6-based mobile WSNs

2017

Selective forwarding attack is considered among the most dangerous attack in wireless sensor networks, particularly in mobile environment. The attackers compromise legitimate nodes and selectively drop some packets. In addition to that, the movement of some nodes increases link failures, collisions and packet loss. So, it will be more difficult to detect malicious nodes from legitimates ones. This paper focuses on detecting selective forwarding attackers in IPv6-based mobile wireless sensor networks when the standardized IPv6 Routing Protocol for Low Power and Lossy Networks (RPL) is used. Contrarily to previous works which propose solutions to detect selective forwarding attack in static w…

Routing protocolComputer scienceNetwork packetbusiness.industryComputerSystemsOrganization_COMPUTER-COMMUNICATIONNETWORKS010401 analytical chemistryPacket forwarding020206 networking & telecommunications02 engineering and technologyIntrusion detection system01 natural sciences0104 chemical sciencesIPv6Key distribution in wireless sensor networksPacket lossPacket drop attack0202 electrical engineering electronic engineering information engineeringbusinessWireless sensor networkComputer network2017 13th International Wireless Communications and Mobile Computing Conference (IWCMC)
researchProduct