Search results for "attack"

showing 10 items of 221 documents

Characterization of the cortical laser-doppler flow and hippocampal degenerative patterns after global cerebral ischaemia in the goat.

1998

Large-animal models offer several advantages in the study of cerebral ischaemia: easier control of physiological variables, easier neuropathological evaluation, etc. In the present study we have taken advantage of the unique cerebrovascular anatomy of the goat to reproduce a model of reversible, incomplete, global cerebral ischaemia in a large-sized animal species, in which the effects of successive manoeuvres to stop and re-start cerebral blood flow can be recorded continuously. Early cortical laser-Doppler flow response (up to 2 h) and delayed neuronal degeneration (7 days) in the hippocampal CA1 subfield have been analysed in goats undergoing 5, 10 or 20 min of transient, global cerebral…

Carotid Artery DiseasesTime FactorsPhysiologyClinical BiochemistryExternal carotid arteryIschemiaArterial Occlusive DiseasesHyperemiaHippocampusHyperaemiaPhysiology (medical)medicine.arteryOcclusionmedicineLaser-Doppler FlowmetryAnimalsIntracranial pressureCell Deathbusiness.industryGoatsPyramidal CellsHemodynamicsElectroencephalographymedicine.diseaseBlood pressureCerebral blood flowIschemic Attack TransientAnesthesiaCerebrovascular CirculationNerve DegenerationReperfusionFemalemedicine.symptombusinessPerfusionPflugers Archiv : European journal of physiology
researchProduct

CNS manifestations of Fabry's disease

2006

Summary Background Fabry's disease is a rare hereditary lysosomal storage disease with multiorgan involvement. Deficiency of α-galactosidase A activity leads to accumulation of neutral glycosphingolipids, especially in vascular endothelial and smooth-muscle cells. Along with progressive renal and cardiac dysfunction, stroke is a major and often life-threatening burden of the disease. Cerebral vasculopathy, confirmed by neuropathological, neuroradiological, and functional studies, occurs commonly and leads to ischaemic cerebrovascular events at an early age. Recent developments Fabry's disease is an X-linked disease and women have been regarded as only mildly affected carriers. However, rese…

Central Nervous SystemPediatricsmedicine.medical_specialtyPathologybusiness.industryBrainEnzyme replacement therapyDiseaseTransient ischaemic attacksmedicine.diseaseFabry's diseaseFabry diseaseStrokeCerebrovascular DisordersmedicineLysosomal storage diseaseFabry DiseaseHumansNeurology (clinical)Young adultbusinessStrokeThe Lancet Neurology
researchProduct

The Role of the Classical Pathway for the Bactericidal Effect of Normal Sera Against Gram-Negative Bacteria

1985

Many gram-negative bacteria are killed after treatment with normal serum. This phenomenon was already described in 1889 by Buchner. The serum-bactericidal effect is abolished when serum has been incubated for 30 min at 56° C. Gram-positive bacteria are less sensitive than gram-negative bacteria to direct killing, although gram-positive cocci are opsonized by the action of serum mediated by antibodies and complement (Inoue et al. 1968; Johnston et al. 1969). Normal sera exhibit bactericidal and bacteriolytic properties against some gramnegative strains; whereas, other gram-negative strains are serum resistant. It has been shown that serum from C4-deficient guinea pigs is able to kill some gr…

Classical complement pathwayGram-negative bacteriaAlternative complement pathwayBiologybiology.organism_classificationComplement membrane attack complexComplement C1qOpsoninBacteriaComplement systemMicrobiology
researchProduct

Interaction of Bacterial Endotoxin (LPS) with Fluid Phase and Macrophage Membrane Associated C1q, the FC-Recognizing Component of the Complement Syst…

1990

The bactericidal activity of normal serum was first described by Buchner in 1889 (10). This effect is abolished when serum has been incubated for 30 min at 56°C. Gram positives are less sensitive than Gram negative bacteria to direct killing, although gram positive cocci are opsonized by the action of serum mediated by antibodies and complement (22). It was found that most of the smooth strains of gram negative bacteria are serum resistant; whereas, the corresponding rough forms are extremely serum sensitive (32, 37). Thus evidence was provided that the composition of the bacterial surface may influence the reaction of the bacteria with the lytic system. The bacteriolytic properties of seru…

Classical complement pathwayGram-negative bacteriabiologyChemistryAlternative complement pathwaybiology.proteinAntibodybiology.organism_classificationComplement membrane attack complexOpsoninBacteriaMicrobiologyComplement system
researchProduct

Using Cloud Computing to Implement a Security Overlay Network

2012

This article proposes and analyzes a general cloud-based security overlay network that can be used as a transparent overlay network to provide services such as intrusion detection systems, antivirus and antispam software, and distributed denial-of-service prevention. The authors analyze each of these in-cloud security services in terms of resiliency, effectiveness, performance, flexibility, control, and cost.

Cloud computing securityComputer Networks and CommunicationsComputer scienceNetwork securitybusiness.industryOverlay networkDenial-of-service attackCloud computingIntrusion detection systemElectronic mailNetwork Access ControlElectrical and Electronic EngineeringbusinessLawComputer networkIEEE Security & Privacy Magazine
researchProduct

Complex Networked Systems: Convergence Analysis, Dynamic Behaviour, and Security.

Complex networked systems are a modern reference framework through which very dierent systems from far disciplines, such as biology, computer science, physics, social science, and engineering, can be described. They arise in the great majority of modern technological applications. Examples of real complex networked systems include embedded systems, biological networks, large-scale systems such as power generation grids, transportation networks, water distribution systems, and social network. In the recent years, scientists and engineers have developed a variety of techniques, approaches, and models to better understand and predict the behaviour of these systems, even though several research…

Complex Network Data clustering Hegselmann-Krause model Consensus Security Attacks Line Network k-means Opinion Dynamics.Settore ING-INF/04 - Automatica
researchProduct

Artificial Intelligence in Protecting Smart Building’s Cloud Service Infrastructure from Cyberattacks

2020

Gathering and utilizing stored data is gaining popularity and has become a crucial component of smart building infrastructure. The data collected can be stored, for example, into private, public, or hybrid cloud service infrastructure or distributed service by utilizing data platforms. The stored data can be used when implementing services, such as building automation (BAS). Cloud services, IoT sensors, and data platforms can face several kinds of cybersecurity attack vectors such as adversarial, AI-based, DoS/DDoS, insider attacks. If a perpetrator can penetrate the defenses of a data platform, she can cause significant harm to the system. For example, the perpetrator can disrupt a buildin…

Computer scienceDenial-of-service attackCloud computingComputerApplications_COMPUTERSINOTHERSYSTEMStekoälyComputer securitycomputer.software_genreInsiderpilvipalvelutälytalotComponent (UML)cloud servicetietoturvakyberturvallisuusBuilding automationbusiness.industryattack vectorsartificial intelligencePopularityartificial-intelligence-based applicationsHeating systemälytekniikkabusinessdata platformCloud storagecomputerverkkohyökkäykset
researchProduct

Dog-bite-related attacks: A new forensic approach

2020

Dog attacks today represent a health hazard considering that prevention strategies have not always been successful. The identification of the dog that attacked the victim is necessary, considering the civil or criminal consequences for the animal's owner. An accurate scene analysis must be performed collecting a series of important information.Forensic investigations in dog attacks involve different methods, such as the evaluating of the canine Short Tandem Repeat (STR) typing in saliva traces on wounds or bite mark analysis, however, these techniques cannot always be applied. The effort to find new methods to identify the dog that attacked the victim represents a very interesting field for…

Computer scienceSample (material)Sensitivity and Specificity01 natural sciencesdog attacksCattle genotypingForensic pathologyPathology and Forensic MedicineGenetic profile03 medical and health sciencesDogs0302 clinical medicinemedicineAnimalsHumansShort tandem repeatBites and Stings030216 legal & forensic medicineSalivacattle genotyping; dog attacks; dog identification; forensic pathology; forensic science; short tandem repeat; tgla122; tgla53Dog attackScene analysisdog identification010401 analytical chemistrytgla53DNAForensic Medicinemedicine.diseaseTGLA53.DNA FingerprintingDog bitePedigree0104 chemical sciencesForensic scienceIdentification (information)TGLA122Reference sampleForensic scienceMedical emergencyDog attackLawForensic Science International
researchProduct

Network attack detection and classification by the F-transform

2015

We solve the problem of network attack detection and classification. We discuss the way of generation and simulation of an artificial network traffic data. We propose an efficient algorithm for data classification that is based on the F-transform technique. The algorithm successfully passed all tests and moreover, it showed ability to perform classification in an on-line regime.

Computer sciencebusiness.industryData classificationNetwork attackData miningArtificial intelligenceTime seriescomputer.software_genrebusinessMachine learningcomputer2015 IEEE International Conference on Fuzzy Systems (FUZZ-IEEE)
researchProduct

‘Our words are stronger’ : re-enforcing boundaries through ritual work in a terrorist news event

2020

This article investigates the ritual work in terrorist news events, using the Berlin truck attack as a case in point. The article connects with the larger cluster of anthropologically inspired communication research on media events as public rituals in news media and applies digital media ethnography as its method. Fieldwork is conducted in 15 online news sites. The article identifies three key phases through which the ritual work was carried out: the rupture in the news event (ritualised as the strike), the liminal phase (ritualised as the manhunt) and the reconstitution of order following the attack (ritualised as the mourning). The article concludes with an interpretation of the broader …

Cultural StudiesHistoryuutisetmedia-antropologia518 Media and communicationsBerlin truck attack050801 communication & media studiesdigital media ethnography0603 philosophy ethics and religionEvent (philosophy)MEDIA0508 media and communicationsterrorterrorismiterrori-iskutMedia eventritual work060303 religions & theology05 social sciencesmediaMedia studiesmedia anthropology06 humanities and the arts16. Peace & justicejoukkoviestimetmedia eventonline newsWork (electrical)Terrorismothering
researchProduct