WorldWideScience

Sample records for attack complex inhibitor

  1. Membrane attack complex inhibitor CD59a protects against focal cerebral ischemia in mice

    Directory of Open Access Journals (Sweden)

    Nietfeld Wilfried

    2010-03-01

    Full Text Available Abstract Background The complement system is a crucial mediator of inflammation and cell lysis after cerebral ischemia. However, there is little information about the exact contribution of the membrane attack complex (MAC and its inhibitor-protein CD59. Methods Transient focal cerebral ischemia was induced by middle cerebral artery occlusion (MCAO in young male and female CD59a knockout and wild-type mice. Two models of MCAO were applied: 60 min MCAO and 48 h reperfusion, as well as 30 min MCAO and 72 h reperfusion. CD59a knockout animals were compared to wild-type animals in terms of infarct size, edema, neurological deficit, and cell death. Results and Discussion CD59a-deficiency in male mice caused significantly increased infarct volumes and brain swelling when compared to wild-type mice at 72 h after 30 min-occlusion time, whereas no significant difference was observed after 1 h-MCAO. Moreover, CD59a-deficient mice had impaired neurological function when compared to wild-type mice after 30 min MCAO. Conclusion We conclude that CD59a protects against ischemic brain damage, but depending on the gender and the stroke model used.

  2. Detection of complex cyber attacks

    Science.gov (United States)

    Gregorio-de Souza, Ian; Berk, Vincent H.; Giani, Annarita; Bakos, George; Bates, Marion; Cybenko, George; Madory, Doug

    2006-05-01

    One significant drawback to currently available security products is their inabilty to correlate diverse sensor input. For instance, by only using network intrusion detection data, a root kit installed through a weak username-password combination may go unnoticed. Similarly, an administrator may never make the link between deteriorating response times from the database server and an attacker exfiltrating trusted data, if these facts aren't presented together. Current Security Information Management Systems (SIMS) can collect and represent diverse data but lack sufficient correlation algorithms. By using a Process Query System, we were able to quickly bring together data flowing from many sources, including NIDS, HIDS, server logs, CPU load and memory usage, etc. We constructed PQS models that describe dynamic behavior of complicated attacks and failures, allowing us to detect and differentiate simultaneous sophisticated attacks on a target network. In this paper, we discuss the benefits of implementing such a multistage cyber attack detection system using PQS. We focus on how data from multiple sources can be combined and used to detect and track comprehensive network security events that go unnoticed using conventional tools.

  3. Combined Heuristic Attack Strategy on Complex Networks

    Directory of Open Access Journals (Sweden)

    Marek Šimon

    2017-01-01

    Full Text Available Usually, the existence of a complex network is considered an advantage feature and efforts are made to increase its robustness against an attack. However, there exist also harmful and/or malicious networks, from social ones like spreading hoax, corruption, phishing, extremist ideology, and terrorist support up to computer networks spreading computer viruses or DDoS attack software or even biological networks of carriers or transport centers spreading disease among the population. New attack strategy can be therefore used against malicious networks, as well as in a worst-case scenario test for robustness of a useful network. A common measure of robustness of networks is their disintegration level after removal of a fraction of nodes. This robustness can be calculated as a ratio of the number of nodes of the greatest remaining network component against the number of nodes in the original network. Our paper presents a combination of heuristics optimized for an attack on a complex network to achieve its greatest disintegration. Nodes are deleted sequentially based on a heuristic criterion. Efficiency of classical attack approaches is compared to the proposed approach on Barabási-Albert, scale-free with tunable power-law exponent, and Erdős-Rényi models of complex networks and on real-world networks. Our attack strategy results in a faster disintegration, which is counterbalanced by its slightly increased computational demands.

  4. Rising Trend: Complex and sophisticated attack methods

    Indian Academy of Sciences (India)

    Stux, DuQu, Nitro, Luckycat, Exploit Kits, FLAME. ADSL/SoHo Router Compromise. Botnets of compromised ADSL/SoHo Routers; User Redirection via malicious DNS entry. Web Application attacks. SQL Injection, RFI etc. More and more Webshells. More utility to hackers; Increasing complexity and evading mechanisms.

  5. Cascade-based attacks on complex networks

    Science.gov (United States)

    Motter, Adilson E.; Lai, Ying-Cheng

    2002-12-01

    We live in a modern world supported by large, complex networks. Examples range from financial markets to communication and transportation systems. In many realistic situations the flow of physical quantities in the network, as characterized by the loads on nodes, is important. We show that for such networks where loads can redistribute among the nodes, intentional attacks can lead to a cascade of overload failures, which can in turn cause the entire or a substantial part of the network to collapse. This is relevant for real-world networks that possess a highly heterogeneous distribution of loads, such as the Internet and power grids. We demonstrate that the heterogeneity of these networks makes them particularly vulnerable to attacks in that a large-scale cascade may be triggered by disabling a single key node. This brings obvious concerns on the security of such systems.

  6. Defense and attack of complex and dependent systems

    International Nuclear Information System (INIS)

    Hausken, Kjell

    2010-01-01

    A framework is constructed for how to analyze the strategic defense of an infrastructure subject to attack by a strategic attacker. Merging operations research, reliability theory, and game theory for optimal analytical impact, the optimization program for the defender and attacker is specified. Targets can be in parallel, series, combined series-parallel, complex, k-out-of-n redundancy, independent, interdependent, and dependent. The defender and attacker determine how much to invest in defending versus attacking each of multiple targets. A target can have economic, human, and symbolic values, subjectively assessed by the defender and attacker. A contest success function determines the probability of a successful attack on each target, dependent on the investments by the defender and attacker into each target, and on characteristics of the contest. The defender minimizes the expected damage plus the defense costs. The attacker maximizes the expected damage minus the attack costs. Each agent is concerned about how his investments vary across the targets, and the impact on his utilities. Interdependent systems are analyzed where the defense and attack on one target impacts all targets. Dependent systems are analyzed applying Markov analysis and repeated games where a successful attack on one target in the first period impacts the unit costs of defense and attack, and the contest intensity, for the other target in the second period.

  7. Defense and attack of complex and dependent systems

    Energy Technology Data Exchange (ETDEWEB)

    Hausken, Kjell, E-mail: kjell.hausken@uis.n [Faculty of Social Sciences, University of Stavanger, N-4036 Stavanger (Norway)

    2010-01-15

    A framework is constructed for how to analyze the strategic defense of an infrastructure subject to attack by a strategic attacker. Merging operations research, reliability theory, and game theory for optimal analytical impact, the optimization program for the defender and attacker is specified. Targets can be in parallel, series, combined series-parallel, complex, k-out-of-n redundancy, independent, interdependent, and dependent. The defender and attacker determine how much to invest in defending versus attacking each of multiple targets. A target can have economic, human, and symbolic values, subjectively assessed by the defender and attacker. A contest success function determines the probability of a successful attack on each target, dependent on the investments by the defender and attacker into each target, and on characteristics of the contest. The defender minimizes the expected damage plus the defense costs. The attacker maximizes the expected damage minus the attack costs. Each agent is concerned about how his investments vary across the targets, and the impact on his utilities. Interdependent systems are analyzed where the defense and attack on one target impacts all targets. Dependent systems are analyzed applying Markov analysis and repeated games where a successful attack on one target in the first period impacts the unit costs of defense and attack, and the contest intensity, for the other target in the second period.

  8. Rising Trend: Complex and sophisticated attack methods

    Indian Academy of Sciences (India)

    Increased frequency and intensity of DoS/DDoS. Few Gbps is now normal; Anonymous VPNs being used; Botnets being used as a vehicle for launching DDoS attacks. Large scale booking of domain names. Hundred thousands of domains registered in short duration via few registrars; Single registrant; Most of the domains ...

  9. Why cryptography should not rely on physical attack complexity

    CERN Document Server

    Krämer, Juliane

    2015-01-01

    This book presents two practical physical attacks. It shows how attackers can reveal the secret key of symmetric as well as asymmetric cryptographic algorithms based on these attacks, and presents countermeasures on the software and the hardware level that can help to prevent them in the future. Though their theory has been known for several years now, since neither attack has yet been successfully implemented in practice, they have generally not been considered a serious threat. In short, their physical attack complexity has been overestimated and the implied security threat has been underestimated. First, the book introduces the photonic side channel, which offers not only temporal resolution, but also the highest possible spatial resolution. Due to the high cost of its initial implementation, it has not been taken seriously. The work shows both simple and differential photonic side channel analyses. Then, it presents a fault attack against pairing-based cryptography. Due to the need for at least two indepe...

  10. Vulnerability of complex networks under intentional attack with incomplete information

    International Nuclear Information System (INIS)

    Wu, J; Deng, H Z; Tan, Y J; Zhu, D Z

    2007-01-01

    We study the vulnerability of complex networks under intentional attack with incomplete information, which means that one can only preferentially attack the most important nodes among a local region of a network. The known random failure and the intentional attack are two extreme cases of our study. Using the generating function method, we derive the exact value of the critical removal fraction f c of nodes for the disintegration of networks and the size of the giant component. To validate our model and method, we perform simulations of intentional attack with incomplete information in scale-free networks. We show that the attack information has an important effect on the vulnerability of scale-free networks. We also demonstrate that hiding a fraction of the nodes information is a cost-efficient strategy for enhancing the robustness of complex networks

  11. Attack robustness and centrality of complex networks.

    Directory of Open Access Journals (Sweden)

    Swami Iyer

    Full Text Available Many complex systems can be described by networks, in which the constituent components are represented by vertices and the connections between the components are represented by edges between the corresponding vertices. A fundamental issue concerning complex networked systems is the robustness of the overall system to the failure of its constituent parts. Since the degree to which a networked system continues to function, as its component parts are degraded, typically depends on the integrity of the underlying network, the question of system robustness can be addressed by analyzing how the network structure changes as vertices are removed. Previous work has considered how the structure of complex networks change as vertices are removed uniformly at random, in decreasing order of their degree, or in decreasing order of their betweenness centrality. Here we extend these studies by investigating the effect on network structure of targeting vertices for removal based on a wider range of non-local measures of potential importance than simply degree or betweenness. We consider the effect of such targeted vertex removal on model networks with different degree distributions, clustering coefficients and assortativity coefficients, and for a variety of empirical networks.

  12. Prospective Vigilance: Assessing Complex Coordinated Attack Preparedness Programs

    Science.gov (United States)

    2017-12-01

    INTENTIONALLY LEFT BLANK xiii LIST OF ACRONYMS AND ABBREVIATIONS CCA complex coordinate attack EMS emergency medical services FBI Federal Bureau...the Bombings in London on 7th July 2005, vol. HC 1087 (London: The Stationery Office, 2006), https://www.gov.uk/government/uploads/system/uploads...School Center for Homeland Defense and Security Mobile Education Team, DHS Office of Bombing Prevention, and DHS Active Shooter training. 55 NCTC, DHS

  13. Managing Complex Battlespace Environments Using Attack the Network Methodologies

    DEFF Research Database (Denmark)

    Mitchell, Dr. William L.

    This paper examines the last 8 years of development and application of Attack the Network (AtN) intelligence methodologies for creating shared situational understanding of complex battlespace environment and the development of deliberate targeting frameworks. It will present a short history...... of their development, how they are integrated into operational planning through strategies of deliberate targeting for modern operations. The paper will draw experience and case studies from Iraq, Syria, and Afghanistan and will offer some lessons learned as well as insight into the future of these methodologies....... Including their possible application on a national security level for managing longer strategic endeavors....

  14. Robustness of Dengue Complex Network under Targeted versus Random Attack

    Directory of Open Access Journals (Sweden)

    Hafiz Abid Mahmood Malik

    2017-01-01

    Full Text Available Dengue virus infection is one of those epidemic diseases that require much consideration in order to save the humankind from its unsafe impacts. According to the World Health Organization (WHO, 3.6 billion individuals are at risk because of the dengue virus sickness. Researchers are striving to comprehend the dengue threat. This study is a little commitment to those endeavors. To observe the robustness of the dengue network, we uprooted the links between nodes randomly and targeted by utilizing different centrality measures. The outcomes demonstrated that 5% targeted attack is equivalent to the result of 65% random assault, which showed the topology of this complex network validated a scale-free network instead of random network. Four centrality measures (Degree, Closeness, Betweenness, and Eigenvector have been ascertained to look for focal hubs. It has been observed through the results in this study that robustness of a node and links depends on topology of the network. The dengue epidemic network presented robust behaviour under random attack, and this network turned out to be more vulnerable when the hubs of higher degree have higher probability to fail. Moreover, representation of this network has been projected, and hub removal impact has been shown on the real map of Gombak (Malaysia.

  15. A Framework For Analyzing And Mitigating The Vulnerabilities Of Complex Systems Via Attack And Protection Trees

    National Research Council Canada - National Science Library

    Edge, Kenneth S

    2007-01-01

    .... In addition to developing protection trees, this research improves the existing concept of attack trees and develops rule sets for the manipulation of metrics used in the security of complex systems...

  16. Low Complexity Signed Response Based Sybil Attack Detection Mechanism in Wireless Sensor Networks

    Directory of Open Access Journals (Sweden)

    M. Saud Khan

    2016-01-01

    Full Text Available Security is always a major concern in wireless sensor networks (WSNs. Identity based attacks such as spoofing and sybil not only compromise the network but also slow down its performance. This paper proposes a low complexity sybil attack detection scheme, that is, based on signed response (SRES authentication mechanism developed for Global System for Mobile (GSM communications. A probabilistic model is presented which analyzes the proposed authentication mechanism for its probability of sybil attack. The paper also presents a simulation based comparative analysis of the existing sybil attack schemes with respect to the proposed scheme. It is observed that the proposed sybil detection scheme exhibits lesser computational cost and power consumption as compared to the existing schemes for the same sybil detection performance.

  17. The membrane attack complex of the complement system is essential for rapid wallerian degeneration

    NARCIS (Netherlands)

    Ramaglia, Valeria; King, Rosalind Helen Mary; Nourallah, Michelle; Wolterman, Ruud; de Jonge, Rosalein; Ramkema, Marja; Vigar, Miriam Ann; van der Wetering, Sandra; Morgan, Brian Paul; Troost, Dirk; Baas, Frank

    2007-01-01

    The complement (C) system plays an important role in myelin breakdown during Wallerian degeneration (WD). The pathway and mechanism involved are, however, not clear. In a crush injury model of the sciatic nerve, we show that C6, necessary for the assembly of the membrane attack complex (MAC), is

  18. Bush animal attacks: management of complex injuries in a resource-limited setting

    Directory of Open Access Journals (Sweden)

    Mitchell Katrina B

    2011-12-01

    Full Text Available Abstract Introduction Though animal-related injuries and fatalities have been documented throughout the world, the variety of attacks by wild animals native to rural East Africa are less commonly described. Given the proximity of our northwestern Tanzania hospital to Lake Victoria, Lake Tanganyika, and the Serengeti National Park, and presentation of several patients attacked by bush animals and suffering a variety of complex injuries, we sought to report the pattern of attacks and surgical management in a resource-limited setting. Materials and methods Four patients who were admitted to the northwestern Tanzania tertiary referral hospital, Bugando Medical Centre (BMC, in 2010-2011 suffered attacks by different bush animals: hyena, elephant, crocodile, and vervet monkey. These patients were triaged as trauma patients in the Casualty Ward, then admitted for inpatient monitoring and treatment. Their outcomes were followed to discharge. Results The age and gender of the patients attacked was variable, though all but the pediatric patient were participating in food gathering or guarding activities in rural locations at the time of the attacks. All patients required surgical management of their injuries, which included debridement and closure of wounds, chest tube insertion, amputation, and external fixation of an extremity fracture. All patients survived and were discharged home. Discussion Though human injuries secondary to encounters with undomesticated animals such as cows, moose, and camel are reported, they often are indirect traumas resulting from road traffic collisions. Snake attacks are well documented and common. However, this series of unique bush animal attacks describes the initial and surgical management of human injuries in the resource-limited setting of the developing world. Conclusion Animal attacks are common throughout the world, but their pattern may vary in Africa throughout jungle and bush environmental settings. It is

  19. Identifying Vulnerable Nodes of Complex Networks in Cascading Failures Induced by Node-Based Attacks

    Directory of Open Access Journals (Sweden)

    Shudong Li

    2013-01-01

    Full Text Available In the research on network security, distinguishing the vulnerable components of networks is very important for protecting infrastructures systems. Here, we probe how to identify the vulnerable nodes of complex networks in cascading failures, which was ignored before. Concerned with random attack (RA and highest load attack (HL on nodes, we model cascading dynamics of complex networks. Then, we introduce four kinds of weighting methods to characterize the nodes of networks including Barabási-Albert scale-free networks (SF, Watts-Strogatz small-world networks (WS, Erdos-Renyi random networks (ER, and two real-world networks. The simulations show that, for SF networks under HL attack, the nodes with small value of the fourth kind of weight are the most vulnerable and the ones with small value of the third weight are also vulnerable. Also, the real-world autonomous system with power-law distribution verifies these findings. Moreover, for WS and ER networks under both RA and HL attack, when the nodes have low tolerant ability, the ones with small value of the fourth kind of weight are more vulnerable and also the ones with high degree are easier to break down. The results give us important theoretical basis for digging the potential safety loophole and making protection strategy.

  20. Cobalt (III) complexes as novel matrix metalloproteinase-9 inhibitors

    Energy Technology Data Exchange (ETDEWEB)

    Lee, Jiyoun [Sungshin Women' s Univ., Seoul (Korea, Republic of)

    2012-04-15

    We have synthesized a series of novel MMP-9 inhibitors containing cobalt(III) complexes. The synthesized cobalt(III) complexes are effective as enzyme inhibitors and the attachment of a biphenyl group enhanced the efficiency of enzyme inhibition up to 6-fold. When compared to the reported non-hydroxamate MMP inhibitors, the synthesized complexes showed comparable in vitro potency. The enzyme assay showed that the cobalt(III) complex can disrupt the zinc binding active site of MMP-9 and is proposed to work via a ligand exchange mechanism. Since histidine residues are essential for the catalytic activity of a large percentage of enzymes and zinc finger proteins, these cobalt(III) complexes can serve as a prototype inhibitor towards various zinc containing enzymes and proteins. Matrix metalloproteinases (MMPs) are a family of zinc binding endopeptidases that play crucial roles in various physiological processes and diseases such as embryogenic growth, angiogenesis, arthritis, skin ulceration, liver fibrosis and tumor metastasis. Because of their implications in a wide range of diseases, MMPs are considered as intriguing drug targets. The majority of MMP inhibitors are organic small molecules containing a hydroxamate functionality for the zinc binding group. This hydroxamate group binds to a zinc(II) center in a bidentate fashion and creates a distorted trigonal bipyramidal geometry.

  1. Cobalt (III) complexes as novel matrix metalloproteinase-9 inhibitors

    International Nuclear Information System (INIS)

    Lee, Jiyoun

    2012-01-01

    We have synthesized a series of novel MMP-9 inhibitors containing cobalt(III) complexes. The synthesized cobalt(III) complexes are effective as enzyme inhibitors and the attachment of a biphenyl group enhanced the efficiency of enzyme inhibition up to 6-fold. When compared to the reported non-hydroxamate MMP inhibitors, the synthesized complexes showed comparable in vitro potency. The enzyme assay showed that the cobalt(III) complex can disrupt the zinc binding active site of MMP-9 and is proposed to work via a ligand exchange mechanism. Since histidine residues are essential for the catalytic activity of a large percentage of enzymes and zinc finger proteins, these cobalt(III) complexes can serve as a prototype inhibitor towards various zinc containing enzymes and proteins. Matrix metalloproteinases (MMPs) are a family of zinc binding endopeptidases that play crucial roles in various physiological processes and diseases such as embryogenic growth, angiogenesis, arthritis, skin ulceration, liver fibrosis and tumor metastasis. Because of their implications in a wide range of diseases, MMPs are considered as intriguing drug targets. The majority of MMP inhibitors are organic small molecules containing a hydroxamate functionality for the zinc binding group. This hydroxamate group binds to a zinc(II) center in a bidentate fashion and creates a distorted trigonal bipyramidal geometry

  2. Icatibant, an inhibitor of bradykinin receptor 2, for hereditary angioedema attacks: prospective experimental single-cohort study.

    Science.gov (United States)

    Campos, Regis Albuquerque; Valle, Solange Oliveira Rodrigues; França, Alfeu Tavares; Cordeiro, Elisabete; Serpa, Faradiba Sarquis; Mello, Yara Ferreira; Malheiros, Teresinha; Toledo, Eliana; Mansour, Elie; Fusaro, Gustavo; Grumach, Anete Sevciovic

    2014-01-01

    Hereditary angioedema (HAE) with C1 inhibitor deficiency manifests as recurrent episodes of edema involving the skin, upper respiratory tract and gastrointestinal tract. It can be lethal due to asphyxia. The aim here was to evaluate the response to therapy for these attacks using icatibant, an inhibitor of the bradykinin receptor, which was recently introduced into Brazil. Prospective experimental single-cohort study on the efficacy and safety of icatibant for HAE patients. Patients with a confirmed HAE diagnosis were enrolled according to symptoms and regardless of the time since onset of the attack. Icatibant was administered in accordance with the protocol that has been approved in Brazil. Symptom severity was assessed continuously and adverse events were monitored. 24 attacks in 20 HAE patients were treated (female/male 19:1; 19-55 years; median 29 years of age). The symptoms were: subcutaneous edema (22/24); abdominal pain (15/24) and upper airway obstruction (10/24). The time taken until onset of relief was: 5-10 minutes (5/24; 20.8%); 10-20 (5/24; 20.8%); 20-30 (8/24; 33.4%); 30-60 (5/24; 20.8%); and 2 hours (1/24; 4.3%). The time taken for complete resolution of symptoms ranged from 4.3 to 33.4 hours. Adverse effects were only reported at injection sites. Mild to moderate erythema and/or feelings of burning were reported by 15/24 patients, itching by 3 and no adverse effects in 6. HAE type I patients who received icatibant responded promptly; most achieved improved symptom severity within 30 minutes. Local adverse events occurred in 75% of the patients.

  3. Icatibant, an inhibitor of bradykinin receptor 2, for hereditary angioedema attacks: prospective experimental single-cohort study

    Directory of Open Access Journals (Sweden)

    Regis Albuquerque Campos

    Full Text Available CONTEXT AND OBJECTIVE: Hereditary angioedema (HAE with C1 inhibitor deficiency manifests as recurrent episodes of edema involving the skin, upper respiratory tract and gastrointestinal tract. It can be lethal due to asphyxia. The aim here was to evaluate the response to therapy for these attacks using icatibant, an inhibitor of the bradykinin receptor, which was recently introduced into Brazil.DESIGN AND SETTING: Prospective experimental single-cohort study on the efficacy and safety of icatibant for HAE patients.METHODS: Patients with a confirmed HAE diagnosis were enrolled according to symptoms and regardless of the time since onset of the attack. Icatibant was administered in accordance with the protocol that has been approved in Brazil. Symptom severity was assessed continuously and adverse events were monitored.RESULTS: 24 attacks in 20 HAE patients were treated (female/male 19:1; 19-55 years; median 29 years of age. The symptoms were: subcutaneous edema (22/24; abdominal pain (15/24 and upper airway obstruction (10/24. The time taken until onset of relief was: 5-10 minutes (5/24; 20.8%; 10-20 (5/24; 20.8%; 20-30 (8/24; 33.4%; 30-60 (5/24; 20.8%; and 2 hours (1/24; 4.3%. The time taken for complete resolution of symptoms ranged from 4.3 to 33.4 hours. Adverse effects were only reported at injection sites. Mild to moderate erythema and/or feelings of burning were reported by 15/24 patients, itching by 3 and no adverse effects in 6.CONCLUSION: HAE type I patients who received icatibant responded promptly; most achieved improved symptom severity within 30 minutes. Local adverse events occurred in 75% of the patients.

  4. What's Next in Complex Networks? Capturing the Concept of Attacking Play in Invasive Team Sports.

    Science.gov (United States)

    Ramos, João; Lopes, Rui J; Araújo, Duarte

    2018-01-01

    The evolution of performance analysis within sports sciences is tied to technology development and practitioner demands. However, how individual and collective patterns self-organize and interact in invasive team sports remains elusive. Social network analysis has been recently proposed to resolve some aspects of this problem, and has proven successful in capturing collective features resulting from the interactions between team members as well as a powerful communication tool. Despite these advances, some fundamental team sports concepts such as an attacking play have not been properly captured by the more common applications of social network analysis to team sports performance. In this article, we propose a novel approach to team sports performance centered on sport concepts, namely that of an attacking play. Network theory and tools including temporal and bipartite or multilayered networks were used to capture this concept. We put forward eight questions directly related to team performance to discuss how common pitfalls in the use of network tools for capturing sports concepts can be avoided. Some answers are advanced in an attempt to be more precise in the description of team dynamics and to uncover other metrics directly applied to sport concepts, such as the structure and dynamics of attacking plays. Finally, we propose that, at this stage of knowledge, it may be advantageous to build up from fundamental sport concepts toward complex network theory and tools, and not the other way around.

  5. Complexity attack resistant flow lookup achemes for IPv6: a measurement based comparison

    OpenAIRE

    Malone, David; Tobin, R. Joshua

    2008-01-01

    In this paper we look at the problem of choosing a good flow state lookup scheme for IPv6 firewalls. We want to choose a scheme which is fast when dealing with typical traffic, but whose performance will not degrade unnecessarily when subject to a complexity attack. We demonstrate the existing problem and, using captured traffic, assess a number of replacement schemes that are hash and tree based. Our aim is to improve FreeBSD’s ipfw firewall, and so finally we implement the most pro...

  6. The membrane attack complex as an indicator of complement hyperactivation in type 2 diabetes mellitus

    OpenAIRE

    Elina Aleksandrovna Arakelova; Meri Robertovna Ovsepyan; Anna Surenovna Boyadzhyan; Arsen Artashesovich Arakelyan; Astkhik Artavazdovna Gevorkyan; Ashot Andreevich Mamikonyan

    2011-01-01

    Aim. Comparative analysis of the levels of the membrane attack complex (MAC) - an end product of complement activation, and of hemolytic activities of C1 and C3 complement components in sera of patients with diabetes mellitus 2 (DM2) and healthy subjects. Materials and methods. 37 DM2 patients (7 men, 26 women, mean age 58±9 years (M±б) and 37 healthy subjects without a family history of hereditary diabetes (17 men, 20 women, mean age 52±12 years). Serum MAC levels were measured by E...

  7. Health-Related Quality of Life with Subcutaneous C1-Inhibitor for Prevention of Attacks of Hereditary Angioedema.

    Science.gov (United States)

    Lumry, William R; Craig, Timothy; Zuraw, Bruce; Longhurst, Hilary; Baker, James; Li, H Henry; Bernstein, Jonathan A; Anderson, John; Riedl, Marc A; Manning, Michael E; Keith, Paul K; Levy, Donald S; Caballero, Teresa; Banerji, Aleena; Gower, Richard G; Farkas, Henriette; Lawo, John-Philip; Pragst, Ingo; Machnig, Thomas; Watson, Douglas J

    2018-01-31

    Hereditary angioedema with C1-inhibitor deficiency (C1-INH-HAE) impairs health-related quality of life (HRQoL). The objective of this study was to assess HRQoL outcomes in patients self-administering subcutaneous C1-INH (C1-INH[SC]; HAEGARDA) for routine prevention of HAE attacks. Post hoc analysis of data from the placebo-controlled, crossover phase III COMPACT study (Clinical Studies for Optimal Management of Preventing Angioedema with Low-Volume Subcutaneous C1-Inhibitor Replacement Therapy). Ninety patients with C1-INH-HAE were randomized to 1 of 4 treatment sequences: C1-INH(SC) 40 or 60 IU/kg twice weekly for 16 weeks, preceded or followed by 16 weeks of twice weekly placebo injections. All HAE attacks were treated with open-label on-demand treatment as necessary. HRQoL assessments at week 14 (last visit) included the European Quality of Life-5 Dimensions Questionnaire (EQ-5D-3L), the Hospital Anxiety and Depression Scale (HADS), the Work Productivity and Activity Impairment Questionnaire (WPAI), and the Treatment Satisfaction Questionnaire for Medication (TSQM). Compared with placebo (on-demand treatment alone), treatment with twice weekly C1-INH(SC) (both doses combined) was associated with better EQ-5D visual analog scale general health, less HADS anxiety, less WPAI presenteeism, work productivity loss, and activity impairment, and greater TSQM effectiveness and overall treatment satisfaction. More patients self-reported a "good/excellent" response during routine prevention with C1-INH(SC) compared with on-demand only (placebo prophylaxis) management. For each HRQoL measure, a greater proportion of patients had a clinically meaningful improvement during C1-INH(SC) treatment compared with placebo. In patients with frequent HAE attacks, a treatment strategy of routine prevention with self-administered twice weekly C1-INH(SC) had a greater impact on improving multiple HAE-related HRQoL impairments, most notably anxiety and work productivity, compared with on

  8. Abstraction of methyl from neutral Fischer-type carbene complexes: A new site for nucleophilic attack

    Energy Technology Data Exchange (ETDEWEB)

    Toomey, L.M.; Atwood, J.D. [State Univ. of New York, Buffalo, NY (United States)

    1997-02-04

    Reactions of Fischer-type carbene complexes, M(CO){sub 5}(C(OMe)pH) (M = Cr, W), with metal carbonyl anions (M`{sup -} = CpFe(CO){sub 2}{sup -@}, Re(CO){sub 5}{sup -}, Mn(CO){sub 4}PPh{sub 3}{sup -}, Co(CO){sub 3}PPh{sub 3}{sup -}, Cp{sup *}Cr(CO){sub 3}{sup -}, CpMo(CO){sub 3}{sup -}) result in demethylation of the carbene complexes. The products are M(CO){sub 5}C(O)Ph{sup -} and M`-Me, characterized by infrared and NMR spectroscopy. A slower rate for reaction with W(CO){sub 5}(C(OEt)Ph) in comparison to the methyl analogue is consistent with nucleophilic attack of the metal carbonyl anion on the methyl of the methoxy group of the carbene. This is a new type of nucleophilic attack of a Fischer-type carbene. 22 refs., 1 fig., 1 tab.

  9. Exposure‐Response Model of Subcutaneous C1‐Inhibitor Concentrate to Estimate the Risk of Attacks in Patients With Hereditary Angioedema

    Science.gov (United States)

    Tortorici, Michael A.; Pawaskar, Dipti; Pragst, Ingo; Machnig, Thomas; Hutmacher, Matthew; Zuraw, Bruce; Cicardi, Marco; Craig, Timothy; Longhurst, Hilary; Sidhu, Jagdev

    2018-01-01

    Subcutaneous C1‐inhibitor (HAEGARDA, CSL Behring), is a US Food and Drug Administration (FDA)‐approved, highly concentrated formulation of a plasma‐derived C1‐esterase inhibitor (C1‐INH), which, in the phase III Clinical Studies for Optimal Management in Preventing Angioedema with Low‐Volume Subcutaneous C1‐inhibitor Replacement Therapy (COMPACT) trial, reduced the incidence of hereditary angioedema (HAE) attacks when given prophylactically. Data from the COMPACT trial were used to develop a repeated time‐to‐event model to characterize the timing and frequency of HAE attacks as a function of C1‐INH activity, and then develop an exposure–response model to assess the relationship between C1‐INH functional activity levels (C1‐INH(f)) and the risk of an attack. The C1‐INH(f) values of 33.1%, 40.3%, and 63.1% were predicted to correspond with 50%, 70%, and 90% reductions in the HAE attack risk, respectively, relative to no therapy. Based on trough C1‐INH(f) values for the 40 IU/kg (40.2%) and 60 IU/kg (48.0%) C1‐INH (SC) doses, the model predicted that 50% and 67% of the population, respectively, would see at least a 70% decrease in the risk of an attack. PMID:29316335

  10. Sodium Valproate, a Histone Deacetylase Inhibitor, Is Associated With Reduced Stroke Risk After Previous Ischemic Stroke or Transient Ischemic Attack

    Science.gov (United States)

    Brookes, Rebecca L.; Crichton, Siobhan; Wolfe, Charles D.A.; Yi, Qilong; Li, Linxin; Hankey, Graeme J.; Rothwell, Peter M.

    2018-01-01

    Background and Purpose— A variant in the histone deacetylase 9 (HDAC9) gene is associated with large artery stroke. Therefore, inhibiting HDAC9 might offer a novel secondary preventative treatment for ischemic stroke. The antiepileptic drug sodium valproate (SVA) is a nonspecific inhibitor of HDAC9. We tested whether SVA therapy given after ischemic stroke was associated with reduced recurrent stroke rate. Methods— Data were pooled from 3 prospective studies recruiting patients with previous stroke or transient ischemic attack and long-term follow-up: the South London Stroke Register, The Vitamins to Prevent Stroke Study, and the Oxford Vascular Study. Patients receiving SVA were compared with patients who received antiepileptic drugs other than SVA using survival analysis and Cox Regression. Results— A total of 11 949 patients with confirmed ischemic event were included. Recurrent stroke rate was lower in patient taking SVA (17 of 168) than other antiepileptic drugs (105 of 530; log-rank survival analysis P=0.002). On Cox regression, controlling for potential cofounders, SVA remained associated with reduced stroke (hazard ratio=0.44; 95% confidence interval: 0.3–0.7; P=0.002). A similar result was obtained when patients taking SVA were compared with all cases not taking SVA (Cox regression, hazard ratio=0.47; 95% confidence interval: 0.29–0.77; P=0.003). Conclusions— These results suggest that exposure to SVA, an inhibitor of HDAC, may be associated with a lower recurrent stroke risk although we cannot exclude residual confounding in this study design. This supports the hypothesis that HDAC9 is important in the ischemic stroke pathogenesis and that its inhibition, by SVA or a more specific HDAC9 inhibitor, is worthy of evaluation as a treatment to prevent recurrent ischemic stroke. PMID:29247141

  11. Using model complexes to augment and advance metalloproteinase inhibitor design.

    Science.gov (United States)

    Jacobsen, Faith E; Cohen, Seth M

    2004-05-17

    The tetrahedral zinc complex [(Tp(Ph,Me))ZnOH] (Tp(Ph,Me) = hydrotris(3,5-phenylmethylpyrazolyl)borate) was combined with 2-thenylmercaptan, ethyl 4,4,4-trifluoroacetoacetate, salicylic acid, salicylamide, thiosalicylic acid, thiosalicylamide, methyl salicylate, methyl thiosalicyliate, and 2-hydroxyacetophenone to form the corresponding [(Tp(Ph,Me))Zn(ZBG)] complexes (ZBG = zinc-binding group). X-ray crystal structures of these complexes were obtained to determine the mode of binding for each ZBG, several of which had been previously studied with SAR by NMR (structure-activity relationship by nuclear magnetic resonance) as potential ligands for use in matrix metalloproteinase inhibitors. The [(Tp(Ph,Me))Zn(ZBG)] complexes show that hydrogen bonding and donor atom acidity have a pronounced effect on the mode of binding for this series of ligands. The results of these studies give valuable insight into how ligand protonation state and intramolecular hydrogen bonds can influence the coordination mode of metal-binding proteinase inhibitors. The findings here suggest that model-based approaches can be used to augment drug discovery methods applied to metalloproteins and can aid second-generation drug design.

  12. A Biofilm Matrix-Associated Protease Inhibitor Protects Pseudomonas aeruginosa from Proteolytic Attack.

    Science.gov (United States)

    Tseng, Boo Shan; Reichhardt, Courtney; Merrihew, Gennifer E; Araujo-Hernandez, Sophia A; Harrison, Joe J; MacCoss, Michael J; Parsek, Matthew R

    2018-04-10

    Pseudomonas aeruginosa produces an extracellular biofilm matrix that consists of nucleic acids, exopolysaccharides, lipid vesicles, and proteins. In general, the protein component of the biofilm matrix is poorly defined and understudied relative to the other major matrix constituents. While matrix proteins have been suggested to provide many functions to the biofilm, only proteins that play a structural role have been characterized thus far. Here we identify proteins enriched in the matrix of P. aeruginosa biofilms. We then focused on a candidate matrix protein, the serine protease inhibitor ecotin (PA2755). This protein is able to inhibit neutrophil elastase, a bactericidal enzyme produced by the host immune system during P. aeruginosa biofilm infections. We show that ecotin binds to the key biofilm matrix exopolysaccharide Psl and that it can inhibit neutrophil elastase when associated with Psl. Finally, we show that ecotin protects both planktonic and biofilm P. aeruginosa cells from neutrophil elastase-mediated killing. This may represent a novel mechanism of protection for biofilms to increase their tolerance against the innate immune response. IMPORTANCE Proteins associated with the extracellular matrix of bacterial aggregates called biofilms have long been suggested to provide many important functions to the community. To date, however, only proteins that provide structural roles have been described, and few matrix-associated proteins have been identified. We developed a method to identify matrix proteins and characterized one. We show that this protein, when associated with the biofilm matrix, can inhibit a bactericidal enzyme produced by the immune system during infection and protect biofilm cells from death induced by the enzyme. This may represent a novel mechanism of protection for biofilms, further increasing their tolerance against the immune response. Together, our results are the first to show a nonstructural function for a confirmed matrix

  13. Geographical constraints to range-based attacks on links in complex networks

    International Nuclear Information System (INIS)

    Gong Baihua; Liu Jun; Huang Liang; Yang Kongqing; Yang Lei

    2008-01-01

    In this paper, we studied range-based attacks on links in geographically constrained scale-free networks and found that there is a continuous switching of roles of short- and long-range attacks on links when tuning the geographical constraint strength. Our results demonstrate that the geography has a significant impact on the network efficiency and security; thus one can adjust the geographical structure to optimize the robustness and the efficiency of the networks. We introduce a measurement of the impact of links on the efficiency of the network, and an effective attacking strategy is suggested

  14. A Framework For Analyzing And Mitigating The Vulnerabilities Of Complex Systems Via Attack And Protection Trees

    National Research Council Canada - National Science Library

    Edge, Kenneth S

    2007-01-01

    .... Attack trees by themselves do not provide enough decision support to system defenders. This research develops the concept of using protection trees to offer a detailed risk analysis of a system...

  15. Membrane attack complex of complement is not essential for immune mediated demyelination in experimental autoimmune neuritis.

    Science.gov (United States)

    Tran, Giang T; Hodgkinson, Suzanne J; Carter, Nicole M; Killingsworth, Murray; Nomura, Masaru; Verma, Nirupama D; Plain, Karren M; Boyd, Rochelle; Hall, Bruce M

    2010-12-15

    Antibody deposition and complement activation, especially membrane attack complex (MAC) formation are considered central for immune mediated demyelination. To examine the role of MAC in immune mediated demyelination, we studied experimental allergic neuritis (EAN) in Lewis rats deficient in complement component 6 (C6) that cannot form MAC. A C6 deficient Lewis (Lewis/C6-) strain of rats was bred by backcrossing the defective C6 gene, from PVG/C6- rats, onto the Lewis background. Lewis/C6- rats had the same C6 gene deletion as PVG/C6- rats and their sera did not support immune mediated haemolysis unless C6 was added. Active EAN was induced in Lewis and Lewis/C6- rats by immunization with bovine peripheral nerve myelin in complete Freund's adjuvant (CFA), and Lewis/C6- rats had delayed clinical EAN compared to the Lewis rats. Peripheral nerve demyelination in Lewis/C6- was also delayed but was similar in extent at the peak of disease. Compared to Lewis, Lewis/C6- nerves had no MAC deposition, reduced macrophage infiltrate and IL-17A, but similar T cell infiltrate and Th1 cytokine mRNA expression. ICAM-1 and P-selectin mRNA expression and immunostaining on vascular endothelium were delayed in Lewis C6- compared to Lewis rats' nerves. This study found that MAC was not required for immune mediated demyelination; but that MAC enhanced early symptoms and early demyelination in EAN, either by direct lysis or by sub-lytic induction of vascular endothelial expression of ICAM-1 and P-selectin. Copyright © 2010 Elsevier B.V. All rights reserved.

  16. Isotope-edited proton NMR study on the structure of a pepsin/inhibitor complex

    International Nuclear Information System (INIS)

    Fesik, S.W.; Luly, J.R.; Erickson, J.W.; Abad-Zapatero, C.

    1988-01-01

    A general approach is illustrated for providing detailed structural information on large enzyme/inhibitor complexes using NMR spectroscopy. The method involves the use of isotopically labeled ligands to simplify two-dimensional NOE spectra of large molecular complexes by isotope-editing techniques. With this approach, the backbone and side-chain conformations (at the P 2 and P 3 sites) of a tightly bound inhibitor of porcine pepsin have bene determined. In addition, structural information on the active site of pepsin has been obtained. Due to the sequence homology between porcine pepsin and human renin, this structural information may prove useful for modeling renin/inhibitor complexes with the ultimate goal of designing more effective renin inhibitors. Moreover, this general approach can be applied to study other biological systems of interest such as other enzyme/inhibitor complexes, ligands bound to soluble receptors, and enzyme/substrate interactions

  17. Solution structure of the Grb2 SH2 domain complexed with a high-affinity inhibitor

    International Nuclear Information System (INIS)

    Ogura, Kenji; Shiga, Takanori; Yokochi, Masashi; Yuzawa, Satoru; Burke, Terrence R.; Inagaki, Fuyuhiko

    2008-01-01

    The solution structure of the growth factor receptor-bound protein 2 (Grb2) SH2 domain complexed with a high-affinity inhibitor containing a non-phosphorus phosphate mimetic within a macrocyclic platform was determined by nuclear magnetic resonance (NMR) spectroscopy. Unambiguous assignments of the bound inhibitor and intermolecular NOEs between the Grb2 SH2 domain and the inhibitor was accomplished using perdeuterated Grb2 SH2 protein. The well-defined solution structure of the complex was obtained and compared to those by X-ray crystallography. Since the crystal structure of the Grb2 SH2 domain formed a domain-swapped dimer and several inhibitors were bound to a hinge region, there were appreciable differences between the solution and crystal structures. Based on the binding interactions between the inhibitor and the Grb2 SH2 domain in solution, we proposed a design of second-generation inhibitors that could be expected to have higher affinity

  18. Predator attack rate evolution in space: the role of ecology mediated by complex emergent spatial structure and self-shading.

    Science.gov (United States)

    Messinger, Susanna M; Ostling, Annette

    2013-11-01

    Predation interactions are an important element of ecological communities. Population spatial structure has been shown to influence predator evolution, resulting in the evolution of a reduced predator attack rate; however, the evolutionary role of traits governing predator and prey ecology is unknown. The evolutionary effect of spatial structure on a predator's attack rate has primarily been explored assuming a fixed metapopulation spatial structure, and understood in terms of group selection. But endogenously generated, emergent spatial structure is common in nature. Furthermore, the evolutionary influence of ecological traits may be mediated through the spatial self-structuring process. Drawing from theory on pathogens, the evolutionary effect of emergent spatial structure can be understood in terms of self-shading, where a voracious predator limits its long-term invasion potential by reducing local prey availability. Here we formalize the effects of self-shading for predators using spatial moment equations. Then, through simulations, we show that in a spatial context self-shading leads to relationships between predator-prey ecology and the predator's attack rate that are not expected in a non-spatial context. Some relationships are analogous to relationships already shown for host-pathogen interactions, but others represent new trait dimensions. Finally, since understanding the effects of ecology using existing self-shading theory requires simplifications of the emergent spatial structure that do not apply well here, we also develop metrics describing the complex spatial structure of the predator and prey populations to help us explain the evolutionary effect of predator and prey ecology in the context of self-shading. The identification of these metrics may provide a step towards expansion of the predictive domain of self-shading theory to more complex spatial dynamics. Copyright © 2013 Elsevier Inc. All rights reserved.

  19. Structure of a membrane-attack complex/perforin (MACPF) family protein from the human gut symbiont Bacteroides thetaiotaomicron

    International Nuclear Information System (INIS)

    Xu, Qingping; Abdubek, Polat; Astakhova, Tamara; Axelrod, Herbert L.; Bakolitsa, Constantina; Cai, Xiaohui; Carlton, Dennis; Chen, Connie; Chiu, Hsiu-Ju; Clayton, Thomas; Das, Debanu; Deller, Marc C.; Duan, Lian; Ellrott, Kyle; Farr, Carol L.; Feuerhelm, Julie; Grant, Joanna C.; Grzechnik, Anna; Han, Gye Won; Jaroszewski, Lukasz; Jin, Kevin K.; Klock, Heath E.; Knuth, Mark W.; Kozbial, Piotr; Krishna, S. Sri; Kumar, Abhinav; Lam, Winnie W.; Marciano, David; Miller, Mitchell D.; Morse, Andrew T.; Nigoghossian, Edward; Nopakun, Amanda; Okach, Linda; Puckett, Christina; Reyes, Ron; Tien, Henry J.; Trame, Christine B.; Bedem, Henry van den; Weekes, Dana; Wooten, Tiffany; Yeh, Andrew; Zhou, Jiadong; Hodgson, Keith O.; Wooley, John; Elsliger, Marc-André; Deacon, Ashley M.; Godzik, Adam; Lesley, Scott A.; Wilson, Ian A.

    2010-01-01

    The crystal structure of a novel MACPF protein, which may play a role in the adaptation of commensal bacteria to host environments in the human gut, was determined and analyzed. Membrane-attack complex/perforin (MACPF) proteins are transmembrane pore-forming proteins that are important in both human immunity and the virulence of pathogens. Bacterial MACPFs are found in diverse bacterial species, including most human gut-associated Bacteroides species. The crystal structure of a bacterial MACPF-domain-containing protein BT-3439 (Bth-MACPF) from B. thetaiotaomicron, a predominant member of the mammalian intestinal microbiota, has been determined. Bth-MACPF contains a membrane-attack complex/perforin (MACPF) domain and two novel C-terminal domains that resemble ribonuclease H and interleukin 8, respectively. The entire protein adopts a flat crescent shape, characteristic of other MACPF proteins, that may be important for oligomerization. This Bth-MACPF structure provides new features and insights not observed in two previous MACPF structures. Genomic context analysis infers that Bth-MACPF may be involved in a novel protein-transport or nutrient-uptake system, suggesting an important role for these MACPF proteins, which were likely to have been inherited from eukaryotes via horizontal gene transfer, in the adaptation of commensal bacteria to the host environment

  20. Inhibitors

    Science.gov (United States)

    ... JM, and the Hemophilia Inhibitor Research Study Investigators. Validation of Nijmegen-Bethesda assay modifications to allow inhibitor ... webinars on blood disorders Language: English (US) Español (Spanish) File Formats Help: How do I view different ...

  1. Performance Analysis with Network-Enhanced Complexities: On Fading Measurements, Event-Triggered Mechanisms, and Cyber Attacks

    Directory of Open Access Journals (Sweden)

    Derui Ding

    2014-01-01

    Full Text Available Nowadays, the real-world systems are usually subject to various complexities such as parameter uncertainties, time-delays, and nonlinear disturbances. For networked systems, especially large-scale systems such as multiagent systems and systems over sensor networks, the complexities are inevitably enhanced in terms of their degrees or intensities because of the usage of the communication networks. Therefore, it would be interesting to (1 examine how this kind of network-enhanced complexities affects the control or filtering performance; and (2 develop some suitable approaches for controller/filter design problems. In this paper, we aim to survey some recent advances on the performance analysis and synthesis with three sorts of fashionable network-enhanced complexities, namely, fading measurements, event-triggered mechanisms, and attack behaviors of adversaries. First, these three kinds of complexities are introduced in detail according to their engineering backgrounds, dynamical characteristic, and modelling techniques. Then, the developments of the performance analysis and synthesis issues for various networked systems are systematically reviewed. Furthermore, some challenges are illustrated by using a thorough literature review and some possible future research directions are highlighted.

  2. Hydrogen exchange kinetics changes upon formation of the soybean trypsin inhibitor: trypsin complex

    International Nuclear Information System (INIS)

    Woodward, C.K.; Ellis, L.M.

    1975-01-01

    The hydrogen exchange kinetics of the complex of trypsin--soybean trypsin inhibitor (Kunitz) have been compared to the calculated sum of the exchange kinetics for the inhibitor and trypsin measured separately. The exchange rates observed for the complex are substantially less than the sum of the exchange rates in the two individual proteins. These results cannot be accounted for by changes in intermolecular or intramolecular hydrogen bonding. The decrease in exchange rates in the complex are ascribed to changes in solvent accessibility in the component proteins. (U.S.)

  3. Crystal structure of a complex of human chymase with its benzimidazole derived inhibitor

    International Nuclear Information System (INIS)

    Matsumoto, Yoshiyuki; Kakuda, Shinji; Koizumi, Masahiro; Mizuno, Tsuyoshi; Muroga, Yumiko; Kawamura, Takashi; Takimoto-Kamimura, Midori

    2013-01-01

    The crystal structure of human chymase complexed with a novel benzimidazole inhibitor, TJK002, was determined at 2.8 Å resolution. The present study shows that the benzimidazole ring of the inhibitor takes the stable stacking interaction with the protonated His57 in the catalytic domain of human chymase. The crystal structure of human chymase complexed with a novel benzimidazole inhibitor, TJK002, was determined at 2.8 Å resolution. The X-ray crystallographic study shows that the benzimidazole inhibitor forms a non-covalent interaction with the catalytic domain of human chymase. The hydrophobic fragment of the inhibitor occupies the S1 pocket. The carboxylic acid group of the inhibitor forms hydrogen bonds with the imidazole N(∊) atom of His57 and/or the O(γ) atom of Ser195 which are members of the catalytic triad. This imidazole ring of His57 induces π–π stacking to the benzene ring of the benzimidazole scaffold as P2 moiety. Fragment molecular orbital calculation of the atomic coordinates by X-ray crystallography shows that this imidazole ring of His57 could be protonated with the carboxyl group of Asp102 or hydroxyl group of Ser195 and the stacking interaction is stabilized. A new drug design strategy is proposed where the stacking to the protonated imidazole of the drug target protein with the benzimidazole scaffold inhibitor causes unpredicted potent inhibitory activity for some enzymes

  4. Efficient reconfigurable hardware architecture for accurately computing success probability and data complexity of linear attacks

    DEFF Research Database (Denmark)

    Bogdanov, Andrey; Kavun, Elif Bilge; Tischhauser, Elmar

    2012-01-01

    An accurate estimation of the success probability and data complexity of linear cryptanalysis is a fundamental question in symmetric cryptography. In this paper, we propose an efficient reconfigurable hardware architecture to compute the success probability and data complexity of Matsui's Algorithm...... block lengths ensures that any empirical observations are not due to differences in statistical behavior for artificially small block lengths. Rather surprisingly, we observed in previous experiments a significant deviation between the theory and practice for Matsui's Algorithm 2 for larger block sizes...

  5. Structure of a retro-binding peptide inhibitor complexed with human alpha-thrombin.

    Science.gov (United States)

    Tabernero, L; Chang, C Y; Ohringer, S L; Lau, W F; Iwanowicz, E J; Han, W C; Wang, T C; Seiler, S M; Roberts, D G; Sack, J S

    1995-02-10

    The crystallographic structure of the ternary complex between human alpha-thrombin, hirugen and the peptidyl inhibitor Phe-alloThr-Phe-O-CH3, which is acylated at its N terminus with 4-guanidino butanoic acid (BMS-183507), has been determined at 2.6 A resolution. The structure reveals a unique "retro-binding" mode for this tripeptide active site inhibitor. The inhibitor binds with its alkyl-guanidine moiety in the primary specificity pocket and its two phenyl rings occupying the hydrophobic proximal and distal pockets of the thrombin active site. In this arrangement the backbone of the tripeptide forms a parallel beta-strand to the thrombin main-chain at the binding site. This is opposite to the orientation of the natural substrate, fibrinogen, and all the small active site-directed thrombin inhibitors whose bound structures have been previously reported. BMS-183507 is the first synthetic inhibitor proved to bind in a retro-binding fashion to thrombin, in a fashion similar to that of the N-terminal residues of the natural inhibitor hirudin. Furthermore, this new potent thrombin inhibitor (Ki = 17.2 nM) is selective for thrombin over other serine proteases tested and may be a template to be considered in designing hirudin-based thrombin inhibitors with interactions at the specificity pocket.

  6. DNA radiolysis in DNA-protein complex: a stochastic simulation of attack by hydroxyl radicals

    Czech Academy of Sciences Publication Activity Database

    Běgusová, Marie; Giliberto, S.; Gras, J.; Sy, D.; Charlier, M.; Spotheim Maurizot, M.

    2003-01-01

    Roč. 79, č. 6 (2003), s. 385-391 ISSN 0955-3002 R&D Projects: GA AV ČR IAA1048103 Institutional research plan: CEZ:AV0Z1048901 Keywords : radiolysis * DNA-protein complexes * hydroxyl radicals Subject RIV: BO - Biophysics Impact factor: 2.165, year: 2003

  7. Should anti-inhibitor coagulant complex and tranexamic acid be used concomitantly?

    Science.gov (United States)

    Valentino, L A; Holme, P A

    2015-11-01

    Inhibitor development in haemophilia patients is challenging especially when undergoing surgical procedures. The development of an inhibitor precludes using factor VIII (FVIII) therapy thereby requiring a bypassing agent (BPA) for surgical bleeding prophylaxis if the FVIII inhibitor titre >5 BU. Concomitant use of anti-inhibitor coagulant complex (AICC) and tranexamic acid has been reported in the literature as a beneficial treatment for this population. Anti-inhibitor coagulant complex is known to cause an increase in thrombin generation and tranexamic acid inhibits fibrinolysis. Hence, the combined used of AICC and tranexamic acid has been limited due to safety concerns over possibilities of increased risk of thrombotic events and disseminated intravascular coagulation. However, the rationale for concomitant therapy is to obtain a potential synergistic effect and to increase clot stability. We conducted a literature review of past studies and individual case reports of concomitant use of AICC and tranexamic acid, which was extensively used during dental procedures. Evidence also exists for concomitant use of the combined therapy in orthopaedic procedures, control of gastrointestinal bleeding, epistaxis and cerebral haemorrhages. Some patients who received the combined therapy had failed monotherapy with a single BPA prior to combined therapy. There were no reports of thrombotic complications related to the concomitant therapy and haemostasis was achieved in all cases. Anti-inhibitor coagulant complex and tranexamic acid therapy was found to be safe, well-tolerated and effective therapy in haemophilia patients with inhibitors. Additional randomized controlled studies should be performed to confirm these findings. © 2015 John Wiley & Sons Ltd.

  8. Subnanomolar Inhibitor of Cytochrome bc1 Complex Designed via Optimizing Interaction with Conformationally Flexible Residues

    Science.gov (United States)

    Zhao, Pei-Liang; Wang, Le; Zhu, Xiao-Lei; Huang, Xiaoqin; Zhan, Chang-Guo; Wu, Jia-Wei; Yang, Guang-Fu

    2009-01-01

    Cytochrome bc1 complex (EC 1.10.2.2, bc1), an essential component of the cellular respiratory chain and the photosynthetic apparatus in photosynthetic bacteria, has been identified as a promising target for new drugs and agricultural fungicides. X-ray diffraction structures of the free bc1 complex and its complexes with various inhibitors revealed that the phenyl group of Phe274 in the binding pocket exhibited significant conformational flexibility upon different inhibitors binding to optimize respective π-π interactions, whereas the side chains of other hydrophobic residues showed conformational stability. Therefore, in the present study, a strategy of optimizing the π-π interaction with conformationally flexible residues was proposed to design and discover new bc1 inhibitors with a higher potency. Eight new compounds were designed and synthesized, among which compound 5c with a Ki value of 570 pM was identified as the most promising drug or fungicide candidate, significantly more potent than the commercially available bc1 inhibitors including azoxystrobin (AZ), kresoxim-methyl (KM), and pyraclostrobin (PY). To our knowledge, this is the first bc1 inhibitor discovered from structure-based design with a potency of subnanomolar Ki value. For all of the compounds synthesized and assayed, the calculated binding free energies correlated reasonably well with the binding free energies derived from the experimental Ki values with a correlation coefficient of r2 = 0.89. The further inhibitory kinetics studies revealed that compound 5c is a non-competitive inhibitor with respect to substrate cytochrome c, but is a competitive inhibitor with respect to substrate ubiquinol. Due to its subnanomolar Ki potency and slow dissociation rate constant (k−0 = 0.00358 s−1), compound 5c could be used as a specific probe for further elucidation of the mechanism of bc1 function and as a new lead compound for future drug discovery. PMID:19928849

  9. Metabolic responses in Candida tropicalis to complex inhibitors during xylitol bioconversion.

    Science.gov (United States)

    Wang, Shizeng; Li, Hao; Fan, Xiaoguang; Zhang, Jingkun; Tang, Pingwah; Yuan, Qipeng

    2015-09-01

    During xylitol fermentation, Candida tropicalis is often inhibited by inhibitors in hemicellulose hydrolysate. The mechanisms involved in the metabolic responses to inhibitor stress and the resistances to inhibitors are still not clear. To understand the inhibition mechanisms and the metabolic responses to inhibitors, a GC/MS-based metabolomics approach was performed on C. tropicalis treated with and without complex inhibitors (CI, including furfural, phenol and acetic acid). Partial least squares discriminant analysis was used to determine the metabolic variability between CI-treated groups and control groups, and 25 metabolites were identified as possible entities responsible for the discrimination caused by inhibitors. We found that xylose uptake rate and xylitol oxidation rate were promoted by CI treatment. Metabolomics analysis showed that the flux from xylulose to pentose phosphate pathway increased, and tricarboxylic acid cycle was disturbed by CI. Moreover, the changes in levels of 1,3-propanediol, trehalose, saturated fatty acids and amino acids showed different mechanisms involved in metabolic responses to inhibitor stress. The increase of 1,3-propanediol was considered to be correlated with regulating redox balance and osmoregulation. The increase of trehalose might play a role in protein stabilization and cellular membranes protection. Saturated fatty acids could cause the decrease of membrane fluidity and make the plasma membrane rigid to maintain the integrity of plasma membrane. The deeper understanding of the inhibition mechanisms and the metabolic responses to inhibitors will provide us with more information on the metabolism regulation during xylitol bioconversion and the construction of industrial strains with inhibitor tolerance for better utilization of bioresource. Copyright © 2015 Elsevier Inc. All rights reserved.

  10. Binding of the respiratory chain inhibitor ametoctradin to the mitochondrial bc1 complex.

    Science.gov (United States)

    Fehr, Marcus; Wolf, Antje; Stammler, Gerd

    2016-03-01

    Ametoctradin is an agricultural fungicide that inhibits the mitochondrial bc1 complex of oomycetes. The bc1 complex has two quinone binding sites that can be addressed by inhibitors. Depending on their binding sites and binding modes, the inhibitors show different degrees of cross-resistance that need to be considered when designing spray programmes for agricultural fungicides. The binding site of ametoctradin was unknown. Cross-resistance analyses, the reduction of isolated Pythium sp. bc1 complex in the presence of different inhibitors and molecular modelling studies were used to analyse the binding site and binding mode of ametoctradin. All three approaches provide data supporting the argument that ametoctradin binds to the Pythium bc1 complex similarly to stigmatellin. The binding mode of ametoctradin differs from other agricultural fungicides such as cyazofamid and the strobilurins. This explains the lack of cross-resistance with strobilurins and related inhibitors, where resistance is mainly caused by G143A amino acid exchange. Accordingly, mixtures or alternating applications of these fungicides and ametoctradin can help to minimise the risk of the emergence of new resistant isolates. © 2015 Society of Chemical Industry.

  11. Soluble form of membrane attack complex independently predicts mortality and cardiovascular events in patients with ST-elevation myocardial infarction treated with primary percutaneous coronary intervention

    DEFF Research Database (Denmark)

    Lindberg, Søren; Pedersen, Sune H; Mogelvang, Rasmus

    2012-01-01

    The complement system is an important mediator of inflammation, which plays a pivotal role in atherosclerosis and acute myocardial infarction (AMI). Animal studies suggest that activation of the complement cascade resulting in the formation of soluble membrane attack complex (sMAC), contributes...

  12. Complement activation and formation of the membrane attack complex on serogroup B Neisseria meningitidis in the presence or absence of serum bactericidal activity

    NARCIS (Netherlands)

    Drogari-Apiranthitou, M.; Kuijper, E. J.; Dekker, N. [=Nick; Dankert, J.

    2002-01-01

    Encapsulated meningococci are complement sensitive only in the presence of bactericidal antibodies by yet-unexplored mechanisms. The objective of this study was to investigate the involvement of major bacterial surface constituents on complement activation and membrane attack complex (MAC) formation

  13. CR2-mediated activation of the complement alternative pathway results in formation of membrane attack complexes on human B lymphocytes

    DEFF Research Database (Denmark)

    Nielsen, C H; Marquart, H V; Prodinger, W M

    2001-01-01

    of the CR1 binding site with the monoclonal antibody 3D9 also resulted in a minor reduction in MAC deposition, while FE8 and 3D9, in combination, markedly reduced deposition of both C3 fragments (91 +/- 5%) and C9 (95 +/- 3%). The kinetics of C3-fragment and MAC deposition, as well as the dependence of both......Normal human B lymphocytes activate the alternative pathway of complement via complement receptor type 2 (CR2, CD21), that binds hydrolysed C3 (iC3) and thereby promotes the formation of a membrane-bound C3 convertase. We have investigated whether this might lead to the generation of a C5...... convertase and consequent formation of membrane attack complexes (MAC). Deposition of C3 fragments and MAC was assessed on human peripheral B lymphocytes in the presence of 30% autologous serum containing 4.4 mM MgCl2/20 mM EGTA, which abrogates the classical pathway of complement without affecting...

  14. Plants under dual attack

    NARCIS (Netherlands)

    Ponzio, C.A.M.

    2016-01-01

    Though immobile, plants are members of complex environments, and are under constant threat from a wide range of attackers, which includes organisms such as insect herbivores or plant pathogens. Plants have developed sophisticated defenses against these attackers, and include chemical responses

  15. Crystal Structure of Feline Infectious Peritonitis Virus Main Protease in Complex with Synergetic Dual Inhibitors.

    Science.gov (United States)

    Wang, Fenghua; Chen, Cheng; Liu, Xuemeng; Yang, Kailin; Xu, Xiaoling; Yang, Haitao

    2016-02-15

    Coronaviruses (CoVs) can cause highly prevalent diseases in humans and animals. Feline infectious peritonitis virus (FIPV) belongs to the genus Alphacoronavirus, resulting in a lethal systemic granulomatous disease called feline infectious peritonitis (FIP), which is one of the most important fatal infectious diseases of cats worldwide. No specific vaccines or drugs have been approved to treat FIP. CoV main proteases (M(pro)s) play a pivotal role in viral transcription and replication, making them an ideal target for drug development. Here, we report the crystal structure of FIPV M(pro) in complex with dual inhibitors, a zinc ion and a Michael acceptor. The complex structure elaborates a unique mechanism of two distinct inhibitors synergizing to inactivate the protease, providing a structural basis to design novel antivirals and suggesting the potential to take advantage of zinc as an adjunct therapy against CoV-associated diseases. Coronaviruses (CoVs) have the largest genome size among all RNA viruses. CoV infection causes various diseases in humans and animals, including severe acute respiratory syndrome (SARS) and Middle East respiratory syndrome (MERS). No approved specific drugs or vaccinations are available to treat their infections. Here, we report a novel dual inhibition mechanism targeting CoV main protease (M(pro)) from feline infectious peritonitis virus (FIPV), which leads to lethal systemic granulomatous disease in cats. M(pro), conserved across all CoV genomes, is essential for viral replication and transcription. We demonstrated that zinc ion and a Michael acceptor-based peptidomimetic inhibitor synergistically inactivate FIPV M(pro). We also solved the structure of FIPV M(pro) complexed with two inhibitors, delineating the structural view of a dual inhibition mechanism. Our study provides new insight into the pharmaceutical strategy against CoV M(pro) through using zinc as an adjuvant therapy to enhance the efficacy of an irreversible

  16. Computational discovery of picomolar Q(o) site inhibitors of cytochrome bc1 complex.

    Science.gov (United States)

    Hao, Ge-Fei; Wang, Fu; Li, Hui; Zhu, Xiao-Lei; Yang, Wen-Chao; Huang, Li-Shar; Wu, Jia-Wei; Berry, Edward A; Yang, Guang-Fu

    2012-07-11

    A critical challenge to the fragment-based drug discovery (FBDD) is its low-throughput nature due to the necessity of biophysical method-based fragment screening. Herein, a method of pharmacophore-linked fragment virtual screening (PFVS) was successfully developed. Its application yielded the first picomolar-range Q(o) site inhibitors of the cytochrome bc(1) complex, an important membrane protein for drug and fungicide discovery. Compared with the original hit compound 4 (K(i) = 881.80 nM, porcine bc(1)), the most potent compound 4f displayed 20 507-fold improved binding affinity (K(i) = 43.00 pM). Compound 4f was proved to be a noncompetitive inhibitor with respect to the substrate cytochrome c, but a competitive inhibitor with respect to the substrate ubiquinol. Additionally, we determined the crystal structure of compound 4e (K(i) = 83.00 pM) bound to the chicken bc(1) at 2.70 Å resolution, providing a molecular basis for understanding its ultrapotency. To our knowledge, this study is the first application of the FBDD method in the discovery of picomolar inhibitors of a membrane protein. This work demonstrates that the novel PFVS approach is a high-throughput drug discovery method, independent of biophysical screening techniques.

  17. Molecular dynamics of conformation-specific dopamine transporter-inhibitor complexes.

    Science.gov (United States)

    Jean, Bernandie; Surratt, Christopher K; Madura, Jeffry D

    2017-09-01

    The recreational psychostimulant cocaine inhibits dopamine reuptake from the synapse, resulting in excessive stimulation of postsynaptic dopamine receptors in brain areas associated with reward and addiction. Cocaine binds to and stabilizes the outward- (extracellular-) facing conformation of the dopamine transporter (DAT) protein, while the low abuse potential DAT inhibitor benztropine prefers the inward- (cytoplasmic-) facing conformation. A correlation has been previously postulated between psychostimulant abuse potential and preference for the outward-facing DAT conformation. The 3β-aryltropane cocaine analogs LX10 and LX11, however, differ only in stereochemistry and share a preference for the outward-facing DAT, yet are reported to vary widely in abuse potential in an animal model. In search of the molecular basis for DAT conformation preference, complexes of cocaine, benztropine, LX10 or LX11 bound to each DAT conformation were subjected to 100ns of all-atom molecular dynamics simulation. Results were consistent with previous findings from cysteine accessibility assays used to assess an inhibitor's DAT conformation preference. The respective 2β- and 2α-substituted phenyltropanes of LX10 and LX11 interacted with hydrophobic regions of the DAT S1 binding site that were inaccessible to cocaine. Solvent accessibility measurements also revealed subtle differences in inhibitor positioning within a given DAT conformation. This work serves to advance our understanding of the conformational selectivity of DAT inhibitors and suggests that MD may be useful in antipsychostimulant therapeutic design. Copyright © 2017 Elsevier Inc. All rights reserved.

  18. Structures of human Golgi-resident glutaminyl cyclase and its complexes with inhibitors reveal a large loop movement upon inhibitor binding.

    Science.gov (United States)

    Huang, Kai-Fa; Liaw, Su-Sen; Huang, Wei-Lin; Chia, Cho-Yun; Lo, Yan-Chung; Chen, Yi-Ling; Wang, Andrew H-J

    2011-04-08

    Aberrant pyroglutamate formation at the N terminus of certain peptides and proteins, catalyzed by glutaminyl cyclases (QCs), is linked to some pathological conditions, such as Alzheimer disease. Recently, a glutaminyl cyclase (QC) inhibitor, PBD150, was shown to be able to reduce the deposition of pyroglutamate-modified amyloid-β peptides in brain of transgenic mouse models of Alzheimer disease, leading to a significant improvement of learning and memory in those transgenic animals. Here, we report the 1.05-1.40 Å resolution structures, solved by the sulfur single-wavelength anomalous dispersion phasing method, of the Golgi-luminal catalytic domain of the recently identified Golgi-resident QC (gQC) and its complex with PBD150. We also describe the high-resolution structures of secretory QC (sQC)-PBD150 complex and two other gQC-inhibitor complexes. gQC structure has a scaffold similar to that of sQC but with a relatively wider and negatively charged active site, suggesting a distinct substrate specificity from sQC. Upon binding to PBD150, a large loop movement in gQC allows the inhibitor to be tightly held in its active site primarily by hydrophobic interactions. Further comparisons of the inhibitor-bound structures revealed distinct interactions of the inhibitors with gQC and sQC, which are consistent with the results from our inhibitor assays reported here. Because gQC and sQC may play different biological roles in vivo, the different inhibitor binding modes allow the design of specific inhibitors toward gQC and sQC.

  19. Structural characterization of human heme oxygenase-1 in complex with azole-based inhibitors.

    Science.gov (United States)

    Rahman, Mona N; Vlahakis, Jason Z; Roman, Gheorghe; Vukomanovic, Dragic; Szarek, Walter A; Nakatsu, Kanji; Jia, Zongchao

    2010-03-01

    The development of inhibitors specific for heme oxygenases (HO) aims to provide powerful tools in understanding the HO system. Based on the lead structure (2S, 4S)-2-[2-(4-chlorophenyl)ethyl]-2-[(1H-imidazol-1-yl)methyl]-4-[((4-aminophenyl)thio)methyl]-1,3-dioxolane (azalanstat, QC-1) we have synthesized structural modifications to develop novel and selective HO inhibitors. The structural study of human HO-1 (hHO-1) in complex with a select group of the inhibitors was initiated using X-ray crystallographic techniques. Comparison of the structures of four such compounds each in complex with hHO-1 revealed a common binding mode, despite having different structural fragments. The compounds bind to the distal side of heme through an azole "anchor" which coordinates with the heme iron. An expansion of the distal pocket, mainly due to distal helix flexibility, allows accommodation of the compounds without displacing heme or the critical Asp140 residue. Rather, binding displaces a catalytically critical water molecule and disrupts an ordered hydrogen-bond network involving Asp140. The presence of a triazole "anchor" may provide further stability via a hydrogen bond with the protein. A hydrophobic pocket acts to stabilize the region occupied by the phenyl or adamantanyl moieties of these compounds. Further, a secondary hydrophobic pocket is formed via "induced fit" to accommodate bulky substituents at the 4-position of the dioxolane ring. Copyright 2009 Elsevier Inc. All rights reserved.

  20. The effect of MRN complex and ATM kinase inhibitors on Zebrafish embryonic development

    Science.gov (United States)

    Kumaran, Malina; Fazry, Shazrul

    2018-04-01

    Zebrafish is an ideal animal model to study developmental biology due to its transparent embryos and rapid development stages of embryogenesis. Here we investigate the role of DNA damage proteins, specifically Mre11/Rad50/NBN (MRN) complex and ataxia-telangiectasia mutated (ATM) kinase during embryogenesis by inhibiting its function using specific MRN complex (Mirin) and ATM Kinase inhibitors (Ku60019 and Ku55933). Zebrafish embryos at midblastula transition (MBT) stage are treated with Mirin, Ku60019 and Ku55933. The embryonic development of the embryos was monitored at 24 hours-post fertilisation (hpf), 48 hpf and 72 hpf. We observed that at the lowest concentrations (3 µM of Mirin, 1.5 nM of Ku60019 and 3 nM of Ku55933), the inhibitors treated embryos have 100% survivability. However, with increasing inhibitor concentration, the survivability drops. Control or mock treatment of all embryos shows 100 % survivability rate. This study suggests that DNA damage repair proteins may be crucial for normal zebrafish embryo development and survival.

  1. DNA-directed control of enzyme-inhibitor complex formation: a modular approach to reversibly switch enzyme activity

    NARCIS (Netherlands)

    Janssen, B.M.G.; Engelen, W.; Merkx, M.

    2015-01-01

    DNA-templated reversible assembly of an enzyme–inhibitor complex is presented as a new and highly modular approach to control enzyme activity. TEM1-ß-lactamase and its inhibitor protein BLIP were conjugated to different oligonucleotides, resulting in enzyme inhibition in the presence of template

  2. Crystal structures of Mycobacterium tuberculosis GlgE and complexes with non-covalent inhibitors

    Energy Technology Data Exchange (ETDEWEB)

    Lindenberger, Jared J.; Veleti, Sri Kumar; Wilson, Brittney N.; Sucheck, Steven J.; Ronning, Donald R. (Toledo)

    2015-08-06

    GlgE is a bacterial maltosyltransferase that catalyzes the elongation of a cytosolic, branched α-glucan. In Mycobacterium tuberculosis (M. tb), inactivation of GlgE (Mtb GlgE) results in the rapid death of the organism due to a toxic accumulation of the maltosyl donor, maltose-1-phosphate (M1P), suggesting that GlgE is an intriguing target for inhibitor design. In this study, the crystal structures of the Mtb GlgE in a binary complex with maltose and a ternary complex with maltose and a maltosyl-acceptor molecule, maltohexaose, were solved to 3.3 Å and 4.0 Å, respectively. The maltohexaose structure reveals a dominant site for α-glucan binding. To obtain more detailed interactions between first generation, non-covalent inhibitors and GlgE, a variant Streptomyces coelicolor GlgEI (Sco GlgEI-V279S) was made to better emulate the Mtb GlgE M1P binding site. The structure of Sco GlgEI-V279S complexed with α-maltose-C-phosphonate (MCP), a non-hydrolyzable substrate analogue, was solved to 1.9 Å resolution, and the structure of Sco GlgEI-V279S complexed with 2,5-dideoxy-3-O-α-D-glucopyranosyl-2,5-imino-D-mannitol (DDGIM), an oxocarbenium mimic, was solved to 2.5 Å resolution. These structures detail important interactions that contribute to the inhibitory activity of these compounds, and provide information on future designs that may be exploited to improve upon these first generation GlgE inhibitors.

  3. Attack surfaces

    DEFF Research Database (Denmark)

    Gruschka, Nils; Jensen, Meiko

    2010-01-01

    The new paradigm of cloud computing poses severe security risks to its adopters. In order to cope with these risks, appropriate taxonomies and classification criteria for attacks on cloud computing are required. In this work-in-progress paper we present one such taxonomy based on the notion...... of attack surfaces of the cloud computing scenario participants....

  4. Crystal structure of NTPDase2 in complex with the sulfoanthraquinone inhibitor PSB-071.

    Science.gov (United States)

    Zebisch, Matthias; Baqi, Younis; Schäfer, Petra; Müller, Christa E; Sträter, Norbert

    2014-03-01

    In many vertebrate tissues CD39-like ecto-nucleoside triphosphate diphosphohydrolases (NTPDases) act in concert with ecto-5'-nucleotidase (e5NT, CD73) to convert extracellular ATP to adenosine. Extracellular ATP is a cytotoxic, pro-inflammatory signalling molecule whereas its product adenosine constitutes a universal and potent immune suppressor. Interference with these ectonucleotidases by use of small molecule inhibitors or inhibitory antibodies appears to be an effective strategy to enhance anti-tumour immunity and suppress neoangiogenesis. Here we present the first crystal structures of an NTPDase catalytic ectodomain in complex with the Reactive Blue 2 (RB2)-derived inhibitor PSB-071. In both of the two crystal forms presented the inhibitor binds as a sandwich of two molecules at the nucleoside binding site. One of the molecules is well defined in its orientation. Specific hydrogen bonds are formed between the sulfonyl group and the nucleoside binding loop. The methylphenyl side chain functionality that improved NTPDase2-specificity is sandwiched between R245 and R394, the latter of which is exclusively found in NTPDase2. The second molecule exhibits great in-plane rotational freedom and could not be modelled in a specific orientation. In addition to this structural insight into NTPDase inhibition, the observation of the putative membrane interaction loop (MIL) in two different conformations related by a 10° rotation identifies the MIL as a dynamic section of NTPDases that is potentially involved in regulation of catalysis. Copyright © 2014 Elsevier Inc. All rights reserved.

  5. Crystal structure of glucose isomerase in complex with xylitol inhibitor in one metal binding mode.

    Science.gov (United States)

    Bae, Ji-Eun; Kim, In Jung; Nam, Ki Hyun

    2017-11-04

    Glucose isomerase (GI) is an intramolecular oxidoreductase that interconverts aldoses and ketoses. These characteristics are widely used in the food, detergent, and pharmaceutical industries. In order to obtain an efficient GI, identification of novel GI genes and substrate binding/inhibition have been studied. Xylitol is a well-known inhibitor of GI. In Streptomyces rubiginosus, two crystal structures have been reported for GI in complex with xylitol inhibitor. However, a structural comparison showed that xylitol can have variable conformation at the substrate binding site, e.g., a nonspecific binding mode. In this study, we report the crystal structure of S. rubiginosus GI in a complex with xylitol and glycerol. Our crystal structure showed one metal binding mode in GI, which we presumed to represent the inactive form of the GI. The metal ion was found only at the M1 site, which was involved in substrate binding, and was not present at the M2 site, which was involved in catalytic function. The O 2 and O 4 atoms of xylitol molecules contributed to the stable octahedral coordination of the metal in M1. Although there was no metal at the M2 site, no large conformational change was observed for the conserved residues coordinating M2. Our structural analysis showed that the metal at the M2 site was not important when a xylitol inhibitor was bound to the M1 site in GI. Thus, these findings provided important information for elucidation or engineering of GI functions. Copyright © 2017 Elsevier Inc. All rights reserved.

  6. The EED protein–protein interaction inhibitor A-395 inactivates the PRC2 complex

    Energy Technology Data Exchange (ETDEWEB)

    He, Yupeng; Selvaraju, Sujatha; Curtin, Michael L.; Jakob, Clarissa G.; Zhu, Haizhong; Comess, Kenneth M.; Shaw, Bailin; The, Juliana; Lima-Fernandes, Evelyne; Szewczyk, Magdalena M.; Cheng, Dong; Klinge, Kelly L.; Li, Huan-Qiu; Pliushchev, Marina; Algire, Mikkel A.; Maag, David; Guo, Jun; Dietrich, Justin; Panchal, Sanjay C.; Petros, Andrew M.; Sweis, Ramzi F.; Torrent, Maricel; Bigelow, Lance J.; Senisterra, Guillermo; Li, Fengling; Kennedy, Steven; Wu, Qin; Osterling, Donald J.; Lindley, David J.; Gao, Wenqing; Galasinski, Scott; Barsyte-Lovejoy, Dalia; Vedadi, Masoud; Buchanan, Fritz G.; Arrowsmith, Cheryl H.; Chiang, Gary G.; Sun, Chaohong; Pappano , William N. (AbbVie); (Toronto)

    2017-01-30

    Polycomb repressive complex 2 (PRC2) is a regulator of epigenetic states required for development and homeostasis. PRC2 trimethylates histone H3 at lysine 27 (H3K27me3), which leads to gene silencing, and is dysregulated in many cancers. The embryonic ectoderm development (EED) protein is an essential subunit of PRC2 that has both a scaffolding function and an H3K27me3-binding function. Here we report the identification of A-395, a potent antagonist of the H3K27me3 binding functions of EED. Structural studies demonstrate that A-395 binds to EED in the H3K27me3-binding pocket, thereby preventing allosteric activation of the catalytic activity of PRC2. Phenotypic effects observed in vitro and in vivo are similar to those of known PRC2 enzymatic inhibitors; however, A-395 retains potent activity against cell lines resistant to the catalytic inhibitors. A-395 represents a first-in-class antagonist of PRC2 protein–protein interactions (PPI) for use as a chemical probe to investigate the roles of EED-containing protein complexes.

  7. Heart Attack

    Science.gov (United States)

    ... properly causes your body's blood sugar levels to rise, increasing your risk of heart attack. Metabolic syndrome. This occurs when you have obesity, high blood pressure and high blood sugar. Having metabolic ...

  8. Heart Attack

    Science.gov (United States)

    ... family history of heart attack race – African Americans, Mexican Americans, Native Americans, and native Hawaiians are at ... Your doctor will prescribe the medicines that are right for you. If you have had a heart ...

  9. Distribution of nuclease attack sites and complexity of DNA in the products of post-irradiation degradiation of rat thymus chromatin

    International Nuclear Information System (INIS)

    Zvonareva, N.B.; Zhivotovsky, B.D.; Hanson, K.P.

    1983-01-01

    The distribution of nuclease attack sites in chromatin has been studied on the basis of the quantitative relationship of the single- and double-stranded fragments of various lengths in the products of post-irradiation degradation of chromatin (PDN). It has been shown that in irradiated thymocytes internucleosome degradation of chromatin occurs and the products of the enzymic digestion of chromatin derive from randomly distributed genome areas accumulate. Analysis of the reassociation curves has not shown any differences in the complexity of the PDN fractions and total DNA. (author)

  10. Using an ontology for network attack planning

    CSIR Research Space (South Africa)

    Van Heerden, R

    2016-09-01

    Full Text Available The modern complexity of network attacks and their counter-measures (cyber operations) requires detailed planning. This paper presents a Network Attack Planning ontology which is aimed at providing support for planning such network operations within...

  11. Overexpression of the PAP1 transcription factor reveals a complex regulation of flavonoid and phenylpropanoid metabolism in Nicotiana tabacum plants attacked by Spodoptera litura.

    Science.gov (United States)

    Mitsunami, Tomoko; Nishihara, Masahiro; Galis, Ivan; Alamgir, Kabir Md; Hojo, Yuko; Fujita, Kohei; Sasaki, Nobuhiro; Nemoto, Keichiro; Sawasaki, Tatsuya; Arimura, Gen-ichiro

    2014-01-01

    Anthocyanin pigments and associated flavonoids have demonstrated antioxidant properties and benefits for human health. Consequently, current plant bioengineers have focused on how to modify flavonoid metabolism in plants. Most of that research, however, does not consider the role of natural biotic stresses (e.g., herbivore attack). To understand the influence of herbivore attack on the metabolic engineering of flavonoids, we examined tobacco plants overexpressing the Arabidopsis PAP1 gene (encoding an MYB transcription factor), which accumulated anthocyanin pigments and other flavonoids/phenylpropanoids. In comparison to wild-type and control plants, transgenic plants exhibited greater resistance to Spodoptera litura. Moreover, herbivory suppressed the PAP1-induced increase of transcripts of flavonoid/phenylpropanoid biosynthetic genes (e.g., F3H) and the subsequent accumulation of these genes' metabolites, despite the unaltered PAP1 mRNA levels after herbivory. The instances of down-regulation were independent of the signaling pathways mediated by defense-related jasmonates but were relevant to the levels of PAP1-induced and herbivory-suppressed transcription factors, An1a and An1b. Although initially F3H transcripts were suppressed by herbivory, after the S. litura feeding was interrupted, F3H transcripts increased. We hypothesize that in transgenic plants responding to herbivory, there is a complex mechanism regulating enriched flavonoid/phenylpropanoid compounds, via biotic stress signals.

  12. Overexpression of the PAP1 transcription factor reveals a complex regulation of flavonoid and phenylpropanoid metabolism in Nicotiana tabacum plants attacked by Spodoptera litura.

    Directory of Open Access Journals (Sweden)

    Tomoko Mitsunami

    Full Text Available Anthocyanin pigments and associated flavonoids have demonstrated antioxidant properties and benefits for human health. Consequently, current plant bioengineers have focused on how to modify flavonoid metabolism in plants. Most of that research, however, does not consider the role of natural biotic stresses (e.g., herbivore attack. To understand the influence of herbivore attack on the metabolic engineering of flavonoids, we examined tobacco plants overexpressing the Arabidopsis PAP1 gene (encoding an MYB transcription factor, which accumulated anthocyanin pigments and other flavonoids/phenylpropanoids. In comparison to wild-type and control plants, transgenic plants exhibited greater resistance to Spodoptera litura. Moreover, herbivory suppressed the PAP1-induced increase of transcripts of flavonoid/phenylpropanoid biosynthetic genes (e.g., F3H and the subsequent accumulation of these genes' metabolites, despite the unaltered PAP1 mRNA levels after herbivory. The instances of down-regulation were independent of the signaling pathways mediated by defense-related jasmonates but were relevant to the levels of PAP1-induced and herbivory-suppressed transcription factors, An1a and An1b. Although initially F3H transcripts were suppressed by herbivory, after the S. litura feeding was interrupted, F3H transcripts increased. We hypothesize that in transgenic plants responding to herbivory, there is a complex mechanism regulating enriched flavonoid/phenylpropanoid compounds, via biotic stress signals.

  13. Overexpression of the PAP1 Transcription Factor Reveals a Complex Regulation of Flavonoid and Phenylpropanoid Metabolism in Nicotiana tabacum Plants Attacked by Spodoptera litura

    Science.gov (United States)

    Mitsunami, Tomoko; Nishihara, Masahiro; Galis, Ivan; Alamgir, Kabir Md; Hojo, Yuko; Fujita, Kohei; Sasaki, Nobuhiro; Nemoto, Keichiro; Sawasaki, Tatsuya; Arimura, Gen-ichiro

    2014-01-01

    Anthocyanin pigments and associated flavonoids have demonstrated antioxidant properties and benefits for human health. Consequently, current plant bioengineers have focused on how to modify flavonoid metabolism in plants. Most of that research, however, does not consider the role of natural biotic stresses (e.g., herbivore attack). To understand the influence of herbivore attack on the metabolic engineering of flavonoids, we examined tobacco plants overexpressing the Arabidopsis PAP1 gene (encoding an MYB transcription factor), which accumulated anthocyanin pigments and other flavonoids/phenylpropanoids. In comparison to wild-type and control plants, transgenic plants exhibited greater resistance to Spodoptera litura. Moreover, herbivory suppressed the PAP1-induced increase of transcripts of flavonoid/phenylpropanoid biosynthetic genes (e.g., F3H) and the subsequent accumulation of these genes' metabolites, despite the unaltered PAP1 mRNA levels after herbivory. The instances of down-regulation were independent of the signaling pathways mediated by defense-related jasmonates but were relevant to the levels of PAP1-induced and herbivory-suppressed transcription factors, An1a and An1b. Although initially F3H transcripts were suppressed by herbivory, after the S. litura feeding was interrupted, F3H transcripts increased. We hypothesize that in transgenic plants responding to herbivory, there is a complex mechanism regulating enriched flavonoid/phenylpropanoid compounds, via biotic stress signals. PMID:25268129

  14. The complexity of atrial fibrillation newly diagnosed after ischemic stroke and transient ischemic attack: advances and uncertainties

    Science.gov (United States)

    Cerasuolo, Joshua O.; Cipriano, Lauren E.; Sposato, Luciano A.

    2017-01-01

    Purpose of review Atrial fibrillation is being increasingly diagnosed after ischemic stroke and transient ischemic attack (TIA). Patient characteristics, frequency and duration of paroxysms, and the risk of recurrent ischemic stroke associated with atrial fibrillation detected after stroke and TIA (AFDAS) may differ from atrial fibrillation already known before stroke occurrence. We aim to summarize major recent advances in the field, in the context of prior evidence, and to identify areas of uncertainty to be addressed in future research. Recent findings Half of all atrial fibrillations in ischemic stroke and TIA patients are AFDAS, and most of them are asymptomatic. Over 50% of AFDAS paroxysms last less than 30 s. The rapid initiation of cardiac monitoring and its duration are crucial for its timely and effective detection. AFDAS comprises a heterogeneous mix of atrial fibrillation, possibly including cardiogenic and neurogenic types, and a mix of both. Over 25 single markers and at least 10 scores have been proposed as predictors of AFDAS. However, there are considerable inconsistencies across studies. The role of AFDAS burden and its associated risk of stroke recurrence have not yet been investigated. Summary AFDAS may differ from atrial fibrillation known before stroke in several clinical dimensions, which are important for optimal patient care strategies. Many questions remain unanswered. Neurogenic and cardiogenic AFDAS need to be characterized, as it may be possible to avoid some neurogenic cases by initiating timely preventive treatments. AFDAS burden may differ in ischemic stroke and TIA patients, with distinctive diagnostic and treatment implications. The prognosis of AFDAS and its risk of recurrent stroke are still unknown; therefore, it is uncertain whether AFDAS patients should be treated with oral anticoagulants. PMID:27984303

  15. Platelet degranulation and monocyte-platelet complex formation are increased in the acute and convalescent phases after ischaemic stroke or transient ischaemic attack.

    LENUS (Irish Health Repository)

    McCabe, Dominick J H

    2004-06-01

    Flow cytometric studies suggest that platelets are activated in ischaemic stroke or transient ischaemic attack (TIA). However, few studies have measured circulating leucocyte-platelet complexes in this patient population. Whole blood flow cytometry was used to quantify the expression of CD62P-, CD63-, and PAC1-binding, and the percentages of leucocyte-platelet complexes in acute (1-27 d, n = 79) and convalescent (79-725 d, n = 70) ischaemic cerebrovascular disease (CVD) patients compared with controls without CVD (n = 27). We performed a full blood count, and measured plasma levels of soluble P-selectin, soluble E-selectin, and von Willebrand factor antigen (VWF:Ag) as additional markers of platelet and\\/or endothelial cell activation. The median percentage CD62P expression and the median percentage monocyte-platelet complexes were higher in both acute and convalescent CVD patients than controls (P <\\/= 0.02). The mean white cell count and mean VWF:Ag levels were significantly elevated in the acute and convalescent phases after ischaemic stroke or TIA (P <\\/= 0.02). Otherwise, there was no significant increase in any other marker of platelet or endothelial activation in CVD patients. There was a positive correlation between the percentage expression of CD62P and the percentages of both neutrophil-platelet and monocyte-platelet complexes in the acute phase, and the percentages of all leucocyte-platelet complexes in the convalescent phase after ischaemic CVD. This study provides evidence for ongoing excessive platelet and\\/or endothelial activation in ischaemic CVD patients despite treatment with antithrombotic therapy.

  16. Inferring selection in the Anopheles gambiae species complex: an example from immune-related serine protease inhibitors

    Directory of Open Access Journals (Sweden)

    Little Tom J

    2009-06-01

    Full Text Available Abstract Background Mosquitoes of the Anopheles gambiae species complex are the primary vectors of human malaria in sub-Saharan Africa. Many host genes have been shown to affect Plasmodium development in the mosquito, and so are expected to engage in an evolutionary arms race with the pathogen. However, there is little conclusive evidence that any of these mosquito genes evolve rapidly, or show other signatures of adaptive evolution. Methods Three serine protease inhibitors have previously been identified as candidate immune system genes mediating mosquito-Plasmodium interaction, and serine protease inhibitors have been identified as hot-spots of adaptive evolution in other taxa. Population-genetic tests for selection, including a recent multi-gene extension of the McDonald-Kreitman test, were applied to 16 serine protease inhibitors and 16 other genes sampled from the An. gambiae species complex in both East and West Africa. Results Serine protease inhibitors were found to show a marginally significant trend towards higher levels of amino acid diversity than other genes, and display extensive genetic structuring associated with the 2La chromosomal inversion. However, although serpins are candidate targets for strong parasite-mediated selection, no evidence was found for rapid adaptive evolution in these genes. Conclusion It is well known that phylogenetic and population history in the An. gambiae complex can present special problems for the application of standard population-genetic tests for selection, and this may explain the failure of this study to detect selection acting on serine protease inhibitors. The pitfalls of uncritically applying these tests in this species complex are highlighted, and the future prospects for detecting selection acting on the An. gambiae genome are discussed.

  17. Crystal structures of Mycobacterium tuberculosis S-adenosyl-L-homocysteine hydrolase in ternary complex with substrate and inhibitors

    Energy Technology Data Exchange (ETDEWEB)

    Reddy, Manchi C.M.; Kuppan, Gokulan; Shetty, Nishant D.; Owen, Joshua L.; Ioerger, Thomas R.; Sacchettini, James C. (TAM)

    2009-12-01

    S-adenosylhomocysteine hydrolase (SAHH) is a ubiquitous enzyme that plays a central role in methylation-based processes by maintaining the intracellular balance between S-adenosylhomocysteine (SAH) and S-adenosylmethionine. We report the first prokaryotic crystal structure of SAHH, from Mycobacterium tuberculosis (Mtb), in complex with adenosine (ADO) and nicotinamide adenine dinucleotide. Structures of complexes with three inhibitors are also reported: 3{prime}-keto aristeromycin (ARI), 2-fluoroadenosine, and 3-deazaadenosine. The ARI complex is the first reported structure of SAHH complexed with this inhibitor, and confirms the oxidation of the 3{prime} hydroxyl to a planar keto group, consistent with its prediction as a mechanism-based inhibitor. We demonstrate the in vivo enzyme inhibition activity of the three inhibitors and also show that 2-fluoradenosine has bactericidal activity. While most of the residues lining the ADO-binding pocket are identical between Mtb and human SAHH, less is known about the binding mode of the homocysteine (HCY) appendage of the full substrate. We report the 2.0 {angstrom} resolution structure of the complex of SAHH cocrystallized with SAH. The most striking change in the structure is that binding of HCY forces a rotation of His363 around the backbone to flip out of contact with the 5{prime} hydroxyl of the ADO and opens access to a nearby channel that leads to the surface. This complex suggests that His363 acts as a switch that opens up to permit binding of substrate, then closes down after release of the cleaved HCY. Differences in the entrance to this access channel between human and Mtb SAHH are identified.

  18. Brain alpha-ketoglutarate dehydrogenase complex: kinetic properties, regional distribution, and effects of inhibitors.

    Science.gov (United States)

    Lai, J C; Cooper, A J

    1986-11-01

    The substrate and cofactor requirements and some kinetic properties of the alpha-ketoglutarate dehydrogenase complex (KGDHC; EC 1.2.4.2, EC 2.3.1.61, and EC 1.6.4.3) in purified rat brain mitochondria were studied. Brain mitochondrial KGDHC showed absolute requirement for alpha-ketoglutarate, CoA and NAD, and only partial requirement for added thiamine pyrophosphate, but no requirement for Mg2+ under the assay conditions employed in this study. The pH optimum was between 7.2 and 7.4, but, at pH values below 7.0 or above 7.8, KGDHC activity decreased markedly. KGDHC activity in various brain regions followed the rank order: cerebral cortex greater than cerebellum greater than or equal to midbrain greater than striatum = hippocampus greater than hypothalamus greater than pons and medulla greater than olfactory bulb. Significant inhibition of brain mitochondrial KGDHC was noted at pathological concentrations of ammonia (0.2-2 mM). However, the purified bovine heart KGDHC and KGDHC activity in isolated rat heart mitochondria were much less sensitive to inhibition. At 5 mM both beta-methylene-D,L-aspartate and D,L-vinylglycine (inhibitors of cerebral glucose oxidation) inhibited the purified heart but not the brain mitochondrial enzyme complex. At approximately 10 microM, calcium slightly stimulated (by 10-15%) the brain mitochondrial KGDHC. At concentrations above 100 microM, calcium (IC50 = 1 mM) inhibited both brain mitochondrial and purified heart KGDHC. The present results suggest that some of the kinetic properties of the rat brain mitochondrial KGDHC differ from those of the purified bovine heart and rat heart mitochondrial enzyme complexes. They also suggest that the inhibition of KGDHC by ammonia and the consequent effect on the citric acid cycle fluxes may be of pathophysiological and/or pathogenetic importance in hyperammonemia and in diseases (e.g., hepatic encephalopathy, inborn errors of urea metabolism, Reye's syndrome) where hyperammonemia is a

  19. Synergistic enhancement of chemokine generation and lung injury by C5a or the membrane attack complex of complement

    DEFF Research Database (Denmark)

    Czermak, B J; Lentsch, A B; Bless, N M

    1999-01-01

    demonstrated synergistic production of C-X-C (macrophage inflammatory protein-2 and cytokine-induced neutrophil chemoattractant) and C-C (macrophage inflammatory protein-1alpha and monocyte chemoattractant-1) chemokines. In the absence of the costimulus, C5a or MAC did not induce chemokine generation....... In in vivo studies, C5a and MAC alone caused limited or no intrapulmonary generation of chemokines, but in the presence of a costimulus (IgG immune complexes) C5a and MAC caused synergistic intrapulmonary generation of C-X-C and C-C chemokines but not of tumor necrosis factor alpha. Under these conditions...... increased neutrophil accumulation occurred, as did lung injury. These observations suggest that C5a and MAC function synergistically with a costimulus to enhance chemokine generation and the intensity of the lung inflammatory response....

  20. High-resolution crystal structures of Drosophila melanogaster angiotensin-converting enzyme in complex with novel inhibitors and antihypertensive drugs.

    Science.gov (United States)

    Akif, Mohd; Georgiadis, Dimitris; Mahajan, Aman; Dive, Vincent; Sturrock, Edward D; Isaac, R Elwyn; Acharya, K Ravi

    2010-07-16

    Angiotensin I-converting enzyme (ACE), one of the central components of the renin-angiotensin system, is a key therapeutic target for the treatment of hypertension and cardiovascular disorders. Human somatic ACE (sACE) has two homologous domains (N and C). The N- and C-domain catalytic sites have different activities toward various substrates. Moreover, some of the undesirable side effects of the currently available and widely used ACE inhibitors may arise from their targeting both domains leading to defects in other pathways. In addition, structural studies have shown that although both these domains have much in common at the inhibitor binding site, there are significant differences and these are greater at the peptide binding sites than regions distal to the active site. As a model system, we have used an ACE homologue from Drosophila melanogaster (AnCE, a single domain protein with ACE activity) to study ACE inhibitor binding. In an extensive study, we present high-resolution structures for native AnCE and in complex with six known antihypertensive drugs, a novel C-domain sACE specific inhibitor, lisW-S, and two sACE domain-specific phosphinic peptidyl inhibitors, RXPA380 and RXP407 (i.e., nine structures). These structures show detailed binding features of the inhibitors and highlight subtle changes in the orientation of side chains at different binding pockets in the active site in comparison with the active site of N- and C-domains of sACE. This study provides information about the structure-activity relationships that could be utilized for designing new inhibitors with improved domain selectivity for sACE. 2010 Elsevier Ltd. All rights reserved.

  1. Crystal structure of an FIV/HIV chimeric protease complexed with the broad-based inhibitor, TL-3

    Directory of Open Access Journals (Sweden)

    Elder John H

    2007-01-01

    Full Text Available Abstract We have obtained the 1.7 Å crystal structure of FIV protease (PR in which 12 critical residues around the active site have been substituted with the structurally equivalent residues of HIV PR (12X FIV PR. The chimeric PR was crystallized in complex with the broad-based inhibitor TL-3, which inhibits wild type FIV and HIV PRs, as well as 12X FIV PR and several drug-resistant HIV mutants 1234. Biochemical analyses have demonstrated that TL-3 inhibits these PRs in the order HIV PR > 12X FIV PR > FIV PR, with Ki values of 1.5 nM, 10 nM, and 41 nM, respectively 234. Comparison of the crystal structures of the TL-3 complexes of 12X FIV and wild-typeFIV PR revealed theformation of additinal van der Waals interactions between the enzyme inhibitor in the mutant PR. The 12X FIV PR retained the hydrogen bonding interactions between residues in the flap regions and active site involving the enzyme and the TL-3 inhibitor in comparison to both FIV PR and HIV PR. However, the flap regions of the 12X FIV PR more closely resemble those of HIV PR, having gained several stabilizing intra-flap interactions not present in wild type FIV PR. These findings offer a structural explanation for the observed inhibitor/substrate binding properties of the chimeric PR.

  2. Structural Studies on Intact Clostridium Botulinum Neurotoxins Complexed with Inhibitors Leading to Drug Design

    National Research Council Canada - National Science Library

    Swaminathan, Subramanyam

    2005-01-01

    .... While one is common to botulinum toxins, the other is unique for tetanus. The second unique site also binds a tri-peptide which suggests that this peptide could be used as an inhibitor for tetanus, at least...

  3. Structure of Human G Protein-Coupled Receptor Kinase 2 in Complex with the Kinase Inhibitor Balanol

    Energy Technology Data Exchange (ETDEWEB)

    Tesmer, John J.G.; Tesmer, Valerie M.; Lodowski, David T.; Steinhagen, Henning; Huber, Jochen (Sanofi); (Michigan); (Texas)

    2010-07-19

    G protein-coupled receptor kinase 2 (GRK2) is a pharmaceutical target for the treatment of cardiovascular diseases such as congestive heart failure, myocardial infarction, and hypertension. To better understand how nanomolar inhibition and selectivity for GRK2 might be achieved, we have determined crystal structures of human GRK2 in complex with G{beta}{gamma} in the presence and absence of the AGC kinase inhibitor balanol. The selectivity of balanol among human GRKs is assessed.

  4. Repositioning of Verrucosidin, a Purported Inhibitor of Chaperone Protein GRP78, as an Inhibitor of Mitochondrial Electron Transport Chain Complex I

    Science.gov (United States)

    Gonzalez, Reyna; Pao, Peng-Wen; Hofman, Florence M.; Chen, Thomas C.; Louie, Stan G.; Pirrung, Michael C.; Schönthal, Axel H.

    2013-01-01

    Verrucosidin (VCD) belongs to a group of fungal metabolites that were identified in screening programs to detect molecules that preferentially kill cancer cells under glucose-deprived conditions. Its mode of action was proposed to involve inhibition of increased GRP78 (glucose regulated protein 78) expression during hypoglycemia. Because GRP78 plays an important role in tumorigenesis, inhibitors such as VCD might harbor cancer therapeutic potential. We therefore sought to characterize VCD’s anticancer activity in vitro. Triple-negative breast cancer cell lines MDA-MB-231 and MDA-MB-468 were treated with VCD under different conditions known to trigger increased expression of GRP78, and a variety of cellular processes were analyzed. We show that VCD was highly cytotoxic only under hypoglycemic conditions, but not in the presence of normal glucose levels, and VCD blocked GRP78 expression only when glycolysis was impaired (due to hypoglycemia or the presence of the glycolysis inhibitor 2-deoxyglucose), but not when GRP78 was induced by other means (hypoxia, thapsigargin, tunicamycin). However, VCD’s strictly hypoglycemia-specific toxicity was not due to the inhibition of GRP78. Rather, VCD blocked mitochondrial energy production via inhibition of complex I of the electron transport chain. As a result, cellular ATP levels were quickly depleted under hypoglycemic conditions, and common cellular functions, including general protein synthesis, deteriorated and resulted in cell death. Altogether, our study identifies mitochondria as the primary target of VCD. The possibility that other purported GRP78 inhibitors (arctigenin, biguanides, deoxyverrucosidin, efrapeptin, JBIR, piericidin, prunustatin, pyrvinium, rottlerin, valinomycin, versipelostatin) might act in a similar GRP78-independent fashion will be discussed. PMID:23755268

  5. Repositioning of Verrucosidin, a purported inhibitor of chaperone protein GRP78, as an inhibitor of mitochondrial electron transport chain complex I.

    Directory of Open Access Journals (Sweden)

    Simmy Thomas

    Full Text Available Verrucosidin (VCD belongs to a group of fungal metabolites that were identified in screening programs to detect molecules that preferentially kill cancer cells under glucose-deprived conditions. Its mode of action was proposed to involve inhibition of increased GRP78 (glucose regulated protein 78 expression during hypoglycemia. Because GRP78 plays an important role in tumorigenesis, inhibitors such as VCD might harbor cancer therapeutic potential. We therefore sought to characterize VCD's anticancer activity in vitro. Triple-negative breast cancer cell lines MDA-MB-231 and MDA-MB-468 were treated with VCD under different conditions known to trigger increased expression of GRP78, and a variety of cellular processes were analyzed. We show that VCD was highly cytotoxic only under hypoglycemic conditions, but not in the presence of normal glucose levels, and VCD blocked GRP78 expression only when glycolysis was impaired (due to hypoglycemia or the presence of the glycolysis inhibitor 2-deoxyglucose, but not when GRP78 was induced by other means (hypoxia, thapsigargin, tunicamycin. However, VCD's strictly hypoglycemia-specific toxicity was not due to the inhibition of GRP78. Rather, VCD blocked mitochondrial energy production via inhibition of complex I of the electron transport chain. As a result, cellular ATP levels were quickly depleted under hypoglycemic conditions, and common cellular functions, including general protein synthesis, deteriorated and resulted in cell death. Altogether, our study identifies mitochondria as the primary target of VCD. The possibility that other purported GRP78 inhibitors (arctigenin, biguanides, deoxyverrucosidin, efrapeptin, JBIR, piericidin, prunustatin, pyrvinium, rottlerin, valinomycin, versipelostatin might act in a similar GRP78-independent fashion will be discussed.

  6. Assembly and Regulation of the Membrane Attack Complex Based on Structures of C5b6 and sC5b9

    Directory of Open Access Journals (Sweden)

    Michael A. Hadders

    2012-03-01

    Full Text Available Activation of the complement system results in formation of membrane attack complexes (MACs, pores that disrupt lipid bilayers and lyse bacteria and other pathogens. Here, we present the crystal structure of the first assembly intermediate, C5b6, together with a cryo-electron microscopy reconstruction of a soluble, regulated form of the pore, sC5b9. Cleavage of C5 to C5b results in marked conformational changes, distinct from those observed in the homologous C3-to-C3b transition. C6 captures this conformation, which is preserved in the larger sC5b9 assembly. Together with antibody labeling, these structures reveal that complement components associate through sideways alignment of the central MAC-perforin (MACPF domains, resulting in a C5b6-C7-C8β-C8α-C9 arc. Soluble regulatory proteins below the arc indicate a potential dual mechanism in protection from pore formation. These results provide a structural framework for understanding MAC pore formation and regulation, processes important for fighting infections and preventing complement-mediated tissue damage.

  7. A novel dimeric inhibitor targeting Beta2GPI in Beta2GPI/antibody complexes implicated in antiphospholipid syndrome.

    Directory of Open Access Journals (Sweden)

    Alexey Kolyada

    2010-12-01

    Full Text Available β2GPI is a major antigen for autoantibodies associated with antiphospholipid syndrome (APS, an autoimmune disease characterized by thrombosis and recurrent pregnancy loss. Only the dimeric form of β2GPI generated by anti-β2GPI antibodies is pathologically important, in contrast to monomeric β2GPI which is abundant in plasma.We created a dimeric inhibitor, A1-A1, to selectively target β2GPI in β2GPI/antibody complexes. To make this inhibitor, we isolated the first ligand-binding module from ApoER2 (A1 and connected two A1 modules with a flexible linker. A1-A1 interferes with two pathologically important interactions in APS, the binding of β2GPI/antibody complexes with anionic phospholipids and ApoER2. We compared the efficiency of A1-A1 to monomeric A1 for inhibition of the binding of β2GPI/antibody complexes to anionic phospholipids. We tested the inhibition of β2GPI present in human serum, β2GPI purified from human plasma and the individual domain V of β2GPI. We demonstrated that when β2GPI/antibody complexes are formed, A1-A1 is much more effective than A1 in inhibition of the binding of β2GPI to cardiolipin, regardless of the source of β2GPI. Similarly, A1-A1 strongly inhibits the binding of dimerized domain V of β2GPI to cardiolipin compared to the monomeric A1 inhibitor. In the absence of anti-β2GPI antibodies, both A1-A1 and A1 only weakly inhibit the binding of pathologically inactive monomeric β2GPI to cardiolipin.Our results suggest that the approach of using a dimeric inhibitor to block β2GPI in the pathological multivalent β2GPI/antibody complexes holds significant promise. The novel inhibitor A1-A1 may be a starting point in the development of an effective therapeutic for antiphospholipid syndrome.

  8. A Novel Dimeric Inhibitor Targeting Beta2GPI in Beta2GPI/Antibody Complexes Implicated in Antiphospholipid Syndrome

    Energy Technology Data Exchange (ETDEWEB)

    A Kolyada; C Lee; A De Biasio; N Beglova

    2011-12-31

    {beta}2GPI is a major antigen for autoantibodies associated with antiphospholipid syndrome (APS), an autoimmune disease characterized by thrombosis and recurrent pregnancy loss. Only the dimeric form of {beta}2GPI generated by anti-{beta}2GPI antibodies is pathologically important, in contrast to monomeric {beta}2GPI which is abundant in plasma. We created a dimeric inhibitor, A1-A1, to selectively target {beta}2GPI in {beta}2GPI/antibody complexes. To make this inhibitor, we isolated the first ligand-binding module from ApoER2 (A1) and connected two A1 modules with a flexible linker. A1-A1 interferes with two pathologically important interactions in APS, the binding of {beta}2GPI/antibody complexes with anionic phospholipids and ApoER2. We compared the efficiency of A1-A1 to monomeric A1 for inhibition of the binding of {beta}2GPI/antibody complexes to anionic phospholipids. We tested the inhibition of {beta}2GPI present in human serum, {beta}2GPI purified from human plasma and the individual domain V of {beta}2GPI. We demonstrated that when {beta}2GPI/antibody complexes are formed, A1-A1 is much more effective than A1 in inhibition of the binding of {beta}2GPI to cardiolipin, regardless of the source of {beta}2GPI. Similarly, A1-A1 strongly inhibits the binding of dimerized domain V of {beta}2GPI to cardiolipin compared to the monomeric A1 inhibitor. In the absence of anti-{beta}2GPI antibodies, both A1-A1 and A1 only weakly inhibit the binding of pathologically inactive monomeric {beta}2GPI to cardiolipin. Our results suggest that the approach of using a dimeric inhibitor to block {beta}2GPI in the pathological multivalent {beta}2GPI/antibody complexes holds significant promise. The novel inhibitor A1-A1 may be a starting point in the development of an effective therapeutic for antiphospholipid syndrome.

  9. The Axl kinase domain in complex with a macrocyclic inhibitor offers first structural insights into an active TAM receptor kinase.

    Science.gov (United States)

    Gajiwala, Ketan S; Grodsky, Neil; Bolaños, Ben; Feng, Junli; Ferre, RoseAnn; Timofeevski, Sergei; Xu, Meirong; Murray, Brion W; Johnson, Ted W; Stewart, Al

    2017-09-22

    The receptor tyrosine kinase family consisting of Tyro3, Axl, and Mer (TAM) is one of the most recently identified receptor tyrosine kinase families. TAM receptors are up-regulated postnatally and maintained at high levels in adults. They all play an important role in immunity, but Axl has also been implicated in cancer and therefore is a target in the discovery and development of novel therapeutics. However, of the three members of the TAM family, the Axl kinase domain is the only one that has so far eluded structure determination. To this end, using differential scanning fluorimetry and hydrogen-deuterium exchange mass spectrometry, we show here that a lower stability and greater dynamic nature of the Axl kinase domain may account for its poor crystallizability. We present the first structural characterization of the Axl kinase domain in complex with a small-molecule macrocyclic inhibitor. The Axl crystal structure revealed two distinct conformational states of the enzyme, providing a first glimpse of what an active TAM receptor kinase may look like and suggesting a potential role for the juxtamembrane region in enzyme activity. We noted that the ATP/inhibitor-binding sites of the TAM members closely resemble each other, posing a challenge for the design of a selective inhibitor. We propose that the differences in the conformational dynamics among the TAM family members could potentially be exploited to achieve inhibitor selectivity for targeted receptors. © 2017 by The American Society for Biochemistry and Molecular Biology, Inc.

  10. Bimolecular Complementation to Visualize Filovirus VP40-Host Complexes in Live Mammalian Cells: Toward the Identification of Budding Inhibitors

    Directory of Open Access Journals (Sweden)

    Yuliang Liu

    2011-01-01

    Full Text Available Virus-host interactions play key roles in promoting efficient egress of many RNA viruses, including Ebola virus (EBOV or “e” and Marburg virus (MARV or “m”. Late- (L- domains conserved in viral matrix proteins recruit specific host proteins, such as Tsg101 and Nedd4, to facilitate the budding process. These interactions serve as attractive targets for the development of broad-spectrum budding inhibitors. A major gap still exists in our understanding of the mechanism of filovirus budding due to the difficulty in detecting virus-host complexes and mapping their trafficking patterns in the natural environment of the cell. To address this gap, we used a bimolecular complementation (BiMC approach to detect, localize, and follow the trafficking patterns of eVP40-Tsg101 complexes in live mammalian cells. In addition, we used the BiMC approach along with a VLP budding assay to test small molecule inhibitors identified by in silico screening for their ability to block eVP40 PTAP-mediated interactions with Tsg101 and subsequent budding of eVP40 VLPs. We demonstrated the potential broad spectrum activity of a lead candidate inhibitor by demonstrating its ability to block PTAP-dependent binding of HIV-1 Gag to Tsg101 and subsequent egress of HIV-1 Gag VLPs.

  11. Copper (II) and zinc (II) complexes with flavanone derivatives: Identification of potential cholinesterase inhibitors by on-flow assays.

    Science.gov (United States)

    Sarria, André Lucio Franceschini; Vilela, Adriana Ferreira Lopes; Frugeri, Bárbara Mammana; Fernandes, João Batista; Carlos, Rose Maria; da Silva, Maria Fátima das Graças Fernandes; Cass, Quezia Bezerra; Cardoso, Carmen Lúcia

    2016-11-01

    Metal chelates strongly influence the nature and magnitude of pharmacological activities in flavonoids. In recent years, studies have shown that a promising class of flavanone-metal ion complexes can act as selective cholinesterase inhibitors (ChEIs), which has led our group to synthesize a new series of flavanone derivatives (hesperidin, hesperetin, naringin, and naringenin) complexed to either copper (II) or zinc (II) and to evaluate their potential use as selective ChEIs. Most of the synthesized complexes exhibited greater inhibitory activity against acetylcholinesterase (AChE) than against butyrylcholinesterase (BChE). Nine of these complexes constituted potent, reversible, and selective ChEIs with inhibitory potency (IC 50 ) and inhibitory constant (K i ) ranging from 0.02 to 4.5μM. Copper complexes with flavanone-bipyridine derivatives afforded the best inhibitory activity against AChE and BChE. The complex Cu(naringin)(2,2'-bipyridine) (11) gave IC 50 and K i values of 0.012±0.002 and 0.07±0.01μM for huAChE, respectively, which were lower than the inhibitory values obtained for standard galanthamine (IC 50 =206±30.0 and K i =126±18.0μM). Evaluation of the inhibitory activity of this complex against butyrylcholinesterase from human serum (huBChE) gave IC 50 and K i values of 8.0±1.4 and 2.0±0.1μM, respectively. A Liquid Chromatography-Immobilized Capillary Enzyme Reactor by UV detection (LC-ICER-UV) assay allowed us to determine the IC 50 and K i values and the type of mechanism for the best inhibitors. Copyright © 2016 Elsevier Inc. All rights reserved.

  12. The association between ACE inhibitors and the complex regional pain syndrome: Suggestions for a neuro-inflammatory pathogenesis of CRPS.

    Science.gov (United States)

    de Mos, M; Huygen, F J P M; Stricker, B H Ch; Dieleman, J P; Sturkenboom, M C J M

    2009-04-01

    Antihypertensive drugs interact with mediators that are also involved in complex regional pain syndrome (CRPS), such a neuropeptides, adrenergic receptors, and vascular tone modulators. Therefore, we aimed to study the association between the use of antihypertensive drugs and CRPS onset. We conducted a population-based case-control study in the Integrated Primary Care Information (IPCI) database in the Netherlands. Cases were identified from electronic records (1996-2005) and included if they were confirmed during an expert visit (using IASP criteria), or if they had been diagnosed by a medical specialist. Up to four controls per cases were selected, matched on gender, age, calendar time, and injury. Exposure to angiotensin converting enzyme (ACE) inhibitors, angiotensin II receptor antagonists, beta-blockers, calcium channel blockers, and diuretics was assessed from the automated prescription records. Data were analyzed using multivariate conditional logistic regression. A total of 186 cases were matched to 697 controls (102 confirmed during an expert visit plus 84 with a specialist diagnosis). Current use of ACE inhibitors was associated with an increased risk of CRPS (OR(adjusted): 2.7, 95% CI: 1.1-6.8). The association was stronger if ACE inhibitors were used for a longer time period (OR(adjusted): 3.0, 95% CI: 1.1-8.1) and in higher dosages (OR(adjusted): 4.3, 95% CI: 1.4-13.7). None of the other antihypertensive drug classes was significantly associated with CRPS. We conclude that ACE inhibitor use is associated with CRPS onset and hypothesize that ACE inhibitors influence the neuro-inflammatory mechanisms that underlie CRPS by their interaction with the catabolism of substance P and bradykinin.

  13. Heart Attack Recovery FAQs

    Science.gov (United States)

    ... recommendations to make a full recovery. View an animation of a heart attack . Heart Attack Recovery Questions ... Support Network Popular Articles 1 Understanding Blood Pressure Readings 2 Sodium and Salt 3 Heart Attack Symptoms ...

  14. Kinetic intermediates en route to the final serpin-protease complex: studies of complexes of α1-protease inhibitor with trypsin.

    Science.gov (United States)

    Maddur, Ashoka A; Swanson, Richard; Izaguirre, Gonzalo; Gettins, Peter G W; Olson, Steven T

    2013-11-01

    Serpin protein protease inhibitors inactivate their target proteases through a unique mechanism in which a major serpin conformational change, resulting in a 70-Å translocation of the protease from its initial reactive center loop docking site to the opposite pole of the serpin, kinetically traps the acyl-intermediate complex. Although the initial Michaelis and final trapped acyl-intermediate complexes have been well characterized structurally, the intermediate stages involved in this remarkable transformation are not well understood. To better characterize such intermediate steps, we undertook rapid kinetic studies of the FRET and fluorescence perturbation changes of site-specific fluorophore-labeled derivatives of the serpin, α1-protease inhibitor (α1PI), which report the serpin and protease conformational changes involved in transforming the Michaelis complex to the trapped acyl-intermediate complex in reactions with trypsin. Two kinetically resolvable conformational changes were observed in the reactions, ascribable to (i) serpin reactive center loop insertion into sheet A with full protease translocation but incomplete protease distortion followed by, (ii) full conformational distortion and movement of the protease and coupled serpin conformational changes involving the F helix-sheet A interface. Kinetic studies of calcium effects on the labeled α1PI-trypsin reactions demonstrated both inactive and low activity states of the distorted protease in the final complex that were distinct from the intermediate distorted state. These studies provide new insights into the nature of the serpin and protease conformational changes involved in trapping the acyl-intermediate complex in serpin-protease reactions and support a previously proposed role for helix F in the trapping mechanism.

  15. The membrane attack complex of complement contributes to plasmin-induced synthesis of platelet-activating factor by endothelial cells and neutrophils.

    Science.gov (United States)

    Lupia, Enrico; Del Sorbo, Lorenzo; Bergerone, Serena; Emanuelli, Giorgio; Camussi, Giovanni; Montrucchio, Giuseppe

    2003-08-01

    Thrombolytic agents, used to restore blood flow to ischaemic tissues, activate several enzymatic systems with pro-inflammatory effects, thus potentially contributing to the pathogenesis of ischaemia-reperfusion injury. Platelet-activating factor (PAF), a phospholipid mediator of inflammation, has been implicated in the pathogenesis of this process. We previously showed that the infusion of streptokinase (SK) induces the intravascular release of PAF in patients with acute myocardial infarction (AMI), and that cultured human endothelial cells (EC) synthesized PAF in response to SK and plasmin (PLN). In the present study, we investigated the role of the membrane attack complex (MAC) of complement in the PLN-induced synthesis of PAF. In vivo, we showed a correlation between the levels of soluble terminal complement components (sC5b-9) and the concentrations of PAF detected in blood of patients with AMI infused with SK. In vitro both EC and polymorphonuclear neutrophils (PMN), incubated in the presence of PLN and normal human serum, showed an intense staining for the MAC neoepitope, while no staining was detected when they were incubated with PLN in the presence of heat-inactivated normal human serum. Moreover, the insertion of MAC on EC and PMN plasmamembrane elicited the synthesis of PAF. In conclusion, our results elucidate the mechanisms involved in PAF production during the activation of the fibrinolytic system, showing a role for complement products in this setting. The release of PAF may increase the inflammatory response, thus limiting the beneficial effects of thrombolytic therapy. Moreover, it may have a pathogenic role in other pathological conditions, such as transplant rejection, tumoral angiogenesis, and septic shock, where fibrinolysis is activated.

  16. Genetic attack on neural cryptography.

    Science.gov (United States)

    Ruttor, Andreas; Kinzel, Wolfgang; Naeh, Rivka; Kanter, Ido

    2006-03-01

    Different scaling properties for the complexity of bidirectional synchronization and unidirectional learning are essential for the security of neural cryptography. Incrementing the synaptic depth of the networks increases the synchronization time only polynomially, but the success of the geometric attack is reduced exponentially and it clearly fails in the limit of infinite synaptic depth. This method is improved by adding a genetic algorithm, which selects the fittest neural networks. The probability of a successful genetic attack is calculated for different model parameters using numerical simulations. The results show that scaling laws observed in the case of other attacks hold for the improved algorithm, too. The number of networks needed for an effective attack grows exponentially with increasing synaptic depth. In addition, finite-size effects caused by Hebbian and anti-Hebbian learning are analyzed. These learning rules converge to the random walk rule if the synaptic depth is small compared to the square root of the system size.

  17. Genetic attack on neural cryptography

    International Nuclear Information System (INIS)

    Ruttor, Andreas; Kinzel, Wolfgang; Naeh, Rivka; Kanter, Ido

    2006-01-01

    Different scaling properties for the complexity of bidirectional synchronization and unidirectional learning are essential for the security of neural cryptography. Incrementing the synaptic depth of the networks increases the synchronization time only polynomially, but the success of the geometric attack is reduced exponentially and it clearly fails in the limit of infinite synaptic depth. This method is improved by adding a genetic algorithm, which selects the fittest neural networks. The probability of a successful genetic attack is calculated for different model parameters using numerical simulations. The results show that scaling laws observed in the case of other attacks hold for the improved algorithm, too. The number of networks needed for an effective attack grows exponentially with increasing synaptic depth. In addition, finite-size effects caused by Hebbian and anti-Hebbian learning are analyzed. These learning rules converge to the random walk rule if the synaptic depth is small compared to the square root of the system size

  18. Genetic attack on neural cryptography

    Science.gov (United States)

    Ruttor, Andreas; Kinzel, Wolfgang; Naeh, Rivka; Kanter, Ido

    2006-03-01

    Different scaling properties for the complexity of bidirectional synchronization and unidirectional learning are essential for the security of neural cryptography. Incrementing the synaptic depth of the networks increases the synchronization time only polynomially, but the success of the geometric attack is reduced exponentially and it clearly fails in the limit of infinite synaptic depth. This method is improved by adding a genetic algorithm, which selects the fittest neural networks. The probability of a successful genetic attack is calculated for different model parameters using numerical simulations. The results show that scaling laws observed in the case of other attacks hold for the improved algorithm, too. The number of networks needed for an effective attack grows exponentially with increasing synaptic depth. In addition, finite-size effects caused by Hebbian and anti-Hebbian learning are analyzed. These learning rules converge to the random walk rule if the synaptic depth is small compared to the square root of the system size.

  19. The attack navigator

    DEFF Research Database (Denmark)

    Probst, Christian W.; Willemson, Jan; Pieters, Wolter

    2016-01-01

    The need to assess security and take protection decisions is at least as old as our civilisation. However, the complexity and development speed of our interconnected technical systems have surpassed our capacity to imagine and evaluate risk scenarios. This holds in particular for risks...... that are caused by the strategic behaviour of adversaries. Therefore, technology-supported methods are needed to help us identify and manage these risks. In this paper, we describe the attack navigator: a graph-based approach to security risk assessment inspired by navigation systems. Based on maps of a socio...

  20. Crystal structures of monoamine oxidase B in complex with four inhibitors of the N-propargylaminoindan class.

    Science.gov (United States)

    Binda, Claudia; Hubálek, Frantisek; Li, Min; Herzig, Yaacov; Sterling, Jeffrey; Edmondson, Dale E; Mattevi, Andrea

    2004-03-25

    Monoamine oxidase B (MAO B) is an outer mitochondrial membrane enzyme that catalyzes the oxidation of arylalkylamine neurotransmitters. The crystal structures of MAO B in complex with four of the N-propargylaminoindan class of MAO covalent inhibitors (rasagiline, N-propargyl-1(S)-aminoindan, 6-hydroxy-N-propargyl-1(R)-aminoindan, and N-methyl-N-propargyl-1(R)-aminoindan) have been determined at a resolution of better than 2.1 A. Rasagiline, 6-hydroxy-N-propargyl-1(R)-aminoindan, and N-methyl-N-propargyl-1(R)-aminoindan adopt essentially the same conformation with the extended propargyl chain covalently bound to the flavin and the indan ring located in the rear of the substrate cavity. N-Propargyl-1(S)-aminoindan binds with the indan ring in a flipped conformation with respect to the other inhibitors, which causes a slight movement of the Tyr326 side chain. Four ordered water molecules are an integral part of the active site and establish H-bond interactions to the inhibitor atoms. These structural studies may guide future drug design to improve selectivity and efficacy by introducing appropriate substituents on the rasagiline molecular scaffold.

  1. Crystallization and preliminary crystallographic study of Feline infectious peritonitis virus main protease in complex with an inhibitor.

    Science.gov (United States)

    Wang, Jinshan; Wang, Fenghua; Tan, Yusheng; Chen, Xia; Zhao, Qi; Fu, Sheng; Li, Shuang; Chen, Cheng; Yang, Haitao

    2014-12-01

    Feline infectious peritonitis virus (FIPV) causes a lethal systemic granulomatous disease in wild and domestic cats around the world. Currently, no effective vaccines or drugs have been developed against it. As a member of the genus Alphacoronavirus, FIPV encodes two polyprotein precursors required for genome replication and transcription. Each polyprotein undergoes extensive proteolytic processing, resulting in functional subunits. This process is mainly mediated by its genome-encoded main protease, which is an attractive target for antiviral drug design. In this study, the main protease of FIPV in complex with a Michael acceptor-type inhibitor was crystallized. The complex crystals diffracted to 2.5 Å resolution and belonged to space group I422, with unit-cell parameters a = 112.3, b = 112.3, c = 102.1 Å. There is one molecule per asymmetric unit.

  2. Structural and dynamical characterization of the pH-dependence of the pectin methylesterase-pectin methylesterase inhibitor complex.

    Science.gov (United States)

    Sénéchal, Fabien; Habrylo, Olivier; Hocq, Ludivine; Domon, Jean-Marc; Marcelo, Paulo; Lefebvre, Valérie; Pelloux, Jérôme; Mercadante, Davide

    2017-12-29

    Pectin methylesterases (PMEs) catalyze the demethylesterification of pectin, one of the main polysaccharides in the plant cell wall, and are of critical importance in plant development. PME activity generates highly negatively charged pectin and mutates the physiochemical properties of the plant cell wall such that remodeling of the plant cell can occur. PMEs are therefore tightly regulated by proteinaceous inhibitors (PMEIs), some of which become active upon changes in cellular pH. Nevertheless, a detailed picture of how this pH-dependent inhibition of PME occurs at the molecular level is missing. Herein, using an interdisciplinary approach that included homology modeling, MD simulations, and biophysical and biochemical characterizations, we investigated the molecular basis of PME3 inhibition by PMEI7 in Arabidopsis thaliana Our complementary approach uncovered how changes in the protonation of amino acids at the complex interface shift the network of interacting residues between intermolecular and intramolecular. These shifts ultimately regulate the stability of the PME3-PMEI7 complex and the inhibition of the PME as a function of the pH. These findings suggest a general model of how pH-dependent proteinaceous inhibitors function. Moreover, they enhance our understanding of how PMEs may be regulated by pH and provide new insights into how this regulation may control the physical properties and structure of the plant cell wall. © 2017 by The American Society for Biochemistry and Molecular Biology, Inc.

  3. Stability of the Human Hsp90-p50Cdc37 Chaperone Complex against Nucleotides and Hsp90 Inhibitors, and the Influence of Phosphorylation by Casein Kinase 2

    Directory of Open Access Journals (Sweden)

    Sanne H. Olesen

    2015-01-01

    Full Text Available The molecular chaperone Hsp90 is regulated by co-chaperones such as p50Cdc37, which recruits a wide selection of client protein kinases. Targeted disruption of the Hsp90-p50Cdc37 complex by protein–protein interaction (PPI inhibitors has emerged as an alternative strategy to treat diseases characterized by aberrant Hsp90 activity. Using isothermal microcalorimetry, ELISA and GST-pull down assays we evaluated reported Hsp90 inhibitors and nucleotides for their ability to inhibit formation of the human Hsp90β-p50Cdc37 complex, reconstituted in vitro from full-length proteins. Hsp90 inhibitors, including the proposed PPI inhibitors gedunin and H2-gamendazole, did not affect the interaction of Hsp90 with p50Cdc37 in vitro. Phosphorylation of Hsp90 and p50Cdc37 by casein kinase 2 (CK2 did not alter the thermodynamic signature of complex formation. However, the phosphorylated complex was vulnerable to disruption by ADP (IC50 = 32 µM, while ATP, AMPPNP and Hsp90 inhibitors remained largely ineffective. The differential inhibitory activity of ADP suggests that phosphorylation by CK2 primes the complex for dissociation in response to a drop in ATP/ADP levels. The approach applied herein provides robust assays for a comprehensive biochemical evaluation of potential effectors of the Hsp90-p50Cdc37 complex, such as phosphorylation by a kinase or the interaction with small molecule ligands.

  4. Bovine Pancreatic Trypsin Inhibitor-Trypsin Complex as a Detection System for Recombinant Proteins

    Science.gov (United States)

    Borjigin, Jimo; Nathans, Jeremy

    1993-01-01

    Bovine pancreatic trypsin inhibitor (BPTI) binds to trypsin and anhydrotrypsin (an enzymatically inactive derivative of trypsin) with affinities of 6 x 10-14 and 1.1 x 10-13 M, respectively. We have taken advantage of the high affinity and specificity of this binding reaction to develop a protein tagging system in which biotinylated trypsin or biotinylated anhydrotrypsin is used as the reagent to detect recombinant fusion proteins into which BPTI has been inserted. Two proteins, opsin and growth hormone, were used as targets for insertional mutagenesis with BPTI. In each case, both domains of the fusion protein appear to be correctly folded. The fusion proteins can be specifically and efficiently detected by biotinylated trypsin or biotinylated anhydrotrypsin, as demonstrated by staining of transfected cells, protein blotting, affinity purification, and a mobility shift assay in SDS/polyacrylamide gels.

  5. Transforming Graphical System Models to Graphical Attack Models

    DEFF Research Database (Denmark)

    Ivanova, Marieta Georgieva; Probst, Christian W.; Hansen, Rene Rydhof

    2016-01-01

    Manually identifying possible attacks on an organisation is a complex undertaking; many different factors must be considered, and the resulting attack scenarios can be complex and hard to maintain as the organisation changes. System models provide a systematic representation of organisations...... approach to transforming graphical system models to graphical attack models in the form of attack trees. Based on an asset in the model, our transformations result in an attack tree that represents attacks by all possible actors in the model, after which the actor in question has obtained the asset....

  6. Carbohydrate-based heteronuclear complexes as topoisomerase Iα inhibitor: approach toward anticancer chemotherapeutics.

    Science.gov (United States)

    Afzal, Mohd; Al-Lohedan, Hamad A; Usman, Mohammad; Tabassum, Sartaj

    2018-04-18

    Due to the critical role of cellular enzymes necessary for cell proliferation by deciphering topological hurdles in the process of DNA replication, topoisomerases have been one of the major targets in the anticancer drug development area. A need, therefore, arises for new metallodrugs that specifically recognizes DNA and inhibits the activity of topoisomerase enzymes, herein, we report the synthesis and characterization of new metal-based glycoconjugate entities containing heterobimetallic core Cu II -Sn IV (1) and Ni II -Sn IV (2) derived from N-glycoside ligand (L). The optimized structure of complex 1 and other significant vibrational modes have been explained using dispersion corrected B3LYP/DFT calculations. In vitro DNA binding profile of the L and both the complexes 1 and 2 were done by various biophysical studies. Complex 1 breaks pBR322 DNA via a hydrolytic means which was validated by T4 DNA enzymatic assay. To get a mechanistic insight of mode of action topoisomerase I (Topo I) inhibition assay was carried out. Also, we have taken the help of molecular modeling studies in accordance with experimental findings. In vitro cytotoxicity of the complex 1 was evaluated against a panel of cancer cells which exhibited remarkably good anticancer activity (GI 50 values <10 μg/ml). Moreover, intracellular localization of the complex 1 was visualized by confocal microscopy against HeLa cells.

  7. Design of novel HIV-1 protease inhibitors incorporating isophthalamide-derived P2-P3 ligands: Synthesis, biological evaluation and X-ray structural studies of inhibitor-HIV-1 protease complex

    Energy Technology Data Exchange (ETDEWEB)

    Ghosh, Arun K.; Brindisi, Margherita; Nyalapatla, Prasanth R.; Takayama, Jun; Ella-Menye, Jean-Rene; Yashchuk, Sofiya; Agniswamy, Johnson; Wang, Yuan-Fang; Aoki, Manabu; Amano, Masayuki; Weber, Irene T.; Mitsuya, Hiroaki

    2017-10-01

    Based upon molecular insights from the X-ray structures of inhibitor-bound HIV-1 protease complexes, we have designed a series of isophthalamide-derived inhibitors incorporating substituted pyrrolidines, piperidines and thiazolidines as P2-P3 ligands for specific interactions in the S2-S3 extended site. Compound 4b has shown an enzyme Ki of 0.025 nM and antiviral IC50 of 69 nM. An X-ray crystal structure of inhibitor 4b-HIV-1 protease complex was determined at 1.33 Å resolution. We have also determined X-ray structure of 3b-bound HIV-1 protease at 1.27 Å resolution. These structures revealed important molecular insight into the inhibitor–HIV-1 protease interactions in the active site.

  8. Integrating cyber attacks within fault trees

    International Nuclear Information System (INIS)

    Nai Fovino, Igor; Masera, Marcelo; De Cian, Alessio

    2009-01-01

    In this paper, a new method for quantitative security risk assessment of complex systems is presented, combining fault-tree analysis, traditionally used in reliability analysis, with the recently introduced Attack-tree analysis, proposed for the study of malicious attack patterns. The combined use of fault trees and attack trees helps the analyst to effectively face the security challenges posed by the introduction of modern ICT technologies in the control systems of critical infrastructures. The proposed approach allows considering the interaction of malicious deliberate acts with random failures. Formal definitions of fault tree and attack tree are provided and a mathematical model for the calculation of system fault probabilities is presented.

  9. Integrating cyber attacks within fault trees

    Energy Technology Data Exchange (ETDEWEB)

    Nai Fovino, Igor [Joint Research Centre - EC, Institute for the Protection and Security of the Citizen, Ispra, VA (Italy)], E-mail: igor.nai@jrc.it; Masera, Marcelo [Joint Research Centre - EC, Institute for the Protection and Security of the Citizen, Ispra, VA (Italy); De Cian, Alessio [Department of Electrical Engineering, University di Genova, Genoa (Italy)

    2009-09-15

    In this paper, a new method for quantitative security risk assessment of complex systems is presented, combining fault-tree analysis, traditionally used in reliability analysis, with the recently introduced Attack-tree analysis, proposed for the study of malicious attack patterns. The combined use of fault trees and attack trees helps the analyst to effectively face the security challenges posed by the introduction of modern ICT technologies in the control systems of critical infrastructures. The proposed approach allows considering the interaction of malicious deliberate acts with random failures. Formal definitions of fault tree and attack tree are provided and a mathematical model for the calculation of system fault probabilities is presented.

  10. Complex molecular mechanisms cooperate to mediate histone deacetylase inhibitors anti-tumour activity in neuroblastoma cells

    Directory of Open Access Journals (Sweden)

    Nardou Katya

    2008-06-01

    Full Text Available Abstract Background Histone deacetylase inhibitors (HDACi are a new class of promising anti-tumour agent inhibiting cell proliferation and survival in tumour cells with very low toxicity toward normal cells. Neuroblastoma (NB is the second most common solid tumour in children still associated with poor outcome in higher stages and, thus NB strongly requires novel treatment modalities. Results We show here that the HDACi Sodium Butyrate (NaB, suberoylanilide hydroxamic acid (SAHA and Trichostatin A (TSA strongly reduce NB cells viability. The anti-tumour activity of these HDACi involved the induction of cell cycle arrest in the G2/M phase, followed by the activation of the intrinsic apoptotic pathway, via the activation of the caspases cascade. Moreover, HDACi mediated the activation of the pro-apoptotic proteins Bid and BimEL and the inactivation of the anti-apoptotic proteins XIAP, Bcl-xL, RIP and survivin, that further enhanced the apoptotic signal. Interestingly, the activity of these apoptosis regulators was modulated by several different mechanisms, either by caspases dependent proteolytic cleavage or by degradation via the proteasome pathway. In addition, HDACi strongly impaired the hypoxia-induced secretion of VEGF by NB cells. Conclusion HDACi are therefore interesting new anti-tumour agents for targeting highly malignant tumours such as NB, as these agents display a strong toxicity toward aggressive NB cells and they may possibly reduce angiogenesis by decreasing VEGF production by NB cells.

  11. Identification of a methylated oligoribonucleotide as a potent inhibitor of HIV-1 reverse transcription complex.

    Science.gov (United States)

    Grigorov, Boyan; Bocquin, Anne; Gabus, Caroline; Avilov, Sergey; Mély, Yves; Agopian, Audrey; Divita, Gilles; Gottikh, Marina; Witvrouw, Myriam; Darlix, Jean-Luc

    2011-07-01

    Upon HIV-1 infection of a target cell, the viral reverse transcriptase (RT) copies the genomic RNA to synthesize the viral DNA. The genomic RNA is within the incoming HIV-1 core where it is coated by molecules of nucleocapsid (NC) protein that chaperones the reverse transcription process. Indeed, the RT chaperoning properties of NC extend from the initiation of cDNA synthesis to completion of the viral DNA. New and effective drugs against HIV-1 continue to be required, which prompted us to search for compounds aimed at inhibiting NC protein. Here, we report that the NC chaperoning activity is extensively inhibited in vitro by small methylated oligoribonucleotides (mODN). These mODNs were delivered intracellularly using a cell-penetrating-peptide and found to impede HIV-1 replication in primary human cells at nanomolar concentrations. Extensive analysis showed that viral cDNA synthesis was severely impaired by mODNs. Partially resistant viruses with mutations in NC and RT emerged after months of passaging in cell culture. A HIV-1 molecular clone (NL4.3) bearing these mutations was found to replicate at high concentrations of mODN, albeit with a reduced fitness. Small, methylated ODNs such as mODN-11 appear to be a new type of highly potent inhibitor of HIV-1.

  12. Structure of the catalytic domain of the Tannerella forsythia matrix metallopeptidase karilysin in complex with a tetrapeptidic inhibitor

    DEFF Research Database (Denmark)

    Guevara, Tibisay; Ksiazek, Miroslaw; Skottrup, Peter Durand

    2013-01-01

    -micromolar binding affinities. Subsequent refinement revealed that inhibition comparable to that of longer peptides could be achieved using the tetrapeptide SWFP. To analyze its binding, the high-resolution crystal structure of the complex between Kly18 and SWFP was determined and it was found that the peptide binds...... to the primed side of the active-site cleft in a substrate-like manner. The catalytic zinc ion is clamped by the α-amino group and the carbonyl O atom of the serine, thus distantly mimicking the general manner of binding of hydroxamate inhibitors to metallopeptidases and contributing, together with three zinc...... determinants of inhibition of karilysin and open the field for the design of novel inhibitory strategies aimed at the treatment of human periodontal disease based on a peptidic hit molecule....

  13. Molecular modeling of human acidic mammalian chitinase in complex with the natural-product cyclopentapeptide chitinase inhibitor argifin.

    Science.gov (United States)

    Gouda, Hiroaki; Terashima, Shinichi; Iguchi, Kanami; Sugawara, Akihiro; Saito, Yoshifumi; Yamamoto, Tsuyoshi; Hirose, Tomoyasu; Shiomi, Kazuro; Sunazuka, Toshiaki; Omura, Satoshi; Hirono, Shuichi

    2009-09-01

    Human acidic mammalian chitinase (hAMCase) is an attractive target for developing anti-asthma medications. We used a variety of computational methods to investigate the interaction between hAMCase and the natural-product cyclopentapeptide chitinase inhibitor argifin. The three-dimensional structure of hAMCase was first constructed using homology modeling. The interaction mode and binding free energy between argifin and hAMCase were then examined by the molecular-docking calculation and the molecular mechanics Poisson-Boltzmann surface area method combined with molecular dynamics simulation, respectively. The results suggested that argifin binds to hAMCase in a similar fashion to the interaction mode observed in the crystal structure of argifin-human chitotriosidase complex, and possesses inhibitory activity against hAMCase in the micromolar range. We further designed argifin derivatives expected to be selective for hAMCase.

  14. A Rhodium(III) Complex as an Inhibitor of Neural Precursor Cell Expressed, Developmentally Down-Regulated 8-Activating Enzyme with in Vivo Activity against Inflammatory Bowel Disease.

    Science.gov (United States)

    Zhong, Hai-Jing; Wang, Wanhe; Kang, Tian-Shu; Yan, Hui; Yang, Yali; Xu, Lipeng; Wang, Yuqiang; Ma, Dik-Lung; Leung, Chung-Hang

    2017-01-12

    We report herein the identification of the rhodium(III) complex [Rh(phq) 2 (MOPIP)] + (1) as a potent and selective ATP-competitive neural precursor cell expressed, developmentally down-regulated 8 (NEDD8)-activating enzyme (NAE) inhibitor. Structure-activity relationship analysis indicated that the overall organometallic design of complex 1 was important for anti-inflammatory activity. Complex 1 showed promising anti-inflammatory activity in vivo for the potential treatment of inflammatory bowel disease.

  15. Terrorists and Suicide Attacks

    National Research Council Canada - National Science Library

    Cronin, Audrey K

    2003-01-01

    Suicide attacks by terrorist organizations have become more prevalent globally, and assessing the threat of suicide attacks against the United States and its interests at home and abroad has therefore...

  16. Solidarity under Attack

    DEFF Research Database (Denmark)

    Meret, Susi; Goffredo, Sergio

    2017-01-01

    https://www.opendemocracy.net/can-europe-make-it/susi-meret-sergio-goffredo/solidarity-under-attack......https://www.opendemocracy.net/can-europe-make-it/susi-meret-sergio-goffredo/solidarity-under-attack...

  17. Pericarditis - after heart attack

    Science.gov (United States)

    ... include: A previous heart attack Open heart surgery Chest trauma A heart attack that has affected the thickness of your heart muscle Symptoms Symptoms include: Anxiety Chest pain from the swollen pericardium rubbing on the ...

  18. Heart attack first aid

    Science.gov (United States)

    First aid - heart attack; First aid - cardiopulmonary arrest; First aid - cardiac arrest ... A heart attack occurs when the blood flow that carries oxygen to the heart is blocked. The heart muscle ...

  19. Mitochondrial genome-knockout cells demonstrate a dual mechanism of action for the electron transport complex I inhibitor mycothiazole.

    Science.gov (United States)

    Meyer, Kirsten J; Singh, A Jonathan; Cameron, Alanna; Tan, An S; Leahy, Dora C; O'Sullivan, David; Joshi, Praneta; La Flamme, Anne C; Northcote, Peter T; Berridge, Michael V; Miller, John H

    2012-04-01

    Mycothiazole, a polyketide metabolite isolated from the marine sponge Cacospongia mycofijiensis, is a potent inhibitor of metabolic activity and mitochondrial electron transport chain complex I in sensitive cells, but other cells are relatively insensitive to the drug. Sensitive cell lines (IC(50) 0.36-13.8 nM) include HeLa, P815, RAW 264.7, MDCK, HeLa S3, 143B, 4T1, B16, and CD4/CD8 T cells. Insensitive cell lines (IC(50) 12.2-26.5 μM) include HL-60, LN18, and Jurkat. Thus, there is a 34,000-fold difference in sensitivity between HeLa and HL-60 cells. Some sensitive cell lines show a biphasic response, suggesting more than one mechanism of action. Mitochondrial genome-knockout ρ(0) cell lines are insensitive to mycothiazole, supporting a conditional mitochondrial site of action. Mycothiazole is cytostatic rather than cytotoxic in sensitive cells, has a long lag period of about 12 h, and unlike the complex I inhibitor, rotenone, does not cause G(2)/M cell cycle arrest. Mycothiazole decreases, rather than increases the levels of reactive oxygen species after 24 h. It is concluded that the cytostatic inhibitory effects of mycothiazole on mitochondrial electron transport function in sensitive cell lines may depend on a pre-activation step that is absent in insensitive cell lines with intact mitochondria, and that a second lower-affinity cytotoxic target may also be involved in the metabolic and growth inhibition of cells.

  20. Iron complexation to histone deacetylase inhibitors SAHA and LAQ824 in PEGylated liposomes can considerably improve pharmacokinetics in rats.

    Science.gov (United States)

    Wang, Yan; Tu, Sheng; Steffen, Dana; Xiong, May

    2014-01-01

    The formulation of histone deacetylase inhibitors (HDACi) is challenging due to poor water solubility and rapid elimination of drugs in vivo. This study investigated the effects of complexing iron (Fe3+) to the HDACi suberoylanilide hydroxamic acid (SAHA) and LAQ824 (LAQ) prior to their encapsulation into PEGylated liposomes, and investigated whether this technique could improve drug solubility, in vitro release and in vivo pharmacokinetic (PK) properties. METHODS. The reaction stoichiometry, binding constants and solubility were measured for Fe complexes of SAHA and LAQ. The complexes were passively encapsulated into PEGylated liposomes and characterized by size distribution, zeta-potential, encapsulation efficiency (EE), and in vitro drug release studies. PC-3 cells were used to verify the in vitro anticancer activity of the formulations. In vivo pharmacokinetic properties of liposomal LAQ-Fe (L-LAQ-Fe) was evaluated in rats. RESULTS. SAHA and LAQ form complexes with Fe at 1:1 stoichiometric ratio, with a binding constant on the order of 104 M-1. Fe complexation improved the aqueous solubility and the liposomal encapsulation efficiency of SAHA and LAQ (29-35% EE, final drug concentration > 1 mM). Liposomal encapsulated complexes (L-HDACi-Fe) exhibited sustained in vitro release properties compared to L-HDACi but cytotoxicity on PC-3 cells was comparable to free drugs. The PK of L-LAQ-Fe revealed 15-fold improvement in the plasma t1/2 (12.11 h)and 211-fold improvement in the AUC∞ (105.7 µg·h/ml) compared to free LAQ (0.79 h, 0.5 µg·h/ml). Similarly, the plasma t1/2 of Fe was determined to be 11.83 h in a separate experiment using radioactive Fe-59. The majority of Fe-59 activity was found in liver and spleen of rats and correlates with liposomal uptake by the mononuclear phagocyte system. CONCLUSIONS. We have demonstrated that encapsulation of Fe complexes of HDACi into PEGylated liposomes can improve overall drug aqueous solubility, in vitro release and in

  1. Insight to structural subsite recognition in plant thiol protease-inhibitor complexes : Understanding the basis of differential inhibition and the role of water

    Directory of Open Access Journals (Sweden)

    Mukhopadhayay Bishnu P

    2001-09-01

    Full Text Available Abstract Background This work represents an extensive MD simulation / water-dynamics studies on a series of complexes of inhibitors (leupeptin, E-64, E-64-C, ZPACK and plant cysteine proteases (actinidin, caricain, chymopapain, calotropin DI of papain family to understand the various interactions, water binding mode, factors influencing it and the structural basis of differential inhibition. Results The tertiary structure of the enzyme-inhibitor complexes were built by visual interactive modeling and energy minimization followed by dynamic simulation of 120 ps in water environment. DASA study with and without the inhibitor revealed the potential subsite residues involved in inhibition. Though the interaction involving main chain atoms are similar, critical inspection of the complexes reveal significant differences in the side chain interactions in S2-P2 and S3-P3 pairs due to sequence differences in the equivalent positions of respective subsites leading to differential inhibition. Conclusion The key finding of the study is a conserved site of a water molecule near oxyanion hole of the enzyme active site, which is found in all the modeled complexes and in most crystal structures of papain family either native or complexed. Conserved water molecules at the ligand binding sites of these homologous proteins suggest the structural importance of the water, which changes the conventional definition of chemical geometry of inhibitor binding domain, its shape and complimentarity. The water mediated recognition of inhibitor to enzyme subsites (Pn...H2O....Sn of leupeptin acetyl oxygen to caricain, chymopapain and calotropinDI is an additional information and offer valuable insight to potent inhibitor design.

  2. Next-generation mTOR inhibitors in clinical oncology: how pathway complexity informs therapeutic strategy.

    LENUS (Irish Health Repository)

    Wander, Seth A

    2011-04-01

    Mammalian target of rapamycin (mTOR) is a PI3K-related kinase that regulates cell growth, proliferation, and survival via mTOR complex 1 (mTORC1) and mTORC2. The mTOR pathway is often aberrantly activated in cancers. While hypoxia, nutrient deprivation, and DNA damage restrain mTORC1 activity, multiple genetic events constitutively activate mTOR in cancers. Here we provide a brief overview of the signaling pathways up- and downstream of mTORC1 and -2, and discuss the insights into therapeutic anticancer targets - both those that have been tried in the clinic with limited success and those currently under clinical development - that knowledge of these pathways gives us.

  3. Composite Dos Attack Model

    Directory of Open Access Journals (Sweden)

    Simona Ramanauskaitė

    2012-04-01

    Full Text Available Preparation for potential threats is one of the most important phases ensuring system security. It allows evaluating possible losses, changes in the attack process, the effectiveness of used countermeasures, optimal system settings, etc. In cyber-attack cases, executing real experiments can be difficult for many reasons. However, mathematical or programming models can be used instead of conducting experiments in a real environment. This work proposes a composite denial of service attack model that combines bandwidth exhaustion, filtering and memory depletion models for a more real representation of similar cyber-attacks. On the basis of the introduced model, different experiments were done. They showed the main dependencies of the influence of attacker and victim’s properties on the success probability of denial of service attack. In the future, this model can be used for the denial of service attack or countermeasure optimization.

  4. LHX3 interacts with inhibitor of histone acetyltransferase complex subunits LANP and TAF-1β to modulate pituitary gene regulation.

    Science.gov (United States)

    Hunter, Chad S; Malik, Raleigh E; Witzmann, Frank A; Rhodes, Simon J

    2013-01-01

    LIM-homeodomain 3 (LHX3) is a transcription factor required for mammalian pituitary gland and nervous system development. Human patients and animal models with LHX3 gene mutations present with severe pediatric syndromes that feature hormone deficiencies and symptoms associated with nervous system dysfunction. The carboxyl terminus of the LHX3 protein is required for pituitary gene regulation, but the mechanism by which this domain operates is unknown. In order to better understand LHX3-dependent pituitary hormone gene transcription, we used biochemical and mass spectrometry approaches to identify and characterize proteins that interact with the LHX3 carboxyl terminus. This approach identified the LANP/pp32 and TAF-1β/SET proteins, which are components of the inhibitor of histone acetyltransferase (INHAT) multi-subunit complex that serves as a multifunctional repressor to inhibit histone acetylation and modulate chromatin structure. The protein domains of LANP and TAF-1β that interact with LHX3 were mapped using biochemical techniques. Chromatin immunoprecipitation experiments demonstrated that LANP and TAF-1β are associated with LHX3 target genes in pituitary cells, and experimental alterations of LANP and TAF-1β levels affected LHX3-mediated pituitary gene regulation. Together, these data suggest that transcriptional regulation of pituitary genes by LHX3 involves regulated interactions with the INHAT complex.

  5. Crystal structures of T. b. rhodesiense adenosine kinase complexed with inhibitor and activator: implications for catalysis and hyperactivation.

    Directory of Open Access Journals (Sweden)

    Sabine Kuettel

    2011-05-01

    Full Text Available BACKGROUND: The essential purine salvage pathway of Trypanosoma brucei bears interesting catalytic enzymes for chemotherapeutic intervention of Human African Trypanosomiasis. Unlike mammalian cells, trypanosomes lack de novo purine synthesis and completely rely on salvage from their hosts. One of the key enzymes is adenosine kinase which catalyzes the phosphorylation of ingested adenosine to form adenosine monophosphate (AMP utilizing adenosine triphosphate (ATP as the preferred phosphoryl donor. METHODS AND FINDINGS: Here, we present the first structures of Trypanosoma brucei rhodesiense adenosine kinase (TbrAK: the structure of TbrAK in complex with the bisubstrate inhibitor P(1,P(5-di(adenosine-5'-pentaphosphate (AP5A at 1.55 Å, and TbrAK complexed with the recently discovered activator 4-[5-(4-phenoxyphenyl-2H-pyrazol-3-yl]morpholine (compound 1 at 2.8 Å resolution. CONCLUSIONS: The structural details and their comparison give new insights into substrate and activator binding to TbrAK at the molecular level. Further structure-activity relationship analyses of a series of derivatives of compound 1 support the observed binding mode of the activator and provide a possible mechanism of action with respect to their activating effect towards TbrAK.

  6. Crystallization and Preliminary Diffraction Analysis of the CAL PDZ Domain in Complex with a Selective Peptide Inhibitor

    Energy Technology Data Exchange (ETDEWEB)

    J Amacher; P Cushing; J Weiner; D Madden

    2011-12-31

    Cystic fibrosis (CF) is associated with loss-of-function mutations in the CF transmembrane conductance regulator (CFTR), which regulates epithelial fluid and ion homeostasis. The CFTR cytoplasmic C-terminus interacts with a number of PDZ (PSD-95/Dlg/ZO-1) proteins that modulate its intracellular trafficking and chloride-channel activity. Among these, the CFTR-associated ligand (CAL) has a negative effect on apical-membrane expression levels of the most common disease-associated mutant {Delta}F508-CFTR, making CAL a candidate target for the treatment of CF. A selective peptide inhibitor of the CAL PDZ domain (iCAL36) has recently been developed and shown to stabilize apical expression of {Delta}F508-CFTR, enhancing net chloride-channel activity, both alone and in combination with the folding corrector corr-4a. As a basis for structural studies of the CAL-iCAL36 interaction, a purification protocol has been developed that increases the oligomeric homogeneity of the protein. Here, the cocrystallization of the complex in space group P2{sub 1}2{sub 1}2{sub 1}, with unit-cell parameters a = 35.9, b = 47.7, c = 97.3 {angstrom}, is reported. The crystals diffracted to 1.4 {angstrom} resolution. Based on the calculated Matthews coefficient (1.96 {angstrom}{sup 3} Da{sup -1}), it appears that the asymmetric unit contains two complexes.

  7. Changes in signal transducer and activator of transcription 3 (STAT3) dynamics induced by complexation with pharmacological inhibitors of Src homology 2 (SH2) domain dimerization.

    Science.gov (United States)

    Resetca, Diana; Haftchenary, Sina; Gunning, Patrick T; Wilson, Derek J

    2014-11-21

    The activity of the transcription factor signal transducer and activator of transcription 3 (STAT3) is dysregulated in a number of hematological and solid malignancies. Development of pharmacological STAT3 Src homology 2 (SH2) domain interaction inhibitors holds great promise for cancer therapy, and a novel class of salicylic acid-based STAT3 dimerization inhibitors that includes orally bioavailable drug candidates has been recently developed. The compounds SF-1-066 and BP-1-102 are predicted to bind to the STAT3 SH2 domain. However, given the highly unstructured and dynamic nature of the SH2 domain, experimental confirmation of this prediction was elusive. We have interrogated the protein-ligand interaction of STAT3 with these small molecule inhibitors by means of time-resolved electrospray ionization hydrogen-deuterium exchange mass spectrometry. Analysis of site-specific evolution of deuterium uptake induced by the complexation of STAT3 with SF-1-066 or BP-1-102 under physiological conditions enabled the mapping of the in silico predicted inhibitor binding site to the STAT3 SH2 domain. The binding of both inhibitors to the SH2 domain resulted in significant local decreases in dynamics, consistent with solvent exclusion at the inhibitor binding site and increased rigidity of the inhibitor-complexed SH2 domain. Interestingly, inhibitor binding induced hot spots of allosteric perturbations outside of the SH2 domain, manifesting mainly as increased deuterium uptake, in regions of STAT3 important for DNA binding and nuclear localization. © 2014 by The American Society for Biochemistry and Molecular Biology, Inc.

  8. Structures of the Peptidoglycan N-Acetylglucosamine Deacetylase Bc1974 and Its Complexes with Zinc Metalloenzyme Inhibitors.

    Science.gov (United States)

    Giastas, Petros; Andreou, Athena; Papakyriakou, Athanasios; Koutsioulis, Dimitris; Balomenou, Stavroula; Tzartos, Socrates J; Bouriotis, Vassilis; Eliopoulos, Elias E

    2018-02-06

    The cell wall peptidoglycan is recognized as a primary target of the innate immune system, and usually its disintegration results in bacterial lysis. Bacillus cereus, a close relative of the highly virulent Bacillus anthracis, contains 10 polysaccharide deacetylases. Among these, the peptidoglycan N-acetylglucosamine deacetylase Bc1974 is the highest homologue to the Bacillus anthracis Ba1977 that is required for full virulence and is involved in resistance to the host's lysozyme. These metalloenzymes belong to the carbohydrate esterase family 4 (CE4) and are attractive targets for the development of new anti-infective agents. Herein we report the first X-ray crystal structures of the NodB domain of Bc1974, the conserved catalytic core of CE4s, in the unliganded form and in complex with four known metalloenzyme inhibitors and two amino acid hydroxamates that target the active site metal. These structures revealed the presence of two conformational states of a catalytic loop known as motif-4 (MT4), which were not observed previously for peptidoglycan deacetylases, but were recently shown in the structure of a Vibrio clolerae chitin deacetylase. By employing molecular docking of a substrate model, we describe a catalytic mechanism that probably involves initial binding of the substrate in a receptive, more open state of MT4 and optimal catalytic activity in the closed state of MT4, consistent with the previous observations. The ligand-bound structures presented here, in addition to the five Bc1974 inhibitors identified, provide a valuable basis for the design of antibacterial agents that target the peptidoglycan deacetylase Ba1977.

  9. Discovery and Molecular Basis of a Diverse Set of Polycomb Repressive Complex 2 Inhibitors Recognition by EED.

    Directory of Open Access Journals (Sweden)

    Ling Li

    Full Text Available Polycomb repressive complex 2 (PRC2, a histone H3 lysine 27 methyltransferase, plays a key role in gene regulation and is a known epigenetics drug target for cancer therapy. The WD40 domain-containing protein EED is the regulatory subunit of PRC2. It binds to the tri-methylated lysine 27 of the histone H3 (H3K27me3, and through which stimulates the activity of PRC2 allosterically. Recently, we disclosed a novel PRC2 inhibitor EED226 which binds to the K27me3-pocket on EED and showed strong antitumor activity in xenograft mice model. Here, we further report the identification and validation of four other EED binders along with EED162, the parental compound of EED226. The crystal structures for all these five compounds in complex with EED revealed a common deep pocket induced by the binding of this diverse set of compounds. This pocket was created after significant conformational rearrangement of the aromatic cage residues (Y365, Y148 and F97 in the H3K27me3 binding pocket of EED, the width of which was delineated by the side chains of these rearranged residues. In addition, all five compounds interact with the Arg367 at the bottom of the pocket. Each compound also displays unique features in its interaction with EED, suggesting the dynamics of the H3K27me3 pocket in accommodating the binding of different compounds. Our results provide structural insights for rational design of novel EED binder for the inhibition of PRC2 complex activity.

  10. Designing inhibitors of cytochrome c/cardiolipin peroxidase complexes: mitochondria-targeted imidazole-substituted fatty acids.

    Science.gov (United States)

    Jiang, Jianfei; Bakan, Ahmet; Kapralov, Alexandr A; Silva, K Ishara; Huang, Zhentai; Amoscato, Andrew A; Peterson, James; Garapati, Venkata Krishna; Saxena, Sunil; Bayir, Hülya; Atkinson, Jeffrey; Bahar, Ivet; Kagan, Valerian E

    2014-06-01

    Mitochondria have emerged as the major regulatory platform responsible for the coordination of numerous metabolic reactions as well as cell death processes, whereby the execution of intrinsic apoptosis includes the production of reactive oxygen species fueling oxidation of cardiolipin (CL) catalyzed by cytochrome (Cyt) c. As this oxidation occurs within the peroxidase complex of Cyt c with CL, the latter represents a promising target for the discovery and design of drugs with antiapoptotic mechanisms of action. In this work, we designed and synthesized a new group of mitochondria-targeted imidazole-substituted analogs of stearic acid TPP-n-ISAs with various positions of the attached imidazole group on the fatty acid (n = 6, 8, 10, 13, and 14). By using a combination of absorption spectroscopy and EPR protocols (continuous wave electron paramagnetic resonance and electron spin echo envelope modulation) we demonstrated that TPP-n-ISAs indeed were able to potently suppress CL-induced structural rearrangements in Cyt c, paving the way to its peroxidase competence. TPP-n-ISA analogs preserved the low-spin hexa-coordinated heme-iron state in Cyt c/CL complexes whereby TPP-6-ISA displayed a significantly more effective preservation pattern than TPP-14-ISA. Elucidation of these intermolecular stabilization mechanisms of Cyt c identified TPP-6-ISA as an effective inhibitor of the peroxidase function of Cyt c/CL complexes with a significant antiapoptotic potential realized in mouse embryonic cells exposed to ionizing irradiation. These experimental findings were detailed and supported by all-atom molecular dynamics simulations. Based on the experimental data and computation predictions, we identified TPP-6-ISA as a candidate drug with optimized antiapoptotic potency. Copyright © 2014 Elsevier Inc. All rights reserved.

  11. High resolution crystal structure of rat long chain hydroxy acid oxidase in complex with the inhibitor 4-carboxy-5-[(4-chlorophenyl)sulfanyl]-1, 2, 3-thiadiazole. Implications for inhibitor specificity and drug design

    Energy Technology Data Exchange (ETDEWEB)

    Chen, Zhi-wei; Vignaud, Caroline; Jaafar, Adil; Lévy, Bernard; Guéritte, Françoise; Guénard, Daniel; Lederer, Florence; Mathews, F. Scott (CNRS-UMR); (WU-MED)

    2012-05-24

    Long chain hydroxy acid oxidase (LCHAO) is responsible for the formation of methylguanidine, a toxic compound with elevated serum levels in patients with chronic renal failure. Its isozyme glycolate oxidase (GOX), has a role in the formation of oxalate, which can lead to pathological deposits of calcium oxalate, in particular in the disease primary hyperoxaluria. Inhibitors of these two enzymes may have therapeutic value. These enzymes are the only human members of the family of FMN-dependent L-2-hydroxy acid-oxidizing enzymes, with yeast flavocytochrome b{sub 2} (Fcb2) among its well studied members. We screened a chemical library for inhibitors, using in parallel rat LCHAO, human GOX and the Fcb2 flavodehydrogenase domain (FDH). Among the hits was an inhibitor, CCPST, with an IC{sub 50} in the micromolar range for all three enzymes. We report here the crystal structure of a complex between this compound and LCHAO at 1.3 {angstrom} resolution. In comparison with a lower resolution structure of this enzyme, binding of the inhibitor induces a conformational change in part of the TIM barrel loop 4, as well as protonation of the active site histidine. The CCPST interactions are compared with those it forms with human GOX and those formed by two other inhibitors with human GOX and spinach GOX. These compounds differ from CCPST in having the sulfur replaced with a nitrogen in the five-membered ring as well as different hydrophobic substituents. The possible reason for the {approx}100-fold difference in affinity between these two series of inhibitors is discussed. The present results indicate that specificity is an issue in the quest for therapeutic inhibitors of either LCHAO or GOX, but they may give leads for this quest.

  12. Identification of a rhodium(iii) complex as a Wee1 inhibitor against TP53-mutated triple-negative breast cancer cells.

    Science.gov (United States)

    Yang, Guan-Jun; Zhong, Hai-Jing; Ko, Chung-Nga; Wong, Suk-Yu; Vellaisamy, Kasipandi; Ye, Min; Ma, Dik-Lung; Leung, Chung-Hang

    2018-03-06

    The rhodium(iii) complex 1 was identified as a potent Wee1 inhibitor in vitro and in cellulo. It decreased Wee1 activity and unscheduled mitotic entry, and induced cell damage and death in TP53-mutated triple-negative breast cancer cells. 1 represents a promising scaffold for further development of more potent metal-based Wee1 antagonists.

  13. The protein phosphatase-1/inhibitor-2 complex differentially regulates GSK3 dephosphorylation and increases sarcoplasmic/endoplasmic reticulum calcium ATPase 2 levels

    International Nuclear Information System (INIS)

    King, Taj D.; Gandy, Johanna C.; Bijur, Gautam N.

    2006-01-01

    The ubiquitously expressed protein glycogen synthase kinase-3 (GSK3) is constitutively active, however its activity is markedly diminished following phosphorylation of Ser21 of GSK3α and Ser9 of GSK3β. Although several kinases are known to phosphorylate Ser21/9 of GSK3, for example Akt, relatively much less is known about the mechanisms that cause the dephosphorylation of GSK3 at Ser21/9. In the present study KCl-induced plasma membrane depolarization of SH-SY5Y cells, which increases intracellular calcium concentrations caused a transient decrease in the phosphorylation of Akt at Thr308 and Ser473, and GSK3 at Ser21/9. Overexpression of the selective protein phosphatase-1 inhibitor protein, inhibitor-2, increased basal GSK3 phosphorylation at Ser21/9 and significantly blocked the KCl-induced dephosphorylation of GSK3β, but not GSK3α. The phosphorylation of Akt was not affected by the overexpression of inhibitor-2. GSK3 activity is known to affect sarcoplasmic/endoplasmic reticulum calcium ATPase 2 (SERCA2) levels. Overexpression of inhibitor-2 or treatment of cells with the GSK3 inhibitors lithium and SB216763 increased the levels of SERCA2. These results indicate that the protein phosphatase-1/inhibitor-2 complex differentially regulates GSK3 dephosphorylation induced by KCl and that GSK3 activity regulates SERCA2 levels

  14. Dissociation of branched-chain alpha-keto acid dehydrogenase kinase (BDK) from branched-chain alpha-keto acid dehydrogenase complex (BCKDC) by BDK inhibitors.

    Science.gov (United States)

    Murakami, Taro; Matsuo, Masayuki; Shimizu, Ayako; Shimomura, Yoshiharu

    2005-02-01

    Branched-chain alpha-keto acid dehydrogenase kinase (BDK) phosphorylates and inactivates the branched-chain alpha-keto acid dehydrogenase complex (BCKDC), which is the rate-limiting enzyme in the branched-chain amino acid catabolism. BDK has been believed to be bound to the BCKDC. However, recent our studies demonstrated that protein-protein interaction between BDK and BCKDC is one of the factors to regulate BDK activity. Furthermore, only the bound form of BDK appears to have its activity. In the present study, we examined effects of BDK inhibitors on the amount of BDK bound to the BCKDC using rat liver extracts. The bound form of BDK in the extracts of liver from low protein diet-fed rats was measured by an immunoprecipitation pull down assay with or without BDK inhibitors. Among the BDK inhibitors. alpha-ketoisocaproate, alpha-chloroisocaproate, and a-ketoisovalerate released the BDK from the complex. Furthermore, the releasing effect of these inhibitors on the BDK appeared to depend on their inhibition constants. On the other hand, clofibric acid and thiamine pyrophosphate had no effect on the protein-protein interaction between two enzymes. These results suggest that the dissociation of the BDK from the BCKDC is one of the mechanisms responsible for the action of some inhibitors to BDK.

  15. Enzyme-coupled nanoparticles-assisted laser desorption ionization mass spectrometry for searching for low-mass inhibitors of enzymes in complex mixtures.

    Science.gov (United States)

    Salwiński, Aleksander; Da Silva, David; Delépée, Raphaël; Maunit, Benoît

    2014-04-01

    In this report, enzyme-coupled magnetic nanoparticles (EMPs) were shown to be an effective affinity-based tool for finding specific interactions between enzymatic targets and the low-mass molecules in complex mixtures using classic MALDI-TOF apparatus. EMPs used in this work act as nonorganic matrix enabling ionization of small molecules without any interference in the low-mass range (enzyme-coupled nanoparticles-assisted laser desorption ionization MS, ENALDI MS) and simultaneously carry the superficial specific binding sites to capture inhibitors present in a studied mixture. We evaluated ENALDI approach in two complementary variations: 'ion fading' (IF-ENALDI), based on superficial adsorption of inhibitors and 'ion hunting' (IH-ENALDI), based on selective pre-concentration of inhibitors. IF-ENALDI was applied for two sets of enzyme-inhibitor pairs: tyrosinase-glabridin and trypsin-leupeptin and for the real plant sample: Sparrmannia discolor leaf and stem methanol extract. The efficacy of IH-ENALDI was shown for the pair of trypsin-leupeptin. Both ENALDI approaches pose an alternative for bioassay-guided fractionation, the common method for finding inhibitors in the complex mixtures.

  16. Crystal structures of Leishmania mexicana arginase complexed with α,α-disubstituted boronic amino-acid inhibitors

    Energy Technology Data Exchange (ETDEWEB)

    Hai, Yang; Christianson, David W.

    2016-03-16

    Leishmaniaarginase is a potential drug target for the treatment of leishmaniasis because this binuclear manganese metalloenzyme initiatesde novopolyamine biosynthesis by catalyzing the hydrolysis of L-arginine to generate L-ornithine and urea. The product L-ornithine subsequently undergoes decarboxylation to yield putrescine, which in turn is utilized for spermidine biosynthesis. Polyamines such as spermidine are essential for the growth and survival of the parasite, so inhibition of enzymes in the polyamine-biosynthetic pathway comprises an effective strategy for treating parasitic infections. To this end, two X-ray crystal structures ofL. mexicanaarginase complexed with α,α-disubstituted boronic amino-acid inhibitors based on the molecular scaffold of 2-(S)-amino-6-boronohexanoic acid are now reported. Structural comparisons with human and parasitic arginase complexes reveal interesting differences in the binding modes of the additional α-substituents,i.e.the D side chains, of these inhibitors. Subtle differences in the three-dimensional contours of the outer active-site rims among arginases from different species lead to different conformations of the D side chains and thus different inhibitor-affinity trends. The structures suggest that it is possible to maintain affinity while fine-tuning intermolecular interactions of the D side chain of α,α-disubstituted boronic amino-acid inhibitors in the search for isozyme-specific and species-specific arginase inhibitors.

  17. Web server attack analyzer

    OpenAIRE

    Mižišin, Michal

    2013-01-01

    Web server attack analyzer - Abstract The goal of this work was to create prototype of analyzer of injection flaws attacks on web server. Proposed solution combines capabilities of web application firewall and web server log analyzer. Analysis is based on configurable signatures defined by regular expressions. This paper begins with summary of web attacks, followed by detection techniques analysis on web servers, description and justification of selected implementation. In the end are charact...

  18. Seven Deadliest Microsoft Attacks

    CERN Document Server

    Kraus, Rob; Borkin, Mike; Alpern, Naomi

    2010-01-01

    Do you need to keep up with the latest hacks, attacks, and exploits effecting Microsoft products? Then you need Seven Deadliest Microsoft Attacks. This book pinpoints the most dangerous hacks and exploits specific to Microsoft applications, laying out the anatomy of these attacks including how to make your system more secure. You will discover the best ways to defend against these vicious hacks with step-by-step instruction and learn techniques to make your computer and network impenetrable. Windows Operating System-Password AttacksActive Directory-Escalat

  19. Transient Ischemic Attack

    Medline Plus

    Full Text Available ... stroke symptoms. Popular Topics TIA Cardiac Catheter Cholesterol Heart Attack Stent © 2018, American Heart Association, Inc. All rights reserved. Unauthorized use prohibited. ...

  20. Seven deadliest USB attacks

    CERN Document Server

    Anderson, Brian

    2010-01-01

    Do you need to keep up with the latest hacks, attacks, and exploits effecting USB technology? Then you need Seven Deadliest USB Attacks. This book pinpoints the most dangerous hacks and exploits specific to USB, laying out the anatomy of these attacks including how to make your system more secure. You will discover the best ways to defend against these vicious hacks with step-by-step instruction and learn techniques to make your computer and network impenetrable. Attacks detailed in this book include: USB Hacksaw USB Switchblade USB Based Virus/Malicous Code Launch USB Device Overflow RAMdum

  1. A new inhibitor of the β-arrestin/AP2 endocytic complex reveals interplay between GPCR internalization and signalling

    Science.gov (United States)

    Beautrait, Alexandre; Paradis, Justine S.; Zimmerman, Brandon; Giubilaro, Jenna; Nikolajev, Ljiljana; Armando, Sylvain; Kobayashi, Hiroyuki; Yamani, Lama; Namkung, Yoon; Heydenreich, Franziska M.; Khoury, Etienne; Audet, Martin; Roux, Philippe P.; Veprintsev, Dmitry B.; Laporte, Stéphane A.; Bouvier, Michel

    2017-04-01

    In addition to G protein-coupled receptor (GPCR) desensitization and endocytosis, β-arrestin recruitment to ligand-stimulated GPCRs promotes non-canonical signalling cascades. Distinguishing the respective contributions of β-arrestin recruitment to the receptor and β-arrestin-promoted endocytosis in propagating receptor signalling has been limited by the lack of selective analytical tools. Here, using a combination of virtual screening and cell-based assays, we have identified a small molecule that selectively inhibits the interaction between β-arrestin and the β2-adaptin subunit of the clathrin adaptor protein AP2 without interfering with the formation of receptor/β-arrestin complexes. This selective β-arrestin/β2-adaptin inhibitor (Barbadin) blocks agonist-promoted endocytosis of the prototypical β2-adrenergic (β2AR), V2-vasopressin (V2R) and angiotensin-II type-1 (AT1R) receptors, but does not affect β-arrestin-independent (transferrin) or AP2-independent (endothelin-A) receptor internalization. Interestingly, Barbadin fully blocks V2R-stimulated ERK1/2 activation and blunts cAMP accumulation promoted by both V2R and β2AR, supporting the concept of β-arrestin/AP2-dependent signalling for both G protein-dependent and -independent pathways.

  2. PF-1355, a mechanism-based myeloperoxidase inhibitor, prevents immune complex vasculitis and anti-glomerular basement membrane glomerulonephritis.

    Science.gov (United States)

    Zheng, Wei; Warner, Roscoe; Ruggeri, Roger; Su, Chunyan; Cortes, Christian; Skoura, Athanasia; Ward, Jessica; Ahn, Kay; Kalgutkar, Amit; Sun, Dexue; Maurer, Tristan S; Bonin, Paul D; Okerberg, Carlin; Bobrowski, Walter; Kawabe, Thomas; Zhang, Yanwei; Coskran, Timothy; Bell, Sammy; Kapoor, Bhupesh; Johnson, Kent; Buckbinder, Leonard

    2015-05-01

    Small vessel vasculitis is a life-threatening condition and patients typically present with renal and pulmonary injury. Disease pathogenesis is associated with neutrophil accumulation, activation, and oxidative damage, the latter being driven in large part by myeloperoxidase (MPO), which generates hypochlorous acid among other oxidants. MPO has been associated with vasculitis, disseminated vascular inflammation typically involving pulmonary and renal microvasculature and often resulting in critical consequences. MPO contributes to vascular injury by 1) catabolizing nitric oxide, impairing vasomotor function; 2) causing oxidative damage to lipoproteins and endothelial cells, leading to atherosclerosis; and 3) stimulating formation of neutrophil extracellular traps, resulting in vessel occlusion and thrombosis. Here we report a selective 2-thiouracil mechanism-based MPO inhibitor (PF-1355 [2-(6-(2,5-dimethoxyphenyl)-4-oxo-2-thioxo-3,4-dihydropyrimidin-1(2H)-yl)acetamide) and demonstrate that MPO is a critical mediator of vasculitis in mouse disease models. A pharmacokinetic/pharmacodynamic response model of PF-1355 exposure in relation with MPO activity was derived from mouse peritonitis. The contribution of MPO activity to vasculitis was then examined in an immune complex model of pulmonary disease. Oral administration of PF-1355 reduced plasma MPO activity, vascular edema, neutrophil recruitment, and elevated circulating cytokines. In a model of anti-glomerular basement membrane disease, formerly known as Goodpasture disease, albuminuria and chronic renal dysfunction were completely suppressed by PF-1355 treatment. This study shows that MPO activity is critical in driving immune complex vasculitis and provides confidence in testing the hypothesis that MPO inhibition will provide benefit in treating human vasculitic diseases. Copyright © 2015 by The American Society for Pharmacology and Experimental Therapeutics.

  3. Overexpression, purification, crystallization and preliminary X-ray analysis of uracil N-glycosylase from Mycobacterium tuberculosis in complex with a proteinaceous inhibitor

    Energy Technology Data Exchange (ETDEWEB)

    Singh, Prem [Molecular Biophysics Unit, Indian Institute of Science, Bangalore 560 012 (India); Talawar, Ramappa K.; Krishna, P. D. V.; Varshney, Umesh [Department of Microbiology and Cell Biology, Indian Institute of Science, Bangalore 560 012 (India); Vijayan, M., E-mail: mv@mbu.iisc.ernet.in [Molecular Biophysics Unit, Indian Institute of Science, Bangalore 560 012 (India)

    2006-12-01

    Uracil N-glycosylase from M. tuberculosis has been crystallized in complex with a proteinaceous inhibitor (Ugi) and X-ray diffraction data have been collected. Uracil N-glycosylase is an enzyme which initiates the pathway of uracil-excision repair of DNA. The enzyme from Mycobacterium tuberculosis was co-expressed with a proteinaceous inhibitor from Bacillus subtilis phage and was crystallized in monoclinic space group C2, with unit-cell parameters a = 201.14, b = 64.27, c = 203.68 Å, β = 109.7°. X-ray data from the crystal have been collected for structure analysis.

  4. Overexpression, purification, crystallization and preliminary X-ray analysis of uracil N-glycosylase from Mycobacterium tuberculosis in complex with a proteinaceous inhibitor

    International Nuclear Information System (INIS)

    Singh, Prem; Talawar, Ramappa K.; Krishna, P. D. V.; Varshney, Umesh; Vijayan, M.

    2006-01-01

    Uracil N-glycosylase from M. tuberculosis has been crystallized in complex with a proteinaceous inhibitor (Ugi) and X-ray diffraction data have been collected. Uracil N-glycosylase is an enzyme which initiates the pathway of uracil-excision repair of DNA. The enzyme from Mycobacterium tuberculosis was co-expressed with a proteinaceous inhibitor from Bacillus subtilis phage and was crystallized in monoclinic space group C2, with unit-cell parameters a = 201.14, b = 64.27, c = 203.68 Å, β = 109.7°. X-ray data from the crystal have been collected for structure analysis

  5. Current therapy for chronic cerebrovascular attack

    Directory of Open Access Journals (Sweden)

    A. A. Shmonin

    2015-01-01

    Full Text Available Chronic cerebrovascular attack (CCVA is a brain lesion caused by vascular factors. CCVA appears as cognitive impairments (CIs, affective (emotional disorders and focal syndromes. Treatment for CCVA requires a comprehensive approach. Effective combination therapy for CCVA involves secondary prevention of stroke and CIs; treatment of CIs; treatment of depression and other affective disorders; and neuroprotective therapy. Basic therapy for CCVA includes modification of risk factors, antihypertensive, hypolipidemic, and antithrombotic therapies. Central acetylcholinesterase inhibitors (galantamine, rivastigmine, donepezil and a reversible NMDA receptor blocker (memantine are symptomatically used at a stage of vascular and mixed dementia. There are no unique guidelines for the therapy of mild and moderate vascular nondementia-related CIs. Drug use, based on the neurochemical mechanisms underlying the development of vascular CIs, is substantiated. When choosing psychotropic agents, it is necessary to take into account the causes and clinical manifestations of neuromediator deficiency. Antidepressants are used as essential drugs. Neuroleptics and tranquilizers are additionally administered in complex-pattern syndromes, such as depression with marked anxiety. Prescription of neuroprotectors may be effective in treating both stroke and CCVA. These medicaments are most effective when a damaging factor acts, i.e. neuroprotectors should be given in a risk situation and to reduce damage. Citicoline is one of the most test drugs in a group of neuroprotectors. 

  6. Situational awareness of a coordinated cyber attack

    Science.gov (United States)

    Sudit, Moises; Stotz, Adam; Holender, Michael

    2005-03-01

    As technology continues to advance, services and capabilities become computerized, and an ever increasing amount of business is conducted electronically the threat of cyber attacks gets compounded by the complexity of such attacks and the criticality of the information which must be secured. A new age of virtual warfare has dawned in which seconds can differentiate between the protection of vital information and/or services and a malicious attacker attaining their goal. In this paper we present a novel approach in the real-time detection of multistage coordinated cyber attacks and the promising initial testing results we have obtained. We introduce INFERD (INformation Fusion Engine for Real-time Decision-making), an adaptable information fusion engine which performs fusion at levels zero, one, and two to provide real-time situational assessment and its application to the cyber domain in the ECCARS (Event Correlation for Cyber Attack Recognition System) system. The advantages to our approach are fourfold: (1) The complexity of the attacks which we consider, (2) the level of abstraction in which the analyst interacts with the attack scenarios, (3) the speed at which the information fusion is presented and performed, and (4) our disregard for ad-hoc rules or a priori parameters.

  7. Heart attack - discharge

    Science.gov (United States)

    ... and lifestyle Cholesterol - drug treatment Controlling your high blood pressure Deep vein thrombosis - discharge Dietary fats explained Fast food tips Heart attack - discharge Heart attack - what to ask your doctor Heart bypass ... pacemaker - discharge High blood pressure - what to ask your doctor How to read ...

  8. Preparation and crystallization of the Grb7 SH2 domain in complex with the G7-18NATE nonphosphorylated cyclic inhibitor peptide

    International Nuclear Information System (INIS)

    Yap, Min Y.; Wilce, Matthew C. J.; Clayton, Daniel J.; Perlmutter, Patrick; Aguilar, Marie-Isabel; Wilce, Jacqueline A.

    2010-01-01

    The preparation and successful crystallization of the Grb7 SH2 domain in complex with the specific cyclic peptide inhibitor G7-18NATE are reported. This structure is anticipated to reveal the basis of the binding affinity and specificity and to assist with the development of second-generation inhibitors of Grb7, which is involved in cancer progression. Grb7 is an adapter protein that is involved in signalling pathways that mediate eukaryotic cell proliferation and migration. Its overexpression in several cancer types has implicated it in cancer progression and led to the development of the G7-18NATE cyclic peptide inhibitor. Here, the preparation of crystals of G7-18NATE in complex with its Grb7 SH2 domain target is reported. Crystals of the complex were grown by the hanging-drop vapour-diffusion method using PEG 3350 as the precipitant at room temperature. X-ray diffraction data were collected from crystals to 2.4 Å resolution using synchrotron X-ray radiation at 100 K. The diffraction was consistent with space group P2 1 , with unit-cell parameters a = 52.7, b = 79.1, c = 54.7 Å, α = γ = 90.0, β = 104.4°. The structure of the G7-18NATE peptide in complex with its target will facilitate the rational development of Grb7-targeted cancer therapeutics

  9. The kinase inhibitor SFV785 dislocates dengue virus envelope protein from the replication complex and blocks virus assembly.

    Directory of Open Access Journals (Sweden)

    Azlinda Anwar

    Full Text Available Dengue virus (DENV is the etiologic agent for dengue fever, for which there is no approved vaccine or specific anti-viral drug. As a remedy for this, we explored the use of compounds that interfere with the action of required host factors and describe here the characterization of a kinase inhibitor (SFV785, which has selective effects on NTRK1 and MAPKAPK5 kinase activity, and anti-viral activity on Hepatitis C, DENV and yellow fever viruses. SFV785 inhibited DENV propagation without inhibiting DENV RNA synthesis or translation. The compound did not cause any changes in the cellular distribution of non-structural 3, a protein critical for DENV RNA synthesis, but altered the distribution of the structural envelope protein from a reticulate network to enlarged discrete vesicles, which altered the co-localization with the DENV replication complex. Ultrastructural electron microscopy analyses of DENV-infected SFV785-treated cells showed the presence of viral particles that were distinctly different from viable enveloped virions within enlarged ER cisternae. These viral particles were devoid of the dense nucleocapsid. The secretion of the viral particles was not inhibited by SFV785, however a reduction in the amount of secreted infectious virions, DENV RNA and capsid were observed. Collectively, these observations suggest that SFV785 inhibited the recruitment and assembly of the nucleocapsid in specific ER compartments during the DENV assembly process and hence the production of infectious DENV. SFV785 and derivative compounds could be useful biochemical probes to explore the DENV lifecycle and could also represent a new class of anti-virals.

  10. Critical neuropsychobiological analysis of panic attack- and anticipatory anxiety-like behaviors in rodents confronted with snakes in polygonal arenas and complex labyrinths: a comparison to the elevated plus- and T-maze behavioral tests

    Directory of Open Access Journals (Sweden)

    Norberto C. Coimbra

    Full Text Available Objective: To compare prey and snake paradigms performed in complex environments to the elevated plus-maze (EPM and T-maze (ETM tests for the study of panic attack- and anticipatory anxiety-like behaviors in rodents. Methods: PubMed was reviewed in search of articles focusing on the plus maze test, EPM, and ETM, as well as on defensive behaviors displayed by threatened rodents. In addition, the authors’ research with polygonal arenas and complex labyrinth (designed by the first author for confrontation between snakes and small rodents was examined. Results: The EPM and ETM tests evoke anxiety/fear-related defensive responses that are pharmacologically validated, whereas the confrontation between rodents and snakes in polygonal arenas with or without shelters or in the complex labyrinth offers ethological conditions for studying more complex defensive behaviors and the effects of anxiolytic and panicolytic drugs. Prey vs. predator paradigms also allow discrimination between non-oriented and oriented escape behavior. Conclusions: Both EPM and ETM simple labyrinths are excellent apparatuses for the study of anxiety- and instinctive fear-related responses, respectively. The confrontation between rodents and snakes in polygonal arenas, however, offers a more ethological environment for addressing both unconditioned and conditioned fear-induced behaviors and the effects of anxiolytic and panicolytic drugs.

  11. Critical neuropsychobiological analysis of panic attack- and anticipatory anxiety-like behaviors in rodents confronted with snakes in polygonal arenas and complex labyrinths: a comparison to the elevated plus- and T-maze behavioral tests.

    Science.gov (United States)

    Coimbra, Norberto C; Paschoalin-Maurin, Tatiana; Bassi, Gabriel S; Kanashiro, Alexandre; Biagioni, Audrey F; Felippotti, Tatiana T; Elias-Filho, Daoud H; Mendes-Gomes, Joyce; Cysne-Coimbra, Jade P; Almada, Rafael C; Lobão-Soares, Bruno

    2017-01-01

    To compare prey and snake paradigms performed in complex environments to the elevated plus-maze (EPM) and T-maze (ETM) tests for the study of panic attack- and anticipatory anxiety-like behaviors in rodents. PubMed was reviewed in search of articles focusing on the plus maze test, EPM, and ETM, as well as on defensive behaviors displayed by threatened rodents. In addition, the authors' research with polygonal arenas and complex labyrinth (designed by the first author for confrontation between snakes and small rodents) was examined. The EPM and ETM tests evoke anxiety/fear-related defensive responses that are pharmacologically validated, whereas the confrontation between rodents and snakes in polygonal arenas with or without shelters or in the complex labyrinth offers ethological conditions for studying more complex defensive behaviors and the effects of anxiolytic and panicolytic drugs. Prey vs. predator paradigms also allow discrimination between non-oriented and oriented escape behavior. Both EPM and ETM simple labyrinths are excellent apparatuses for the study of anxiety- and instinctive fear-related responses, respectively. The confrontation between rodents and snakes in polygonal arenas, however, offers a more ethological environment for addressing both unconditioned and conditioned fear-induced behaviors and the effects of anxiolytic and panicolytic drugs.

  12. Silver(I) complexes of 2,4-dihydroxybenzaldehyde-amino acid Schiff bases-Novel noncompetitive α-glucosidase inhibitors.

    Science.gov (United States)

    Zheng, Jingwei; Ma, Lin

    2015-01-01

    A series of silver(I) complexes of 2,4-dihydroxybenzaldehyde-amino acid Schiff bases were designed and tested for α-glucosidase inhibition. Our results indicate that all the silver complexes (4a-18a) possessed strong inhibitory activity at μmolL(-1) level, especially glutamine (12a) and histidine (18a) Schiff base silver(I) complexes exhibited an IC50 value of less than 0.01μmolL(-1). This series of compounds exhibited noncompetitive inhibition characteristics in kinetic studies. In addition, we investigated the mechanism of inhibition and the structure-activity relationships of the amino acid Schiff base silver complexes. Our results reveal that Schiff base silver complexes may be explored for their therapeutic potential as alternatives of α-glucosidase inhibitors. Copyright © 2015 Elsevier Ltd. All rights reserved.

  13. High-performance liquid chromatography coupled with post-column dual-bioactivity assay for simultaneous screening of xanthine oxidase inhibitors and free radical scavengers from complex mixture.

    Science.gov (United States)

    Li, D Q; Zhao, J; Li, S P

    2014-06-06

    Xanthine oxidase (XO) can catalyze hypoxanthine and xanthine to generate uric acid and reactive oxygen species (ROS), including superoxide anion radical (O₂(•-)) and hydrogen peroxide. XO inhibitors and free radical scavengers are beneficial to the treatment of gout and many related diseases. In the present study, an on-line high-performance liquid chromatography (HPLC) coupled with post-column dual-bioactivity assay was established and successfully applied to simultaneously screening of XO inhibitors and free radical scavengers from a complex mixture, Oroxylum indicum extract. The integrated system of HPLC separation, bioactivity screening and mass spectrometry identification was proved to be simple and effective for rapid and sensitive screening of individual bioactive compounds in complex mixtures. Copyright © 2014 Elsevier B.V. All rights reserved.

  14. The role of complement receptors type 1 (CR1, CD35) and 2 (CR2, CD21) in promoting C3 fragment deposition and membrane attack complex formation on normal peripheral human B cells

    DEFF Research Database (Denmark)

    Nielsen, Claus Henrik; Pedersen, Morten Løbner; Marquart, Hanne Vibeke Hansen

    2002-01-01

    Normal human B lymphocytes are known to activate the alternative pathway (AP) of complement, leading to C3-fragment deposition and membrane attack complex (MAC) formation. The process is mediated via complement receptor type 2 (CR2, CD21), with complement receptor type 1 (CR1, CD35) playing...... a subsidiary role. In this study, we examine the relative contributions of CR1 and CR2 to the deposition of C3 fragments and MAC on B lymphocytes under circumstances where all complement pathways are operational. C3-fragment deposition and MAC formation were assessed on human peripheral B lymphocytes...... in the presence of 30% autologous serum. Blocking the CR2 ligand-binding site with monoclonal antibody (mAb) FE8 resulted in significant reduction (37.9+/-11.9%) in C3-fragment deposition, whereas MAC formation was only marginally affected (12.1+/-22.2% reduction). Blocking the CR1 binding-site resulted...

  15. Quantitative Verification and Synthesis of Attack-Defence Scenarios

    DEFF Research Database (Denmark)

    Aslanyan, Zaruhi; Nielson, Flemming; Parker, David

    2016-01-01

    analysis of quantitative properties of complex attack-defence scenarios, using an extension of attack-defence trees which models temporal ordering of actions and allows explicit dependencies in the strategies adopted by attackers and defenders. We adopt a game-theoretic approach, translating attack...... which guarantee or optimise some quantitative property, such as the probability of a successful attack, the expected cost incurred, or some multi-objective trade-off between the two. We implement our approach, building upon the PRISM-games model checker, and apply it to a case study of an RFID goods...

  16. Directional Migration in Esophageal Squamous Cell Carcinoma (ESCC) is Epigenetically Regulated by SET Nuclear Oncogene, a Member of the Inhibitor of Histone Acetyltransferase Complex

    OpenAIRE

    Xiang Yuan; Xinshuai Wang; Bianli Gu; Yingjian Ma; Yiwen Liu; Man Sun; Jinyu Kong; Wei Sun; Huizhi Wang; Fuyou Zhou; Shegan Gao

    2017-01-01

    Directional cell migration is of fundamental importance to a variety of biological events, including metastasis of malignant cells. Herein, we specifically investigated SET oncoprotein, a subunit of the recently identified inhibitor of acetyltransferases (INHAT) complex and identified its role in the establishment of front–rear cell polarity and directional migration in Esophageal Squamous Cell Carcinoma (ESCC). We further define the molecular circuits that govern these processes by showing t...

  17. Transforming Graphical System Models To Graphical Attack Models

    NARCIS (Netherlands)

    Ivanova, Marieta Georgieva; Probst, Christian W.; Hansen, René Rydhof; Kammüller, Florian; Mauw, S.; Kordy, B.

    2015-01-01

    Manually identifying possible attacks on an organisation is a complex undertaking; many different factors must be considered, and the resulting attack scenarios can be complex and hard to maintain as the organisation changes. System models provide a systematic representation of organisations that

  18. Practical Attacks on AES-like Cryptographic Hash Functions

    DEFF Research Database (Denmark)

    Kölbl, Stefan; Rechberger, Christian

    2015-01-01

    to drastically reduce the complexity of attacks to very practical values for reduced-round versions. Furthermore, we describe new and practical attacks on Whirlpool and the recently proposed GOST R hash function with one or more of the following properties: more rounds, less time/memory complexity, and more...

  19. Metal complexes of salicylhydroxamic acid (H2Sha), anthranilic hydroxamic acid and benzohydroxamic acid. Crystal and molecular structure of [Cu(phen)2(Cl)]Cl x H2Sha, a model for a peroxidase-inhibitor complex.

    Science.gov (United States)

    O'Brien, E C; Farkas, E; Gil, M J; Fitzgerald, D; Castineras, A; Nolan, K B

    2000-04-01

    Stability constants of iron(III), copper(II), nickel(II) and zinc(II) complexes of salicylhydroxamic acid (H2Sha), anthranilic hydroxamic acid (HAha) and benzohydroxamic acid (HBha) have been determined at 25.0 degrees C, I=0.2 mol dm(-3) KCl in aqueous solution. The complex stability order, iron(III) > copper(II) > nickel(II) approximately = zinc(II) was observed whilst complexes of H2Sha were found to be more stable than those of the other two ligands. In the preparation of ternary metal ion complexes of these ligands and 1,10-phenanthroline (phen) the crystalline complex [Cu(phen)2(Cl)]Cl x H2Sha was obtained and its crystal structure determined. This complex is a model for hydroxamate-peroxidase inhibitor interactions.

  20. Heart Attack Payment - National

    Data.gov (United States)

    U.S. Department of Health & Human Services — Payment for heart attack patients measure – national data. This data set includes national-level data for payments associated with a 30-day episode of care for heart...

  1. Heart Attack Payment - Hospital

    Data.gov (United States)

    U.S. Department of Health & Human Services — Payment for heart attack patients measure – provider data. This data set includes provider data for payments associated with a 30-day episode of care for heart...

  2. Heart Attack Payment - State

    Data.gov (United States)

    U.S. Department of Health & Human Services — Payment for heart attack patients measure – state data. This data set includes state-level data for payments associated with a 30-day episode of care for heart...

  3. Cooperating attackers in neural cryptography.

    Science.gov (United States)

    Shacham, Lanir N; Klein, Einat; Mislovaty, Rachel; Kanter, Ido; Kinzel, Wolfgang

    2004-06-01

    A successful attack strategy in neural cryptography is presented. The neural cryptosystem, based on synchronization of neural networks by mutual learning, has been recently shown to be secure under different attack strategies. The success of the advanced attacker presented here, called the "majority-flipping attacker," does not decay with the parameters of the model. This attacker's outstanding success is due to its using a group of attackers which cooperate throughout the synchronization process, unlike any other attack strategy known. An analytical description of this attack is also presented, and fits the results of simulations.

  4. Molecular docking and molecular dynamics simulation study of inositol phosphorylceramide synthase – inhibitor complex in leishmaniasis: Insight into the structure based drug design [version 2; referees: 2 approved

    Directory of Open Access Journals (Sweden)

    Vineetha Mandlik

    2016-09-01

    Full Text Available Inositol phosphorylceramide synthase (IPCS has emerged as an important, interesting and attractive target in the sphingolipid metabolism of Leishmania. IPCS catalyzes the conversion of ceramide to IPC which forms the most predominant sphingolipid in Leishmania. IPCS has no mammalian equivalent and also plays an important role in maintaining the infectivity and viability of the parasite. The present study explores the possibility of targeting IPCS; development of suitable inhibitors for the same would serve as a treatment strategy for the infectious disease leishmaniasis. Five coumarin derivatives were developed as inhibitors of IPCS protein. Molecular dynamics simulations of the complexes of IPCS with these inhibitors were performed which provided insights into the binding modes of the inhibitors. In vitro screening of the top three compounds has resulted in the identification of one of the compounds (compound 3 which shows little cytotoxic effects. This compound therefore represents a good starting point for further in vivo experimentation and could possibly serve as an important drug candidate for the treatment of leishmaniasis.

  5. Robustness of non-interdependent and interdependent networks against dependent and adaptive attacks

    Science.gov (United States)

    Tyra, Adam; Li, Jingtao; Shang, Yilun; Jiang, Shuo; Zhao, Yanjun; Xu, Shouhuai

    2017-09-01

    Robustness of complex networks has been extensively studied via the notion of site percolation, which typically models independent and non-adaptive attacks (or disruptions). However, real-life attacks are often dependent and/or adaptive. This motivates us to characterize the robustness of complex networks, including non-interdependent and interdependent ones, against dependent and adaptive attacks. For this purpose, dependent attacks are accommodated by L-hop percolation where the nodes within some L-hop (L ≥ 0) distance of a chosen node are all deleted during one attack (with L = 0 degenerating to site percolation). Whereas, adaptive attacks are launched by attackers who can make node-selection decisions based on the network state in the beginning of each attack. The resulting characterization enriches the body of knowledge with new insights, such as: (i) the Achilles' Heel phenomenon is only valid for independent attacks, but not for dependent attacks; (ii) powerful attack strategies (e.g., targeted attacks and dependent attacks, dependent attacks and adaptive attacks) are not compatible and cannot help the attacker when used collectively. Our results shed some light on the design of robust complex networks.

  6. Cyber Attacks, Information Attacks, and Postmodern Warfare

    Directory of Open Access Journals (Sweden)

    Valuch Jozef

    2017-06-01

    Full Text Available The aim of this paper is to evaluate and differentiate between the phenomena of cyberwarfare and information warfare, as manifestations of what we perceive as postmodern warfare. We describe and analyse the current examples of the use the postmodern warfare and the reactions of states and international bodies to these phenomena. The subject matter of this paper is the relationship between new types of postmodern conflicts and the law of armed conflicts (law of war. Based on ICJ case law, it is clear that under current legal rules of international law of war, cyber attacks as well as information attacks (often performed in the cyberspace as well can only be perceived as “war” if executed in addition to classical kinetic warfare, which is often not the case. In most cases perceived “only” as a non-linear warfare (postmodern conflict, this practice nevertheless must be condemned as conduct contrary to the principles of international law and (possibly a crime under national laws, unless this type of conduct will be recognized by the international community as a “war” proper, in its new, postmodern sense.

  7. High-resolution crystal structure of Streptococcus pyogenes β-NAD{sup +} glycohydrolase in complex with its endogenous inhibitor IFS reveals a highly water-rich interface

    Energy Technology Data Exchange (ETDEWEB)

    Yoon, Ji Young; An, Doo Ri; Yoon, Hye-Jin [Seoul National University, Seoul 151-747 (Korea, Republic of); Kim, Hyoun Sook [Seoul National University, Seoul 151-747 (Korea, Republic of); Seoul National University, Seoul 151-742 (Korea, Republic of); Lee, Sang Jae [Seoul National University, Seoul 151-742 (Korea, Republic of); Im, Ha Na; Jang, Jun Young [Seoul National University, Seoul 151-747 (Korea, Republic of); Suh, Se Won, E-mail: sewonsuh@snu.ac.kr [Seoul National University, Seoul 151-747 (Korea, Republic of); Seoul National University, Seoul 151-747 (Korea, Republic of)

    2013-11-01

    The crystal structure of the complex between the C-terminal domain of Streptococcus pyogenes β-NAD{sup +} glycohydrolase and an endogenous inhibitor for SPN was determined at 1.70 Å. It reveals that the interface between the two proteins is highly rich in water molecules. One of the virulence factors produced by Streptococcus pyogenes is β-NAD{sup +} glycohydrolase (SPN). S. pyogenes injects SPN into the cytosol of an infected host cell using the cytolysin-mediated translocation pathway. As SPN is toxic to bacterial cells themselves, S. pyogenes possesses the ifs gene that encodes an endogenous inhibitor for SPN (IFS). IFS is localized intracellularly and forms a complex with SPN. This intracellular complex must be dissociated during export through the cell envelope. To provide a structural basis for understanding the interactions between SPN and IFS, the complex was overexpressed between the mature SPN (residues 38–451) and the full-length IFS (residues 1–161), but it could not be crystallized. Therefore, limited proteolysis was used to isolate a crystallizable SPN{sub ct}–IFS complex, which consists of the SPN C-terminal domain (SPN{sub ct}; residues 193–451) and the full-length IFS. Its crystal structure has been determined by single anomalous diffraction and the model refined at 1.70 Å resolution. Interestingly, our high-resolution structure of the complex reveals that the interface between SPN{sub ct} and IFS is highly rich in water molecules and many of the interactions are water-mediated. The wet interface may facilitate the dissociation of the complex for translocation across the cell envelope.

  8. High-resolution crystal structure of Streptococcus pyogenes β-NAD+ glycohydrolase in complex with its endogenous inhibitor IFS reveals a highly water-rich interface

    International Nuclear Information System (INIS)

    Yoon, Ji Young; An, Doo Ri; Yoon, Hye-Jin; Kim, Hyoun Sook; Lee, Sang Jae; Im, Ha Na; Jang, Jun Young; Suh, Se Won

    2013-01-01

    The crystal structure of the complex between the C-terminal domain of Streptococcus pyogenes β-NAD + glycohydrolase and an endogenous inhibitor for SPN was determined at 1.70 Å. It reveals that the interface between the two proteins is highly rich in water molecules. One of the virulence factors produced by Streptococcus pyogenes is β-NAD + glycohydrolase (SPN). S. pyogenes injects SPN into the cytosol of an infected host cell using the cytolysin-mediated translocation pathway. As SPN is toxic to bacterial cells themselves, S. pyogenes possesses the ifs gene that encodes an endogenous inhibitor for SPN (IFS). IFS is localized intracellularly and forms a complex with SPN. This intracellular complex must be dissociated during export through the cell envelope. To provide a structural basis for understanding the interactions between SPN and IFS, the complex was overexpressed between the mature SPN (residues 38–451) and the full-length IFS (residues 1–161), but it could not be crystallized. Therefore, limited proteolysis was used to isolate a crystallizable SPN ct –IFS complex, which consists of the SPN C-terminal domain (SPN ct ; residues 193–451) and the full-length IFS. Its crystal structure has been determined by single anomalous diffraction and the model refined at 1.70 Å resolution. Interestingly, our high-resolution structure of the complex reveals that the interface between SPN ct and IFS is highly rich in water molecules and many of the interactions are water-mediated. The wet interface may facilitate the dissociation of the complex for translocation across the cell envelope

  9. Phorbol-ester-induced activation of the NF-κB transcription factor involves dissociation of an apparently cytoplasmic NF-κB/inhibitor complex

    International Nuclear Information System (INIS)

    Baeuerle, P.A.; Lenardo, M.; Pierce, J.W.; Baltimore, D.

    1988-01-01

    There is increasing evidence that inducible transcription of genes is mediated through the induction of the activity of trans-acting protein factors. The NF-κB transcription factor provides a model system to study the posttranslational activation of a phorbol-ester-inducible transcription factor. The finding that NF-κB activity is undectable in subcellular fractions from unstimulated cells suggests that NF-κB exists as an inactive precursor. The authors showed that NF-κB is detectable in two different forms. After selective removal of endogenous NF-κB, they demonstrate the existence of a protein inhibitor in cytosolic fractions of unstimulated cells that is able in vitro to convert NF-κB into an inactive desoxycholate-dependent form. The data are consistent with a molecular mechanism of inducible gene expression by which an apparently cytoplasmic transcription factor-inhibitor complex is dissociated by the action of TPA-activated protein kinase C

  10. Acinetobacter baumannii FolD ligand complexes --potent inhibitors of folate metabolism and a re-evaluation of the structure of LY374571.

    Science.gov (United States)

    Eadsforth, Thomas C; Maluf, Fernando V; Hunter, William N

    2012-12-01

    The bifunctional N(5),N(10)-methylenetetrahydrofolate dehydrogenase/cyclohydrolase (DHCH or FolD), which is widely distributed in prokaryotes and eukaryotes, is involved in the biosynthesis of folate cofactors that are essential for growth and cellular development. The enzyme activities represent a potential antimicrobial drug target. We have characterized the kinetic properties of FolD from the Gram-negative pathogen Acinetobacter baumanni and determined high-resolution crystal structures of complexes with a cofactor and two potent inhibitors. The data reveal new details with respect to the molecular basis of catalysis and potent inhibition. A unexpected finding was that our crystallographic data revealed a different structure for LY374571 (an inhibitor studied as an antifolate) than that previously published. The implications of this observation are discussed. © 2012 The Authors Journal compilation © 2012 FEBS.

  11. Seven Deadliest Wireless Technologies Attacks

    CERN Document Server

    Haines, Brad

    2010-01-01

    How can an information security professional keep up with all of the hacks, attacks, and exploits? One way to find out what the worst of the worst are is to read the seven books in our Seven Deadliest Attacks Series. Not only do we let you in on the anatomy of these attacks but we also tell you how to get rid of them and how to defend against them in the future. Countermeasures are detailed so that you can fight against similar attacks as they evolve. Attacks featured in this book include:Bluetooth AttacksCredit Card, Access Card, and Passport AttacksBad Encryption

  12. Matrix metalloproteinases during and outside of migraine attacks without aura

    DEFF Research Database (Denmark)

    Ashina, M.; Tvedskov, J.F.; Thiesen, Kerstin Lipka

    2010-01-01

    Ashina M, Tvedskov JF, Lipka K, Bilello J, Penkowa M & Olesen J. Matrix metalloproteinases during and outside of migraine attacks without aura. Cephalalgia 2009. London. ISSN 0333-1024To test the hypothesis that permeability of the blood-brain barrier (BBB) is altered during migraine attack due...... to enhanced activation of matrix metalloproteinases (MMPs), we investigated MMP-3, MMP-9 and tissue inhibitor of metalloproteases (TIMP)-1 in the external jugular vein during and outside of migraine attacks in 21 patients with migraine without aura. In addition, we measured plasma levels of several other...... of MMP-3 in the external jugular (P = 0.002) and cubital (P = 0.008) vein during attacks compared with outside of attacks. We found no correlation of ictal or interictal MMP-3, MMP-9 and TIMP-1 to migraine duration and frequency analysed in 21 patients (P > 0.05). There was no difference between ictal...

  13. The political attack ad

    Directory of Open Access Journals (Sweden)

    Palma Peña-Jiménez, Ph.D.

    2011-01-01

    Full Text Available During election campaigns the political spot has a clear objective: to win votes. This message is communicated to the electorate through television and Internet, and usually presents a negative approach, which includes a direct critical message against the opponent, rather than an exposition of proposals. This article is focused on the analysis of the campaign attack video ad purposely created to encourage the disapproval of the political opponent among voters. These ads focus on discrediting the opponent, many times, through the transmission of ad hominem messages, instead of disseminating the potential of the political party and the virtues and manifesto of its candidate. The article reviews the development of the attack ad since its first appearance, which in Spain dates back to 1996, when the famous Doberman ad was broadcast, and examines the most memorable campaign attack ads.

  14. A fatal elephant attack.

    Science.gov (United States)

    Hejna, Petr; Zátopková, Lenka; Safr, Miroslav

    2012-01-01

    A rare case of an elephant attack is presented. A 44-year-old man working as an elephant keeper was attacked by a cow elephant when he tripped over a foot chain while the animal was being medically treated. The man fell down and was consequently repeatedly attacked with elephant tusks. The man sustained multiple stab injuries to both groin regions, a penetrating injury to the abdominal wall with traumatic prolapse of the loops of the small bowel, multiple defects of the mesentery, and incomplete laceration of the abdominal aorta with massive bleeding into the abdominal cavity. In addition to the penetrating injuries, the man sustained multiple rib fractures with contusion of both lungs and laceration of the right lobe of the liver, and comminuted fractures of the pelvic arch and left femoral body. The man died shortly after he had been received at the hospital. The cause of death was attributed to traumatic shock. © 2011 American Academy of Forensic Sciences.

  15. False Positive and False Negative Effects on Network Attacks

    Science.gov (United States)

    Shang, Yilun

    2018-01-01

    Robustness against attacks serves as evidence for complex network structures and failure mechanisms that lie behind them. Most often, due to detection capability limitation or good disguises, attacks on networks are subject to false positives and false negatives, meaning that functional nodes may be falsely regarded as compromised by the attacker and vice versa. In this work, we initiate a study of false positive/negative effects on network robustness against three fundamental types of attack strategies, namely, random attacks (RA), localized attacks (LA), and targeted attack (TA). By developing a general mathematical framework based upon the percolation model, we investigate analytically and by numerical simulations of attack robustness with false positive/negative rate (FPR/FNR) on three benchmark models including Erdős-Rényi (ER) networks, random regular (RR) networks, and scale-free (SF) networks. We show that ER networks are equivalently robust against RA and LA only when FPR equals zero or the initial network is intact. We find several interesting crossovers in RR and SF networks when FPR is taken into consideration. By defining the cost of attack, we observe diminishing marginal attack efficiency for RA, LA, and TA. Our finding highlights the potential risk of underestimating or ignoring FPR in understanding attack robustness. The results may provide insights into ways of enhancing robustness of network architecture and improve the level of protection of critical infrastructures.

  16. Inhibitors of the mitochondrial cytochrome b-c1 complex inhibit the cyanide-insensitive respiration of Trypanosoma brucei.

    Science.gov (United States)

    Turrens, J F; Bickar, D; Lehninger, A L

    1986-06-01

    The cyanide-insensitive respiration of bloodstream trypomastigote forms of Trypanosoma brucei (75 +/- 8 nmol O2 min-1(mg protein)-1) is completely inhibited by the mitochondrial ubiquinone-like inhibitors 2-hydroxy-3-undecyl-1,4-naphthoquinone (UHNQ) and 5-n-undecyl-6-hydroxy-4,7-dioxobenzothiazole (UHDBT). The Ki values for UHDBT (30 nM) and UHNQ (2 microM) are much lower than the reported Ki for salicylhydroxamic acid (SHAM) (5 microM), a widely used inhibitor of the cyanide-insensitive oxidase. UHNQ also stimulated the glycerol-3-phosphate-dependent reduction of phenazine methosulfate, demonstrating that the site of UHNQ inhibition is on the terminal oxidase of the cyanide-insensitive respiration of T. brucei. These results suggest that a ubiquinone-like compound may act as an electron carrier between the two enzymatic components of the cyanide-insensitive glycerol-3-phosphate oxidase.

  17. BINDING OF THE RESPIRATORY CHAIN INHIBITOR ANTIMYCIN TO THE MITOCHONDRIAL bc1 COMPLEX: A NEW CRYSTAL STRUCTURE REVEALS AN ALTERED INTRAMOLECULAR HYDROGEN-BONDING PATTERN.

    OpenAIRE

    Huang, Li-shar; Cobessi, David; Tung, Eric Y.; Berry, Edward A.

    2005-01-01

    Antimycin A (antimycin), one of the first known and most potent inhibitors of the mitochondrial respiratory chain, binds to the quinone reduction site of the cytochrome bc1 complex. Structure-activity-relationship studies have shown that the N-formylamino-salicyl-amide group is responsible for most of the binding specificity, and suggested that a low pKa for the phenolic OH group and an intramolecular H-bond between that OH and the carbonyl O of the salicylamide linkage are important. Tw...

  18. Attacker Model Lab

    OpenAIRE

    2006-01-01

    tut quiz present Tutorial Quiz Presentation Interactive Media Element This interactive tutorial the two sub-classes of computer attackers: amateurs and professionals. It provides valuable insight into the nature of necessary protection measure for information assets. CS3600 Information Assurance: Introduction to Computer Security Course

  19. Transient Ischemic Attack

    Medline Plus

    Full Text Available ... major stroke. It's important to call 9-1-1 immediately for any stroke symptoms. Popular Topics TIA Cardiac Catheter Cholesterol Heart Attack Stent © 2018, American Heart Association, Inc. All rights reserved. Unauthorized use prohibited. The content in this ...

  20. Temporal Cyber Attack Detection.

    Energy Technology Data Exchange (ETDEWEB)

    Ingram, Joey Burton [Sandia National Lab. (SNL-NM), Albuquerque, NM (United States); Draelos, Timothy J. [Sandia National Lab. (SNL-NM), Albuquerque, NM (United States); Galiardi, Meghan [Sandia National Lab. (SNL-NM), Albuquerque, NM (United States); Doak, Justin E. [Sandia National Lab. (SNL-NM), Albuquerque, NM (United States)

    2017-11-01

    Rigorous characterization of the performance and generalization ability of cyber defense systems is extremely difficult, making it hard to gauge uncertainty, and thus, confidence. This difficulty largely stems from a lack of labeled attack data that fully explores the potential adversarial space. Currently, performance of cyber defense systems is typically evaluated in a qualitative manner by manually inspecting the results of the system on live data and adjusting as needed. Additionally, machine learning has shown promise in deriving models that automatically learn indicators of compromise that are more robust than analyst-derived detectors. However, to generate these models, most algorithms require large amounts of labeled data (i.e., examples of attacks). Algorithms that do not require annotated data to derive models are similarly at a disadvantage, because labeled data is still necessary when evaluating performance. In this work, we explore the use of temporal generative models to learn cyber attack graph representations and automatically generate data for experimentation and evaluation. Training and evaluating cyber systems and machine learning models requires significant, annotated data, which is typically collected and labeled by hand for one-off experiments. Automatically generating such data helps derive/evaluate detection models and ensures reproducibility of results. Experimentally, we demonstrate the efficacy of generative sequence analysis techniques on learning the structure of attack graphs, based on a realistic example. These derived models can then be used to generate more data. Additionally, we provide a roadmap for future research efforts in this area.

  1. Structure of ‘linkerless’ hydroxamic acid inhibitor-HDAC8 complex confirms the formation of an isoform-specific subpocket

    Energy Technology Data Exchange (ETDEWEB)

    Tabackman, Alexa A.; Frankson, Rochelle; Marsan, Eric S.; Perry, Kay; Cole, Kathryn E. (Ithaca); (Cornell); (Christopher Newport U)

    2016-11-04

    Histone deacetylases (HDACs) catalyze the hydrolysis of acetylated lysine side chains in histone and non-histone proteins, and play a critical role in the regulation of many biological processes, including cell differentiation, proliferation, senescence, and apoptosis. Aberrant HDAC activity is associated with cancer, making these enzymes important targets for drug design. In general, HDAC inhibitors (HDACi) block the proliferation of tumor cells by inducing cell differentiation, cell cycle arrest, and/or apoptosis, and comprise some of the leading therapies in cancer treatments. To date, four HDACi have been FDA approved for the treatment of cancers: suberoylanilide hydroxamic acid (SAHA, Vorinostat, Zolinza®), romidepsin (FK228, Istodax®), belinostat (Beleodaq®), and panobinostat (Farydak®). Most current inhibitors are pan-HDACi, and non-selectively target a number of HDAC isoforms. Six previously reported HDACi were rationally designed, however, to target a unique sub-pocket found only in HDAC8. While these inhibitors were indeed potent against HDAC8, and even demonstrated specificity for HDAC8 over HDACs 1 and 6, there were no structural data to confirm the mode of binding. Here we report the X-ray crystal structure of Compound 6 complexed with HDAC8 to 1.98 Å resolution. We also describe the use of molecular docking studies to explore the binding interactions of the other 5 related HDACi. Our studies confirm that the HDACi induce the formation of and bind in the HDAC8-specific subpocket, offering insights into isoform-specific inhibition.

  2. Improved Impossible Differential Attacks on Large-Block Rijndael

    DEFF Research Database (Denmark)

    Wang, Qingju; Gu, Dawu; Rijmen, Vincent

    2012-01-01

    . The improvement can lead to 10-round attack on Rijndael-256 as well. With 2198.1 chosen plaintexts, an attack is demonstrated on 9-round Rijndael-224 with 2 195.2 encryptions and 2140.4 bytes memory. Increasing the data complexity to 2216 plaintexts, the time complexity can be reduced to 2130 encryptions...... and the memory requirements to 2 93.6 bytes. For 9-round Rijndael-256, we provide an attack requiring 2229.3 chosen plaintexts, 2194 encryptions, and 2 139.6 bytes memory. Alternatively, with 2245.3 plaintexts, an attack with a reduced time of 2127.1 encryptions and a memory complexity of 290.9 bytes can...... be mounted. With 2244.2 chosen plaintexts, we can attack 10-round Rijndael-256 with 2253.9 encryptions and 2186.8 bytes of memory....

  3. Blocking of Brute Force Attack

    OpenAIRE

    M.Venkata Krishna Reddy

    2012-01-01

    A common threat Web developers face is a password-guessing attack known as a brute-force attack. A brute-force attack is an attempt to discover a password by systematically trying every possible combination of letters, numbers, and symbols until you discover the one correct combination that works. If your Web site requires user authentication, you are a good target for a brute-force attack. An attacker can always discover a password through a brute-force attack, but the downside is that it co...

  4. Bluetooth security attacks comparative analysis, attacks, and countermeasures

    CERN Document Server

    Haataja, Keijo; Pasanen, Sanna; Toivanen, Pekka

    2013-01-01

    This overview of Bluetooth security examines network vulnerabilities and offers a comparative analysis of recent security attacks. It also examines related countermeasures and proposes a novel attack that works against all existing Bluetooth versions.

  5. Modelling Social-Technical Attacks with Timed Automata

    DEFF Research Database (Denmark)

    David, Nicolas; David, Alexandre; Hansen, Rene Rydhof

    2015-01-01

    . In this paper we develop an approach towards modelling socio-technical systems in general and socio-technical attacks in particular, using timed automata and illustrate its application by a complex case study. Thanks to automated model checking and automata theory, we can automatically generate possible attacks...... in our model and perform analysis and simulation of both model and attack, revealing details about the specific interaction between attacker and victim. Using timed automata also allows for intuitive modelling of systems, in which quantities like time and cost can be easily added and analysed....

  6. Network resilience against intelligent attacks constrained by the degree-dependent node removal cost

    International Nuclear Information System (INIS)

    Annibale, A; Coolen, A C C; Bianconi, G

    2010-01-01

    We study the resilience of complex networks against attacks in which nodes are targeted intelligently, but where disabling a node has a cost to the attacker which depends on its degree. Attackers have to meet these costs with limited resources, which constrains their actions. A network's integrity is quantified in terms of the efficacy of the process that it supports. We calculate how the optimal attack strategy and the most attack-resistant network degree statistics depend on the node removal cost function and the attack resources. The resilience of networks against intelligent attacks is found to depend strongly on the node removal cost function faced by the attacker. In particular, if node removal costs increase sufficiently fast with the node degree, power law networks are found to be more resilient than Poissonian ones, even against optimized intelligent attacks. For cost functions increasing quadratically in the node degrees, intelligent attackers cannot damage the network more than random damages would.

  7. Copper(II) complexes of methimazole, an anti Grave's disease drug. Synthesis, characterization and its potential biological behavior as alkaline phosphatase inhibitor.

    Science.gov (United States)

    Urquiza, Nora M; Manca, Silvia G; Moyano, María A; Dellmans, Raquel Arrieta; Lezama, Luis; Rojo, Teófilo; Naso, Luciana G; Williams, Patricia A M; Ferrer, Evelina G

    2010-04-01

    Methimazole (MeimzH) is an anti-thyroid drug and the first choice for patients with Grave's disease. Two new copper(II) complexes of this drug: [Cu(MeimzH)(2)(NO(3))(2)]*0.5H(2)O and [Cu(MeimzH)(2)(H(2)O)(2)](NO(3))(2)*H(2)O were synthesized and characterized by elemental analysis, dissolution behavior, thermogravimetric analysis and UV-vis, diffuse reflectance, FTIR and EPR spectroscopies. As it is known that copper(II) cation can act as an inhibitor of alkaline phosphatase (ALP), the inhibitory effect of methimazole and its copper(II) complexes on ALP activity has also been investigated.

  8. SUMO expression shortens the lag phase of Saccharomyces cerevisiae yeast growth caused by complex interactive effects of major mixed fermentation inhibitors found in hot-compressed water-treated lignocellulosic hydrolysate.

    Science.gov (United States)

    Jayakody, Lahiru N; Kadowaki, Masafumi; Tsuge, Keisuke; Horie, Kenta; Suzuki, Akihiro; Hayashi, Nobuyuki; Kitagaki, Hiroshi

    2015-01-01

    The complex inhibitory effects of inhibitors present in lignocellulose hydrolysate suppress the ethanol fermentation of Saccharomyces cerevisiae. Although the interactive inhibitory effects play important roles in the actual hydrolysate, few studies have investigated glycolaldehyde, the key inhibitor of hot-compressed water-treated lignocellulose hydrolysate. Given this challenge, we investigated the interactive effects of mixed fermentation inhibitors, including glycolaldehyde. First, we confirmed that glycolaldehyde was the most potent inhibitor in the hydrolysate and exerted interactive inhibitory effects in combination with major inhibitors. Next, through genome-wide analysis and megavariate data modeling, we identified SUMOylation as a novel potential mechanism to overcome the combinational inhibitory effects of fermentation inhibitors. Indeed, overall SUMOylation was increased and Pgk1, which produces an ATP molecule in glycolysis by substrate-level phosphorylation, was SUMOylated and degraded in response to glycolaldehyde. Augmenting the SUMO-dependent ubiquitin system in the ADH1-expressing strain significantly shortened the lag phase of growth, released cells from G2/M arrest, and improved energy status and glucose uptake in the inhibitor-containing medium. In summary, our study was the first to establish SUMOylation as a novel platform for regulating the lag phase caused by complex fermentation inhibitors.

  9. Energetics of dendrimer binding to HIV-1 gp120-CD4 complex and mechanismic aspects of its role as an entry-inhibitor

    International Nuclear Information System (INIS)

    Saurabh, Suman; Sahoo, Anil Kumar; Maiti, Prabal K.

    2016-01-01

    Experiments and computational studies have established that de-protonated dendrimers (SPL7013 and PAMAM) act as entry-inhibitors of HIV. SPL7013 based Vivagel is currently under clinical development. The dendrimer binds to gp120 in the gp120-CD4 complex, destabilizes it by breaking key contacts between gp120 and CD4 and prevents viral entry into target cells. In this work, we provide molecular details and energetics of the formation of the SPL7013-gp120-CD4 ternary complex and decipher modes of action of the dendrimer in preventing viral entry. It is also known from experiments that the dendrimer binds weakly to gp120 that is not bound to CD4. It binds even more weakly to the CD4-binding region of gp120 and thus cannot directly block gp120-CD4 complexation. In this work, we examine the feasibility of dendrimer binding to the gp120-binding region of CD4 and directly blocking gp120-CD4 complex formation. We find that the process of the dendrimer binding to CD4 can compete with gp120-CD4 binding due to comparable free energy change for the two processes, thus creating a possibility for the dendrimer to directly block gp120-CD4 complexation by binding to the gp120-binding region of CD4. (paper)

  10. Energetics of dendrimer binding to HIV-1 gp120-CD4 complex and mechanismic aspects of its role as an entry-inhibitor

    Science.gov (United States)

    Saurabh, Suman; Sahoo, Anil Kumar; Maiti, Prabal K.

    2016-10-01

    Experiments and computational studies have established that de-protonated dendrimers (SPL7013 and PAMAM) act as entry-inhibitors of HIV. SPL7013 based Vivagel is currently under clinical development. The dendrimer binds to gp120 in the gp120-CD4 complex, destabilizes it by breaking key contacts between gp120 and CD4 and prevents viral entry into target cells. In this work, we provide molecular details and energetics of the formation of the SPL7013-gp120-CD4 ternary complex and decipher modes of action of the dendrimer in preventing viral entry. It is also known from experiments that the dendrimer binds weakly to gp120 that is not bound to CD4. It binds even more weakly to the CD4-binding region of gp120 and thus cannot directly block gp120-CD4 complexation. In this work, we examine the feasibility of dendrimer binding to the gp120-binding region of CD4 and directly blocking gp120-CD4 complex formation. We find that the process of the dendrimer binding to CD4 can compete with gp120-CD4 binding due to comparable free energy change for the two processes, thus creating a possibility for the dendrimer to directly block gp120-CD4 complexation by binding to the gp120-binding region of CD4.

  11. Aqueous Molecular Dynamics Simulations of the M. tuberculosis Enoyl-ACP Reductase-NADH System and Its Complex with a Substrate Mimic or Diphenyl Ethers Inhibitors

    Directory of Open Access Journals (Sweden)

    Camilo Henrique da Silva Lima

    2015-10-01

    Full Text Available Molecular dynamics (MD simulations of 12 aqueous systems of the NADH-dependent enoyl-ACP reductase from Mycobacterium tuberculosis (InhA were carried out for up to 20–40 ns using the GROMACS 4.5 package. Simulations of the holoenzyme, holoenzyme-substrate, and 10 holoenzyme-inhibitor complexes were conducted in order to gain more insight about the secondary structure motifs of the InhA substrate-binding pocket. We monitored the lifetime of the main intermolecular interactions: hydrogen bonds and hydrophobic contacts. Our MD simulations demonstrate the importance of evaluating the conformational changes that occur close to the active site of the enzyme-cofactor complex before and after binding of the ligand and the influence of the water molecules. Moreover, the protein-inhibitor total steric (ELJ and electrostatic (EC interaction energies, related to Gly96 and Tyr158, are able to explain 80% of the biological response variance according to the best linear equation, pKi = 7.772 − 0.1885 × Gly96 + 0.0517 × Tyr158 (R2 = 0.80; n = 10, where interactions with Gly96, mainly electrostatic, increase the biological response, while those with Tyr158 decrease. These results will help to understand the structure-activity relationships and to design new and more potent anti-TB drugs.

  12. Algebraic Side-Channel Attack on Twofish

    Directory of Open Access Journals (Sweden)

    Chujiao Ma

    2017-05-01

    Full Text Available While algebraic side-channel attack (ASCA has been successful in breaking simple cryptographic algorithms, it has never been done on larger or more complex algorithms such as Twofish. Compared to other algorithms that ASCA has been used on, Twofish is more difficult to attack due to the key-dependent S-boxes as well as the complex key scheduling. In this paper, we propose the first algebraic side-channel attack on Twofish, and examine the importance of side-channel information in getting past the key-dependent S-boxes and the complex key scheduling. The cryptographic algorithm and side-channel information are both expressed as boolean equations and a SAT solver is used to recover the key. While algebraic attack by itself is not sufficient to break the algorithm, with the help of side-channel information such as Hamming weights, we are able to correctly solve for 96 bits of the 128 bits key in under 2 hours with known plaintext/ciphertext.

  13. Automated Discovery of Mimicry Attacks

    National Research Council Canada - National Science Library

    Giffin, Jonathon T; Jha, Somesh; Miller, Barton P

    2006-01-01

    .... These systems are useful only if they detect actual attacks. Previous research developed manually-constructed mimicry and evasion attacks that avoided detection by hiding a malicious series of system calls within a valid sequence allowed by the model...

  14. Heart Attack Symptoms in Women

    Science.gov (United States)

    ... fat, cholesterol and other substances (plaque). Watch an animation of a heart attack . Many women think the ... Support Network Popular Articles 1 Understanding Blood Pressure Readings 2 Sodium and Salt 3 Heart Attack Symptoms ...

  15. The refined 2.0 A X-ray crystal structure of the complex formed between bovine beta-trypsin and CMTI-I, a trypsin inhibitor from squash seeds (Cucurbita maxima). Topological similarity of the squash seed inhibitors with the carboxypeptidase A inhibitor from potatoes.

    Science.gov (United States)

    Bode, W; Greyling, H J; Huber, R; Otlewski, J; Wilusz, T

    1989-01-02

    The stoichiometric complex formed between bovine beta-trypsin and the Cucurbita maxima trypsin inhibitor I (CMTI-I) was crystallized and its X-ray crystal structure determined using Patterson search techniques. Its structure has been crystallographically refined to a final R value of 0.152 (6.0-2.0 A). CMTI-I is of ellipsoidal shape; it lacks helices or beta-sheets, but consists of turns and connecting short polypeptide stretches. The disulfide pairing is CYS-3I-20I, Cys-10I-22I and Cys-16I-28I. According to the polypeptide fold and disulfide connectivity its structure resembles that of the carboxypeptidase A inhibitor from potatoes. Thirteen of the 29 inhibitor residues are in direct contact with trypsin; most of them are in the primary binding segment Val-2I (P4)-Glu-9I (P4') which contains the reactive site bond Arg-5I-Ile-6I and is in a conformation observed also for other serine proteinase inhibitors.

  16. Simulation of Attacks for Security in Wireless Sensor Network.

    Science.gov (United States)

    Diaz, Alvaro; Sanchez, Pablo

    2016-11-18

    The increasing complexity and low-power constraints of current Wireless Sensor Networks (WSN) require efficient methodologies for network simulation and embedded software performance analysis of nodes. In addition, security is also a very important feature that has to be addressed in most WSNs, since they may work with sensitive data and operate in hostile unattended environments. In this paper, a methodology for security analysis of Wireless Sensor Networks is presented. The methodology allows designing attack-aware embedded software/firmware or attack countermeasures to provide security in WSNs. The proposed methodology includes attacker modeling and attack simulation with performance analysis (node's software execution time and power consumption estimation). After an analysis of different WSN attack types, an attacker model is proposed. This model defines three different types of attackers that can emulate most WSN attacks. In addition, this paper presents a virtual platform that is able to model the node hardware, embedded software and basic wireless channel features. This virtual simulation analyzes the embedded software behavior and node power consumption while it takes into account the network deployment and topology. Additionally, this simulator integrates the previously mentioned attacker model. Thus, the impact of attacks on power consumption and software behavior/execution-time can be analyzed. This provides developers with essential information about the effects that one or multiple attacks could have on the network, helping them to develop more secure WSN systems. This WSN attack simulator is an essential element of the attack-aware embedded software development methodology that is also introduced in this work.

  17. Simulation of Attacks for Security in Wireless Sensor Network

    Science.gov (United States)

    Diaz, Alvaro; Sanchez, Pablo

    2016-01-01

    The increasing complexity and low-power constraints of current Wireless Sensor Networks (WSN) require efficient methodologies for network simulation and embedded software performance analysis of nodes. In addition, security is also a very important feature that has to be addressed in most WSNs, since they may work with sensitive data and operate in hostile unattended environments. In this paper, a methodology for security analysis of Wireless Sensor Networks is presented. The methodology allows designing attack-aware embedded software/firmware or attack countermeasures to provide security in WSNs. The proposed methodology includes attacker modeling and attack simulation with performance analysis (node’s software execution time and power consumption estimation). After an analysis of different WSN attack types, an attacker model is proposed. This model defines three different types of attackers that can emulate most WSN attacks. In addition, this paper presents a virtual platform that is able to model the node hardware, embedded software and basic wireless channel features. This virtual simulation analyzes the embedded software behavior and node power consumption while it takes into account the network deployment and topology. Additionally, this simulator integrates the previously mentioned attacker model. Thus, the impact of attacks on power consumption and software behavior/execution-time can be analyzed. This provides developers with essential information about the effects that one or multiple attacks could have on the network, helping them to develop more secure WSN systems. This WSN attack simulator is an essential element of the attack-aware embedded software development methodology that is also introduced in this work. PMID:27869710

  18. Attack Trees with Sequential Conjunction

    NARCIS (Netherlands)

    Jhawar, Ravi; Kordy, Barbara; Mauw, Sjouke; Radomirović, Sasa; Trujillo-Rasua, Rolando

    2015-01-01

    We provide the first formal foundation of SAND attack trees which are a popular extension of the well-known attack trees. The SAND at- tack tree formalism increases the expressivity of attack trees by intro- ducing the sequential conjunctive operator SAND. This operator enables the modeling of

  19. Adenosine 3',5'-cyclic monophosphate (cAMP)-dependent phosphoregulation of mitochondrial complex I is inhibited by nucleoside reverse transcriptase inhibitors

    International Nuclear Information System (INIS)

    Lund, Kaleb C.; Wallace, Kendall B.

    2008-01-01

    Nucleoside analog reverse transcriptase inhibitors (NRTIs) are known to directly inhibit mitochondrial complex I activity as well as various mitochondrial kinases. Recent observations that complex I activity and superoxide production are modulated through cAMP-dependent phosphorylation suggests a mechanism through which NRTIs may affect mitochondrial respiration via kinase-dependent protein phosphorylation. In the current study, we examine the potential for NRTIs to inhibit the cAMP-dependent phosphorylation of complex I and the associated NADH:CoQ oxidoreductase activities and rates of superoxide production using HepG2 cells. Phosphoprotein staining of immunocaptured complex I revealed that 3'-azido-3'-deoxythymidine (AZT; 10 and 50 μM), AZT monophosphate (150 μM), and 2',3'-dideoxycytidine (ddC; 1 μM) prevented the phosphorylation of the NDUFB11 subunit of complex I. This was associated with a decrease in complex I activity with AZT and AZT monophosphate only. In the presence of succinate, superoxide production was increased with 2',3'-dideoxyinosine (ddI; 10 μM) and ddC (1 μM). In the presence of succinate + cAMP, AZT showed an inverse dose-dependent effect on superoxide production. None of the NRTIs examined inhibit PKA activity suggesting that the observed effects are due to a direct interaction with complex I. These data demonstrate a direct effect of NRTIs on cAMP-dependent regulation of mitochondrial bioenergetics independent of DNA polymerase-γ activity; in the case of AZT, these observations may provide a mechanism for the observed long-term toxicity with this drug

  20. Breakthrough attacks in patients with hereditary angioedema receiving long-term prophylaxis are responsive to icatibant

    DEFF Research Database (Denmark)

    Aberer, Werner; Maurer, Marcus; Bouillet, Laurence

    2017-01-01

    BACKGROUND: Patients with hereditary angioedema (HAE) due to C1-inhibitor deficiency (C1-INH-HAE) experience recurrent attacks of cutaneous or submucosal edema that may be frequent and severe; prophylactic treatments can be prescribed to prevent attacks. However, despite the use of long-term prop...

  1. Computer Network Attack Versus Operational Maneuver from the Sea

    National Research Council Canada - National Science Library

    Herdegen, Dale

    2000-01-01

    ...) vulnerable to computer network attack (CNA). Mission command and control can reduce the impact of the loss of command and control, but it can not overcome the vast and complex array of threats...

  2. Game Theoretic Solutions to Cyber Attack and Network Defense Problems

    National Research Council Canada - National Science Library

    Shen, Dan; Chen, Genshe; Cruz, Jr., , Jose B; Blasch, Erik; Kruger, Martin

    2007-01-01

    .... The protection and defense against cyber attacks to computer network is becoming inadequate as the hacker knowledge sophisticates and as the network and each computer system become more complex...

  3. Structural determinants of enzyme binding affinity: the E1 component of pyruvate dehydrogenase from Escherichia coli in complex with the inhibitor thiamin thiazolone diphosphate.

    Science.gov (United States)

    Arjunan, Palaniappa; Chandrasekhar, Krishnamoorthy; Sax, Martin; Brunskill, Andrew; Nemeria, Natalia; Jordan, Frank; Furey, William

    2004-03-09

    Thiamin thiazolone diphosphate (ThTDP), a potent inhibitor of the E1 component from the Escherichia coli pyruvate dehydrogenase multienzyme complex (PDHc), binds to the enzyme with greater affinity than does the cofactor thiamin diphosphate (ThDP). To identify what determines this difference, the crystal structure of the apo PDHc E1 component complex with ThTDP and Mg(2+) has been determined at 2.1 A and compared to the known structure of the native holoenzyme, PDHc E1-ThDP-Mg(2+) complex. When ThTDP replaces ThDP, reorganization occurs in the protein structure in the vicinity of the active site involving positional and conformational changes in some amino acid residues, a change in the V coenzyme conformation, addition of new hydration sites, and elimination of others. These changes culminate in an increase in the number of hydrogen bonds to the protein, explaining the greater affinity of the apoenzyme for ThTDP. The observed hydrogen bonding pattern is not an invariant feature of ThDP-dependent enzymes but rather specific to this enzyme since the extra hydrogen bonds are made with nonconserved residues. Accordingly, these sequence-related hydrogen bonding differences likewise explain the wide variation in the affinities of different thiamin-dependent enzymes for ThTDP and ThDP. The sequence of each enzyme determines its ability to form hydrogen bonds to the inhibitor or cofactor. Mechanistic roles are suggested for the aforementioned reorganization and its reversal in PDHc E1 catalysis: to promote substrate binding and product release. This study also provides additional insight into the role of water in enzyme inhibition and catalysis.

  4. Seven Deadliest Unified Communications Attacks

    CERN Document Server

    York, Dan

    2010-01-01

    Do you need to keep up with the latest hacks, attacks, and exploits effecting Unified Communications technology? Then you need Seven Deadliest Unified Communication Attacks. This book pinpoints the most dangerous hacks and exploits specific to Unified Communications, laying out the anatomy of these attacks including how to make your system more secure. You will discover the best ways to defend against these vicious hacks with step-by-step instruction and learn techniques to make your computer and network impenetrable. Attacks featured in this book include: UC Ecosystem Attacks Insecure Endpo

  5. Inhibitors of the alpha-ketoglutarate dehydrogenase complex alter [1-13C]glucose and [U-13C]glutamate metabolism in cerebellar granule neurons.

    Science.gov (United States)

    Santos, Sónia Sá; Gibson, Gary E; Cooper, Arthur J L; Denton, Travis T; Thompson, Charles M; Bunik, Victoria I; Alves, Paula M; Sonnewald, Ursula

    2006-02-15

    Diminished activity of the alpha-ketoglutarate dehydrogenase complex (KGDHC), an important component of the tricarboxylic acid (TCA) cycle, occurs in several neurological diseases. The effect of specific KGDHC inhibitors [phosphonoethyl ester of succinyl phosphonate (PESP) and the carboxy ethyl ester of succinyl phosphonate (CESP)] on [1-13C]glucose and [U-13C]glutamate metabolism in intact cerebellar granule neurons was investigated. Both inhibitors decreased formation of [4-13C]glutamate from [1-13C]glucose, a reduction in label in glutamate derived from [1-13C]glucose/[U-13C]glutamate through a second turn of the TCA cycle and a decline in the amounts of gamma-aminobutyric acid (GABA), aspartate, and alanine. PESP decreased formation of [U-13C]aspartate and total glutathione, whereas CESP decreased concentrations of valine and leucine. The findings are consistent with decreased KGDHC activity; increased alpha-ketoglutarate formation; increased transamination of alpha-ketoglutarate with valine, leucine, and GABA; and new equilibrium position of the aspartate aminotransferase reaction. Overall, the findings also suggest that some carbon derived from alpha-ketoglutarate may bypass the block in the TCA cycle at KGDHC by means of the GABA shunt and/or conversion of valine to succinate. The results suggest the potential of succinyl phosphonate esters for modeling the biochemical and pathophysiological consequences of reduced KGDHC activity in brain diseases.

  6. Vasoactivity of rucaparib, a PARP-1 inhibitor, is a complex process that involves myosin light chain kinase, P2 receptors, and PARP itself.

    Directory of Open Access Journals (Sweden)

    Cian M McCrudden

    Full Text Available Therapeutic inhibition of poly(ADP-ribose polymerase (PARP, as monotherapy or to supplement the potencies of other agents, is a promising strategy in cancer treatment. We previously reported that the first PARP inhibitor to enter clinical trial, rucaparib (AG014699, induced vasodilation in vivo in xenografts, potentiating response to temozolomide. We now report that rucaparib inhibits the activity of the muscle contraction mediator myosin light chain kinase (MLCK 10-fold more potently than its commercially available inhibitor ML-9. Moreover, rucaparib produces additive relaxation above the maximal degree achievable with ML-9, suggesting that MLCK inhibition is not solely responsible for dilation. Inhibition of nitric oxide synthesis using L-NMMA also failed to impact rucaparib's activity. Rucaparib contains the nicotinamide pharmacophore, suggesting it may inhibit other NAD+-dependent processes. NAD+ exerts P2 purinergic receptor-dependent inhibition of smooth muscle contraction. Indiscriminate blockade of the P2 purinergic receptors with suramin abrogated rucaparib-induced vasodilation in rat arterial tissue without affecting ML-9-evoked dilation, although the specific receptor subtypes responsible have not been unequivocally identified. Furthermore, dorsal window chamber and real time tumor vessel perfusion analyses in PARP-1-/- mice indicate a potential role for PARP in dilation of tumor-recruited vessels. Finally, rucaparib provoked relaxation in 70% of patient-derived tumor-associated vessels. These data provide tantalising evidence of the complexity of the mechanism underlying rucaparib-mediated vasodilation.

  7. Interaction proteins of invertase and invertase inhibitor in cold-stored potato tubers suggested a protein complex underlying post-translational regulation of invertase.

    Science.gov (United States)

    Lin, Yuan; Liu, Jun; Liu, Xun; Ou, Yongbin; Li, Meng; Zhang, Huiling; Song, Botao; Xie, Conghua

    2013-12-01

    The activity of vacuolar invertase (VI) is vital to potato cold-induced sweetening (CIS). A post-translational regulation of VI activity has been proposed which involves invertase inhibitor (VIH), but the mechanism for the interaction between VI and VIH has not been fully understood. To identify the potential partners of VI and VIH, two cDNA libraries were respectively constructed from CIS-resistant wild potato species Solanum berthaultii and CIS-sensitive potato cultivar AC035-01 for the yeast two-hybrid analysis. The StvacINV1 (one of the potato VIs) and StInvInh2B (one of the potato VIHs), previously identified to be associated with potato CIS, were used as baits to screen the two libraries. Through positive selection and sequencing, 27 potential target proteins of StvacINV1 and eight of StInvInh2B were clarified. The Kunitz-type protein inhibitors were captured by StvacINV1 in both libraries and the interaction between them was confirmed by bimolecular fluorescence complementation assay in tobacco cells, reinforcing a fundamental interaction between VI and VIH. Notably, a sucrose non-fermenting-1-related protein kinase 1 was captured by both the baits, suggesting that a protein complex could be necessary for fine turning of the invertase activity. The target proteins clarified in present research provide a route to elucidate the mechanism by which the VI activity can be subtly modulated. Copyright © 2013 Elsevier Masson SAS. All rights reserved.

  8. Attacks on computer systems

    Directory of Open Access Journals (Sweden)

    Dejan V. Vuletić

    2012-01-01

    Full Text Available Computer systems are a critical component of the human society in the 21st century. Economic sector, defense, security, energy, telecommunications, industrial production, finance and other vital infrastructure depend on computer systems that operate at local, national or global scales. A particular problem is that, due to the rapid development of ICT and the unstoppable growth of its application in all spheres of the human society, their vulnerability and exposure to very serious potential dangers increase. This paper analyzes some typical attacks on computer systems.

  9. Mitocans as anti-cancer agents targeting mitochondria: lessons from studies with vitamin E analogues, inhibitors of complex II

    Czech Academy of Sciences Publication Activity Database

    Neužil, Jiří; Dyason, J.C.; Freeman, R.; Dong, L.F.; Procházka, L.; Wang, X. F.; Scheffler, I.; Ralph, S.J.

    2007-01-01

    Roč. 39, č. 1 (2007), s. 65-72 ISSN 0145-479X Institutional research plan: CEZ:AV0Z50520701; CEZ:AV0Z50520514 Keywords : mitocans * mitochondria * complex II Subject RIV: EB - Genetics ; Molecular Biology Impact factor: 2.634, year: 2007

  10. Robustness analysis of interdependent networks under multiple-attacking strategies

    Science.gov (United States)

    Gao, Yan-Li; Chen, Shi-Ming; Nie, Sen; Ma, Fei; Guan, Jun-Jie

    2018-04-01

    The robustness of complex networks under attacks largely depends on the structure of a network and the nature of the attacks. Previous research on interdependent networks has focused on two types of initial attack: random attack and degree-based targeted attack. In this paper, a deliberate attack function is proposed, where six kinds of deliberate attacking strategies can be derived by adjusting the tunable parameters. Moreover, the robustness of four types of interdependent networks (BA-BA, ER-ER, BA-ER and ER-BA) with different coupling modes (random, positive and negative correlation) is evaluated under different attacking strategies. Interesting conclusions could be obtained. It can be found that the positive coupling mode can make the vulnerability of the interdependent network to be absolutely dependent on the most vulnerable sub-network under deliberate attacks, whereas random and negative coupling modes make the vulnerability of interdependent network to be mainly dependent on the being attacked sub-network. The robustness of interdependent network will be enhanced with the degree-degree correlation coefficient varying from positive to negative. Therefore, The negative coupling mode is relatively more optimal than others, which can substantially improve the robustness of the ER-ER network and ER-BA network. In terms of the attacking strategies on interdependent networks, the degree information of node is more valuable than the betweenness. In addition, we found a more efficient attacking strategy for each coupled interdependent network and proposed the corresponding protection strategy for suppressing cascading failure. Our results can be very useful for safety design and protection of interdependent networks.

  11. Comparing Alternatives to Measure the Impact of DDoS Attack Announcements on Target Stock Prices

    NARCIS (Netherlands)

    Abhishta,; Joosten, Reinoud; Nieuwenhuis, Lambert J.M.

    2017-01-01

    Distributed denial of service (DDoS) attacks are responsible for creating unavailability of online resources. Botnets based on internet of things (IOT) devices are now being used to conduct DDoS attacks. The estimation of direct and indirect economic damages caused by these attacks is a complex

  12. A Stochastic Framework for Quantitative Analysis of Attack-Defense Trees

    NARCIS (Netherlands)

    Jhawar, Ravi; Lounis, Karim; Mauw, Sjouke

    2016-01-01

    Cyber attacks are becoming increasingly complex, practically sophisticated and organized. Losses due to such attacks are important, varying from the loss of money to business reputation spoilage. Therefore, there is a great need for potential victims of cyber attacks to deploy security solutions

  13. Binding of the respiratory chain inhibitor antimycin to the mitochondrial bc1 complex: a new crystal structure reveals an altered intramolecular hydrogen-bonding pattern.

    Science.gov (United States)

    Huang, Li-Shar; Cobessi, David; Tung, Eric Y; Berry, Edward A

    2005-08-19

    Antimycin A (antimycin), one of the first known and most potent inhibitors of the mitochondrial respiratory chain, binds to the quinone reduction site of the cytochrome bc1 complex. Structure-activity relationship studies have shown that the N-formylamino-salicyl-amide group is responsible for most of the binding specificity, and suggested that a low pKa for the phenolic OH group and an intramolecular H-bond between that OH and the carbonyl O of the salicylamide linkage are important. Two previous X-ray structures of antimycin bound to vertebrate bc1 complex gave conflicting results. A new structure reported here of the bovine mitochondrial bc1 complex at 2.28 A resolution with antimycin bound, allows us for the first time to reliably describe the binding of antimycin and shows that the intramolecular hydrogen bond described in solution and in the small-molecule structure is replaced by one involving the NH rather than carbonyl O of the amide linkage, with rotation of the amide group relative to the aromatic ring. The phenolic OH and formylamino N form H-bonds with conserved Asp228 of cytochrome b, and the formylamino O H-bonds via a water molecule to Lys227. A strong density, the right size and shape for a diatomic molecule is found between the other side of the dilactone ring and the alphaA helix.

  14. Binding of the Respiratory Chain Inhibitor Antimycin to theMitochondrial bc1 Complex: A New Crystal Structure Reveals an AlteredIntramolecular Hydrogen-Bonding Pattern

    Energy Technology Data Exchange (ETDEWEB)

    Huang, Li-shar; Cobessi, David; Tung, Eric Y.; Berry, Edward A.

    2005-05-10

    Antimycin A (antimycin), one of the first known and most potent inhibitors of the mitochondrial respiratory chain, binds to the quinone reduction site of the cytochrome bc1 complex.Structure-activity-relationship studies have shown that the N-formylamino-salicyl-amide group is responsible for most of the binding specificity, and suggested that a low pKa for the phenolic OH group and an intramolecular H-bond between that OH and the carbonyl O of the salicylamide linkage are important. Two previous X-ray structures of antimycin bound to vertebrate bc1 complex gave conflicting results. A new structure reported here of the bovine mitochondrial bc1 complex at 2.28Angstrom resolution with antimycin bound, allows us for the first time to reliably describe the binding of antimycin and shows that the intramolecular hydrogen bond described in solution and in the small-molecule structure is replaced by one involving the NH rather than carbonyl O of the amide linkage, with rotation of the amide group relative to the aromatic ring. The phenolic OH and formylamino N form H-bonds with conserved Asp228 of cyt b, and the formylamino O H-bonds via a water molecule to Lys227. A strong density the right size and shape for a diatomic molecule is found between the other side of the dilactone ring and the alpha-A helix.

  15. Translation initiation complex eIF4F is a therapeutic target for dual mTOR kinase inhibitors in non-Hodgkin lymphoma

    Science.gov (United States)

    Stenson, Mary J.; Maurer, Matthew J.; Wellik, Linda E.; Link, Brian; Hege, Kristen; Dogan, Ahmet; Sotomayor, Eduardo; Witzig, Thomas; Gupta, Mamta

    2015-01-01

    Deregulated mRNA translation has been implicated in disease development and in part is controlled by a eukaryotic initiation complex eIF4F (composed of eIF4E, eIF4G and eIF4A). We demonstrate here that the cap bound fraction from lymphoma cells was enriched with eIF4G and eIF4E indicating that lymphoma cells exist in an activated translational state. Moreover, 77% (110/142) of diffuse large B cell lymphoma tumors expressed eIF4E and this was associated with an inferior event free survival. Over-expression of wild-type eIF4E (eIF4EWT) but not cap-mutant eIF4E (eIF4Ecap mutant) increased the activation of the eIF4F complex. Treatment with the active-site dual mTOR inhibitor CC214-1 reduced the level of the eIF4F complex by decreasing the cap bound fraction of eIF4G and increasing the levels of 4E-BP1. CC214-1 inhibited both the cap dependent and global protein translation. CC214-1 inhibited c-Myc, and cyclin D3 translation by decreasing polysomal fractions from lymphoma cells. Inhibition of eIF4E with shRNA further decreased the CC214-1 induced inhibition of the eIF4F complex, c-Myc, cyclin D3 translation, and colony formation. These studies demonstrate that the eIF4F complex is deregulated in aggressive lymphoma and that dual mTOR therapy has therapeutic potential in these patients. PMID:25839159

  16. Recent "phishing" attacks

    CERN Multimedia

    IT Department

    2009-01-01

    Over the last few weeks there has been a marked increase in the number of attacks on CERN made by cybercriminals. Typical attacks arrive in the form of e-mail messages purporting to come from the CERN Help Desk, Mail Service, or some similarly official-sounding entity and suggest that there is a problem with your account, such as it being over-quota. They then ask you to click on a link or to reply and give your password. Please don’t! Be cautious of any unexpected messages containing web links even if they appear to come from known contacts. If you happen to click on such a link and if your permission is requested to run or install software, always decline it. NEVER provide your password or other details if these are requested. These messages try to trick you into clicking on Web links which will help them to install malicious software on your computer, and anti-virus software cannot be relied on to detect all cases. In case of questions on this topic, you may contact mailto:helpdesk@cern.ch. CERN Comput...

  17. Pleural effusion in 11:14 translocation q1 multiple myeloma in the setting of proteasome inhibitor presents therapeutic complexity.

    Science.gov (United States)

    Ghannam, Malik; Bryan, Maria; Kuross, Erik; Berry, Brent

    2018-01-01

    Primary malignant pleural effusion has been reported in about 134 cases of multiple myeloma (MM). Associated pleural effusions in cases of MM portend a poor prognosis and identifying them is highly relevant. Reported is the case of a man diagnosed with MM who developed primary myelomatous pleural effusion in the setting of multiple relapses and subsequent mortality within 2 months of the pleural effusion diagnosis. A 61-year-old African American man was diagnosed with MM in 2011. He received induction therapy of lenalidomide and dexamethasone and an autologous stem cell transplant in 2012. Over the next 5 years, the patient went through alternating periods of remission and relapse that were treated with two rounds of thoracic spine radiation therapy and chemotherapeutic agents. In September 2017, the patient presented with worsening dyspnea and was found to have pleural effusion. Fluid analysis showed plasma cell dyscrasia. Fluid drainage was performed, then the patient was discharged after 1 week which was followed by rapid re-accumulation of fluid and rehospitalization about 10 days after discharge. The patient passed away a few weeks after the second admission. Pleural effusion carries a differential diagnosis which may include malignancy but is commonly thought to be less specific to multiple myeloma but should still remain in the differential diagnosis. To our knowledge, this is the first case of myelomatous pleural effusion (MPE) that was reported after multiple relapses of MM. MPE is a very rare complication of MM, and its presence is a strong indicator of imminent mortality and need for comfort care in case of multiple relapses. End-stage pleural effusion in MM in the setting of proteasome inhibitor adds more therapeutic and diagnostic challenges.

  18. Tissue-Specific Control of the Endocycle by the Anaphase Promoting Complex/Cyclosome Inhibitors UVI4 and DEL1.

    Science.gov (United States)

    Heyman, Jefri; Polyn, Stefanie; Eekhout, Thomas; De Veylder, Lieven

    2017-09-01

    The endocycle represents a modified mitotic cell cycle that in plants is often coupled to cell enlargement and differentiation. Endocycle onset is controlled by activity of the Anaphase Promoting Complex/Cyclosome (APC/C), a multisubunit E3 ubiquitin ligase targeting cell-cycle factors for destruction. CELL CYCLE SWITCH52 (CCS52) proteins represent rate-limiting activator subunits of the APC/C. In Arabidopsis ( Arabidopsis thaliana ), mutations in either CCS52A1 or CCS52A2 activators result in a delayed endocycle onset, whereas their overexpression triggers increased DNA ploidy levels. Here, the relative contribution of the APC/C CCS52A1 and APC/C CCS52A2 complexes to different developmental processes was studied through analysis of their negative regulators, being the ULTRAVIOLET-B-INSENSITIVE4 protein and the DP-E2F-Like1 transcriptional repressor, respectively. Our data illustrate cooperative activity of the APC/C CCS52A1 and APC/C CCS52A2 complexes during root and trichome development, but functional interdependency during leaf development. Furthermore, we found APC/C CCS52A1 activity to control CCS52A2 expression. We conclude that interdependency of CCS52A-controlled APC/C activity is controlled in a tissue-specific manner. © 2017 American Society of Plant Biologists. All Rights Reserved.

  19. A Nonbactericidal Zinc-Complexing Ligand as a Biofilm Inhibitor: Structure-Guided Contrasting Effects on Staphylococcus aureus Biofilm.

    Science.gov (United States)

    Kapoor, Vidushi; Rai, Rajanikant; Thiyagarajan, Durairaj; Mukherjee, Sandipan; Das, Gopal; Ramesh, Aiyagari

    2017-08-04

    Zinc-complexing ligands are prospective anti-biofilm agents because of the pivotal role of zinc in the formation of Staphylococcus aureus biofilm. Accordingly, the potential of a thiosemicarbazone (compound C1) and a benzothiazole-based ligand (compound C4) in the prevention of S. aureus biofilm formation was assessed. Compound C1 displayed a bimodal activity, hindering biofilm formation only at low concentrations and promoting biofilm growth at higher concentrations. In the case of C4, a dose-dependent inhibition of S. aureus biofilm growth was observed. Atomic force microscopy analysis suggested that at higher concentrations C1 formed globular aggregates, which perhaps formed a substratum that favored adhesion of cells and biofilm formation. In the case of C4, zinc supplementation experiments validated zinc complexation as a plausible mechanism of inhibition of S. aureus biofilm. Interestingly, C4 was nontoxic to cultured HeLa cells and thus has promise as a therapeutic anti-biofilm agent. The essential understanding of the structure-driven implications of zinc-complexing ligands acquired in this study might assist future screening regimes for identification of potent anti-biofilm agents. © 2017 Wiley-VCH Verlag GmbH & Co. KGaA, Weinheim.

  20. The sources of primary data for the development potentially dangerous patterns of cyber-attacks

    OpenAIRE

    Грищук, Руслан Валентинович; Житомирський військовий інститут імені С. П. Корольова; Охрімчук, Володимир Васильович; Житомирський військовий інститут імені С. П. Корольова; Ахтирцева, Влада Сергіївна; в/ч А1912

    2016-01-01

    It was established fact that the efficiency of modern systems of information and cyber security essentially de-pends on correct and timely development by vendors of antivirus software patterns of the detected cyber-attacks and timely update databases pattern of attacks these users of security. However, the constant improvement of the technological complexity of cyber-attacks requires from vendors constant improvement of mechanisms of development patterns of cyber-attacks. One of the promising...

  1. A Reasoning Method of Cyber-Attack Attribution Based on Threat Intelligence

    OpenAIRE

    Li Qiang; Yang Ze-Ming; Liu Bao-Xu; Jiang Zheng-Wei

    2016-01-01

    With the increasing complexity of cyberspace security, the cyber-attack attribution has become an important challenge of the security protection systems. The difficult points of cyber-attack attribution were forced on the problems of huge data handling and key data missing. According to this situation, this paper presented a reasoning method of cyber-attack attribution based on threat intelligence. The method utilizes the intrusion kill chain model and Bayesian network to build attack chain a...

  2. Crystal structure of a polyhistidine-tagged recombinant catalytic subunit of cAMP-dependent protein kinase complexed with the peptide inhibitor PKI(5-24) and adenosine.

    Science.gov (United States)

    Narayana, N; Cox, S; Shaltiel, S; Taylor, S S; Xuong, N

    1997-04-15

    The crystal structure of the hexahistidine-tagged mouse recombinant catalytic subunit (H6-rC) of cAMP-dependent protein kinase (cAPK), complexed with a 20-residue peptide inhibitor from the heat-stable protein kinase inhibitor PKI(5-24) and adenosine, was determined at 2.2 A resolution. Novel crystallization conditions were required to grow the ternary complex crystals. The structure was refined to a final crystallographic R-factor of 18.2% with good stereochemical parameters. The "active" enzyme adopts a "closed" conformation as found in rC:PKI(5-24) [Knighton et al. (1991a,b) Science 253, 407-414, 414-420] and packs in a similar manner with the peptide providing a major contact surface. This structure clearly defines the subsites of the unique nucleotide binding site found in the protein kinase family. The adenosine occupies a mostly hydrophobic pocket at the base of the cleft between the two lobes and is completely buried. The missing triphosphate moiety of ATP is filled with a water molecule (Wtr 415) which replaces the gamma-phosphate of ATP. The glycine-rich loop between beta1 and beta2 helps to anchor the phosphates while the ribose ring is buried beneath beta-strand 2. Another ordered water molecule (Wtr 375) is pentacoordinated with polar atoms from adenosine, Leu 49 in beta-strand 1, Glu 127 in the linker strand between the two lobes, Tyr 330, and a third water molecule, Wtr 359. The conserved nucleotide fold can be defined as a lid comprised of beta-strand 1, the glycine-rich loop, and beta-strand 2. The adenine ring is buried beneath beta-strand 1 and the linker strand (120-127) that joins the small and large lobes. The C-terminal tail containing Tyr 330, a segment that lies outside the conserved core, covers this fold and anchors it in a closed conformation. The main-chain atoms of the flexible glycine-rich loop (residues 50-55) in the ATP binding domain have a mean B-factor of 41.4 A2. This loop is quite mobile, in striking contrast to the other

  3. Cyber Attacks and Combat Behavior

    Directory of Open Access Journals (Sweden)

    Carataș Maria Alina

    2017-01-01

    Full Text Available Cyber terrorism is an intangible danger, a real over the corner threat in the life of individuals,organizations, and governments and is getting harder to deal with its damages. The motivations forthe cyber-attacks are different, depending on the terrorist group, from cybercrime to hacktivism,attacks over the authorities’ servers. Organizations constantly need to find new ways ofstrengthening protection against cyber-attacks, assess their cyber readiness, expand the resiliencecapacity and adopts international security regulations.

  4. An approximate but efficient method to calculate free energy trends by computer simulation: Application to dihydrofolate reductase-inhibitor complexes

    Science.gov (United States)

    Gerber, Paul R.; Mark, Alan E.; van Gunsteren, Wilfred F.

    1993-06-01

    Derivatives of free energy differences have been calculated by molecular dynamics techniques. The systems under study were ternary complexes of Trimethoprim (TMP) with dihydrofolate reductases of E. coli and chicken liver, containing the cofactor NADPH. Derivatives are taken with respect to modification of TMP, with emphasis on altering the 3-, 4- and 5-substituents of the phenyl ring. A linear approximation allows the encompassing of a whole set of modifications in a single simulation, as opposed to a full perturbation calculation, which requires a separate simulation for each modification. In the case considered here, the proposed technique requires a factor of 1000 less computing effort than a full free energy perturbation calculation. For the linear approximation to yield a significant result, one has to find ways of choosing the perturbation evolution, such that the initial trend mirrors the full calculation. The generation of new atoms requires a careful treatment of the singular terms in the non-bonded interaction. The result can be represented by maps of the changed molecule, which indicate whether complex formation is favoured under movement of partial charges and change in atom polarizabilities. Comparison with experimental measurements of inhibition constants reveals fair agreement in the range of values covered. However, detailed comparison fails to show a significant correlation. Possible reasons for the most pronounced deviations are given.

  5. A holistic approach to dissecting SPARC family protein complexity reveals FSTL-1 as an inhibitor of pancreatic cancer cell growth.

    Science.gov (United States)

    Viloria, Katrina; Munasinghe, Amanda; Asher, Sharan; Bogyere, Roberto; Jones, Lucy; Hill, Natasha J

    2016-11-25

    SPARC is a matricellular protein that is involved in both pancreatic cancer and diabetes. It belongs to a wider family of proteins that share structural and functional similarities. Relatively little is known about this extended family, but evidence of regulatory interactions suggests the importance of a holistic approach to their study. We show that Hevin, SPOCKs, and SMOCs are strongly expressed within islets, ducts, and blood vessels, suggesting important roles for these proteins in the normal pancreas, while FSTL-1 expression is localised to the stromal compartment reminiscent of SPARC. In direct contrast to SPARC, however, FSTL-1 expression is reduced in pancreatic cancer. Consistent with this, FSTL-1 inhibited pancreatic cancer cell proliferation. The complexity of SPARC family proteins is further revealed by the detection of multiple cell-type specific isoforms that arise due to a combination of post-translational modification and alternative splicing. Identification of splice variants lacking a signal peptide suggests the existence of novel intracellular isoforms. This study underlines the importance of addressing the complexity of the SPARC family and provides a new framework to explain their controversial and contradictory effects. We also demonstrate for the first time that FSTL-1 suppresses pancreatic cancer cell growth.

  6. Strengthening Crypto-1 Cipher Against Algebraic Attacks

    Directory of Open Access Journals (Sweden)

    Farah Afianti

    2015-08-01

    Full Text Available In the last few years, several studies addressed the problem of data security in Mifare Classic. One of its weaknesses is the low random number quality. This causes SAT solver attacks to have lower complexity. In order to strengthen Crypto-1 against SAT solver attacks, a modification of the feedback function with better cryptographic properties is proposed. It applies a primitive polynomial companion matrix. SAT solvers cannot directly attack the feedback shift register that uses the modified Boolean feedback function, the register has to be split into smaller groups. Experimental testing showed that the amount of memory and CPU time needed were highest when attacking the modified Crypto-1 using the modified feedback function and the original filter function. In addition, another modified Crypto-1, using the modified feedback function and a modified filter function, had the lowest percentage of revealed variables. It can be concluded that the security strength and performance of the modified Crypto-1 using the modified feedback function and the modified filter function are better than those of the original Crypto-1.

  7. Strategic defense and attack for reliability systems

    International Nuclear Information System (INIS)

    Hausken, Kjell

    2008-01-01

    This article illustrates a method by which arbitrarily complex series/parallel reliability systems can be analyzed. The method is illustrated with the series-parallel and parallel-series systems. Analytical expressions are determined for the investments and utilities of the defender and the attacker, depend on their unit costs of investment for each component, the contest intensity for each component, and their evaluations of the value of system functionality. For a series-parallel system, infinitely many components in parallel benefit the defender maximally regardless of the finite number of parallel subsystems in series. Conversely, infinitely many components in series benefit the attacker maximally regardless of the finite number of components in parallel in each subsystem. For a parallel-series system, the results are opposite. With equivalent components, equal unit costs for defender and attacker, equal intensity for all components, and equally many components in series and parallel, the defender always prefers the series-parallel system rather than the parallel-series system, and converse holds for the attacker. Hence from the defender's perspective, ceteris paribus, the series-parallel system is more reliable, and has fewer 'cut sets' or failure modes

  8. Seven Deadliest Social Network Attacks

    CERN Document Server

    Timm, Carl

    2010-01-01

    Do you need to keep up with the latest hacks, attacks, and exploits effecting social networks? Then you need Seven Deadliest Social Network Attacks. This book pinpoints the most dangerous hacks and exploits specific to social networks like Facebook, Twitter, and MySpace, laying out the anatomy of these attacks including how to make your system more secure. You will discover the best ways to defend against these vicious hacks with step-by-step instruction and learn techniques to make your computer and network impenetrable. Attacks detailed in this book include: Social Networking Infrastruct

  9. Crystal structure of human cyclin-dependent kinase-2 complex with MK2 inhibitor TEI-I01800: insight into the selectivity

    Energy Technology Data Exchange (ETDEWEB)

    Fujino, Aiko; Fukushima, Kei; Kubota, Takaharu; Kosugi, Tomomi; Takimoto-Kamimura, Midori, E-mail: m.kamimura@teijin.co.jp [Teijin Pharma Limited, 4-3-2 Asahigaoka, Hino-shi, Tokyo 191-8512 (Japan)

    2013-11-01

    The Gly-rich loop of cyclin-dependent kinase 2 (CDK2) bound to TEI-I01800 as an MK2 specific inhibitor forms a β-sheet which is a common structure in CDK2–ligand complexes. Here, the reason why TEI-I01800 does not become a strong inhibitor against CDK2 based on the conformation of TEI-I01800 is presented. Mitogen-activated protein kinase-activated protein kinase 2 (MK2 or MAPKAP-K2) is a Ser/Thr kinase from the p38 mitogen-activated protein kinase signalling pathway and plays an important role in inflammatory diseases. The crystal structure of the MK2–TEI-I01800 complex has been reported; its Gly-rich loop was found to form an α-helix, not a β-sheet as has been observed for other Ser/Thr kinases. TEI-I01800 is 177-fold selective against MK2 compared with CDK2; in order to understand the inhibitory mechanism of TEI-I01800, the cyclin-dependent kinase 2 (CDK2) complex structure with TEI-I01800 was determined at 2.0 Å resolution. Interestingly, the Gly-rich loop of CDK2 formed a β-sheet that was different from that of MK2. In MK2, TEI-I01800 changed the secondary structure of the Gly-rich loop from a β-sheet to an α-helix by collision between Leu70 and a p-ethoxyphenyl group at the 7-position and bound to MK2. However, for CDK2, TEI-I01800 bound to CDK2 without this structural change and lost the interaction with the substituent at the 7-position. In summary, the results of this study suggest that the reason for the selectivity of TEI-I01800 is the favourable conformation of TEI-I01800 itself, making it suitable for binding to the α-form MK2.

  10. Crony Attack: Strategic Attack’s Silver Bullet

    Science.gov (United States)

    2006-11-01

    physical assets or financial assets. The form of crony attack that most closely resembles classic strategic attack is to deny, degrade, or destroy a money...February 1951. Reprinted in Airpower Studies Coursebook , Air Command and Staff College, Maxwell AFB, AL, 2002, 152–58. Hirsch, Michael. “NATO’s Game of

  11. Novel Method For Low-Rate Ddos Attack Detection

    Science.gov (United States)

    Chistokhodova, A. A.; Sidorov, I. D.

    2018-05-01

    The relevance of the work is associated with an increasing number of advanced types of DDoS attacks, in particular, low-rate HTTP-flood. Last year, the power and complexity of such attacks increased significantly. The article is devoted to the analysis of DDoS attacks detecting methods and their modifications with the purpose of increasing the accuracy of DDoS attack detection. The article details low-rate attacks features in comparison with conventional DDoS attacks. During the analysis, significant shortcomings of the available method for detecting low-rate DDoS attacks were found. Thus, the result of the study is an informal description of a new method for detecting low-rate denial-of-service attacks. The architecture of the stand for approbation of the method is developed. At the current stage of the study, it is possible to improve the efficiency of an already existing method by using a classifier with memory, as well as additional information.

  12. Invisible Trojan-horse attack

    DEFF Research Database (Denmark)

    Sajeed, Shihan; Minshull, Carter; Jain, Nitin

    2017-01-01

    We demonstrate the experimental feasibility of a Trojan-horse attack that remains nearly invisible to the single-photon detectors employed in practical quantum key distribution (QKD) systems, such as Clavis2 from ID Quantique. We perform a detailed numerical comparison of the attack performance...

  13. When Sinuses Attack! (For Kids)

    Science.gov (United States)

    ... First Aid & Safety Doctors & Hospitals Videos Recipes for Kids Kids site Sitio para niños How the Body Works ... Search English Español When Sinuses Attack! KidsHealth / For Kids / When Sinuses Attack! What's in this article? What ...

  14. Invisible Trojan-horse attack.

    Science.gov (United States)

    Sajeed, Shihan; Minshull, Carter; Jain, Nitin; Makarov, Vadim

    2017-08-21

    We demonstrate the experimental feasibility of a Trojan-horse attack that remains nearly invisible to the single-photon detectors employed in practical quantum key distribution (QKD) systems, such as Clavis2 from ID Quantique. We perform a detailed numerical comparison of the attack performance against Scarani-Ac´ın-Ribordy-Gisin (SARG04) QKD protocol at 1924 nm versus that at 1536 nm. The attack strategy was proposed earlier but found to be unsuccessful at the latter wavelength, as reported in N. Jain et al., New J. Phys. 16, 123030 (2014). However at 1924 nm, we show experimentally that the noise response of the detectors to bright pulses is greatly reduced, and show by modeling that the same attack will succeed. The invisible nature of the attack poses a threat to the security of practical QKD if proper countermeasures are not adopted.

  15. Analysis of the binding of pro-urokinase and urokinase-plasminogen activator inhibitor-1 complex to the low density lipoprotein receptor-related protein using a Fab fragment selected from a phage-displayed Fab library

    NARCIS (Netherlands)

    Horn, I. R.; Moestrup, S. K.; van den Berg, B. M.; Pannekoek, H.; Nielsen, M. S.; van Zonneveld, A. J.

    1995-01-01

    The low density lipoprotein receptor-related protein/alpha 2-macroglobulin receptor (LRP) mediates endocytosis of a number of structurally unrelated ligands, including complexes of plasminogen activator inhibitor type 1 (PAI-1) and tissue-type plasminogen activator (t-PA) or urokinase plasminogen

  16. Heat shock protein 90 chaperone complex inhibitor enhanced radiosensitivity through modification of response to hormone and degradation of androgen receptor in hormone sensitive prostate cancer cell line

    International Nuclear Information System (INIS)

    Mitsuhashi, N.; Harashima, K.; Akimoto, T.

    2003-01-01

    It is easily speculated that androgen or androgen deprivation affects proliferative activity or radiosensitivity, but there has been enough information how androgen or androgen deprivation influences the response to radiation. In this setting, the effect of dihydrotestosterone (DHT) on cellular growth and radiosensitivity was examined in hormone-responsive human prostate cancer cell line (LnCap). The binding of androgen receptor (AR) with heat shock protein 90 (Hsp90) plays an important role in stability of the function of receptor. It was, therefore, examined how Hsp90 chaperone complex inhibitor modified the effect of DHT on radiosensitivity in addition to the effect of DHT, especially focusing on AR and its downstream signal transduction pathways. Hydroxy-flutamide (OH-flutamide) was also used to confirm the effect of activation of AR on radiosensitivity because AR of LnCap has a point mutation, leading to activation of AR caused by the binding of OH-flutamide. Radicicol was used as a Hsp90 chaperone complex inhibitor, and incubated with cells at a concentration of 500 nM. Radicicol was incubated with cells for 9 h, and cells were irradiated 1 h after the start of incubation. DHT and OH-flutamide were incubated with cells until staining. DHT or OH-flutamide resulted in stimulation of cellular growth in contrast to inhibition of cellular growth caused by higher concentrations, so that we adopted 1 nM as a concentration of DHT and 1μM as a concentration of OH-flutamide. DHT or OH-flutamide in combination with radiation resulted in slight decrease in radiosensitivity compared with radiation alone. Radicicol at a concentration of 500 nM in combination with DHT or OH-flutamide abolished decrease in radiosensitivity caused by DHT or OH-flutamide. In terms of the expression of AR, radicicol in combination with radiation and/or DHT, OH-flutamide induced degradation of AR. In consistent with degradation of AR, the expression of prostate specific antigen (PSA) decreased

  17. Analysing initial attack on wildland fires using stochastic simulation.

    Science.gov (United States)

    Jeremy S. Fried; J. Keith Gilless; James. Spero

    2006-01-01

    Stochastic simulation models of initial attack on wildland fire can be designed to reflect the complexity of the environmental, administrative, and institutional context in which wildland fire protection agencies operate, but such complexity may come at the cost of a considerable investment in data acquisition and management. This cost may be well justified when it...

  18. KB-R7943, an inhibitor of the reverse Na+/Ca2+ exchanger, blocks N-methyl-D-aspartate receptor and inhibits mitochondrial complex I

    Science.gov (United States)

    Brustovetsky, Tatiana; Brittain, Matthew K; Sheets, Patrick L; Cummins, Theodore R; Pinelis, Vsevolod; Brustovetsky, Nickolay

    2011-01-01

    BACKGROUND AND PURPOSE An isothiourea derivative (2-[2-[4-(4-nitrobenzyloxy)phenyl]ethyl]isothiourea methane sulfonate (KB-R7943), a widely used inhibitor of the reverse Na+/Ca2+ exchanger (NCXrev), was instrumental in establishing the role of NCXrev in glutamate-induced Ca2+ deregulation in neurons. Here, the effects of KB-R7943 on N-methyl-D-aspartate (NMDA) receptors and mitochondrial complex I were tested. EXPERIMENTAL APPROACH Fluorescence microscopy, electrophysiological patch-clamp techniques and cellular respirometry with Seahorse XF24 analyzer were used with cultured hippocampal neurons; membrane potential imaging, respirometry and Ca2+ flux measurements were made in isolated rat brain mitochondria. KEY RESULTS KB-R7943 inhibited NCXrev with IC50= 5.7 ± 2.1 µM, blocked NMDAR-mediated ion currents, and inhibited NMDA-induced increase in cytosolic Ca2+ with IC50= 13.4 ± 3.6 µM but accelerated calcium deregulation and mitochondrial depolarization in glutamate-treated neurons. KB-R7943 depolarized mitochondria in a Ca2+-independent manner. Stimulation of NMDA receptors caused NAD(P)H oxidation that was coupled or uncoupled from ATP synthesis depending on the presence of Ca2+ in the bath solution. KB-R7943, or rotenone, increased NAD(P)H autofluorescence under resting conditions and suppressed NAD(P)H oxidation following glutamate application. KB-R7943 inhibited 2,4-dinitrophenol-stimulated respiration of cultured neurons with IC50= 11.4 ± 2.4 µM. With isolated brain mitochondria, KB-R7943 inhibited respiration, depolarized organelles and suppressed Ca2+ uptake when mitochondria oxidized complex I substrates but was ineffective when mitochondria were supplied with succinate, a complex II substrate. CONCLUSIONS AND IMPLICATIONS KB-R7943, in addition to NCXrev, blocked NMDA receptors in cultured hippocampal neurons and inhibited complex I in the mitochondrial respiratory chain. These findings are critical for the correct interpretation of experimental

  19. Crystal Structure of the Homo sapiens Kynureninase-3-Hydroxyhippuric Acid Inhibitor Complex: Insights into the Molecular Basis Of Kynureninase Substrate Specificity

    Energy Technology Data Exchange (ETDEWEB)

    Lima,Santiago; Kumar,Sunil; Gawandi,Vijay; Momany,Cory; Phillips,Robert S.; (Georgia)

    2009-02-23

    Homo sapiens kynureninase is a pyridoxal-5'-phosphate dependent enzyme that catalyzes the hydrolytic cleavage of 3-hydroxykynurenine to yield 3-hydroxyanthranilate and L-alanine as part of the tryptophan catabolic pathway leading to the de novo biosynthesis of NAD{sup +}. This pathway results in quinolinate, an excitotoxin that is an NMDA receptor agonist. High levels of quinolinate have been correlated with the etiology of neurodegenerative disorders such as AIDS-related dementia and Alzheimer's disease. We have synthesized a novel kynureninase inhibitor, 3-hydroxyhippurate, cocrystallized it with human kynureninase, and solved the atomic structure. On the basis of an analysis of the complex, we designed a series of His-102, Ser-332, and Asn-333 mutants. The H102W/N333T and H102W/S332G/N333T mutants showed complete reversal of substrate specificity between 3-hydroxykynurenine and L-kynurenine, thus defining the primary residues contributing to substrate specificity in kynureninases.

  20. A Discovery Strategy for Selective Inhibitors of c-Src in Complex with the Focal Adhesion Kinase SH3/SH2-binding Region.

    Science.gov (United States)

    Moroco, Jamie A; Baumgartner, Matthew P; Rust, Heather L; Choi, Hwan Geun; Hur, Wooyoung; Gray, Nathanael S; Camacho, Carlos J; Smithgall, Thomas E

    2015-08-01

    The c-Src tyrosine kinase co-operates with the focal adhesion kinase to regulate cell adhesion and motility. Focal adhesion kinase engages the regulatory SH3 and SH2 domains of c-Src, resulting in localized kinase activation that contributes to tumor cell metastasis. Using assay conditions where c-Src kinase activity required binding to a tyrosine phosphopeptide based on the focal adhesion kinase SH3-SH2 docking sequence, we screened a kinase-biased library for selective inhibitors of the Src/focal adhesion kinase peptide complex versus c-Src alone. This approach identified an aminopyrimidinyl carbamate compound, WH-4-124-2, with nanomolar inhibitory potency and fivefold selectivity for c-Src when bound to the phospho-focal adhesion kinase peptide. Molecular docking studies indicate that WH-4-124-2 may preferentially inhibit the 'DFG-out' conformation of the kinase active site. These findings suggest that interaction of c-Src with focal adhesion kinase induces a unique kinase domain conformation amenable to selective inhibition. © 2014 John Wiley & Sons A/S.

  1. Effects of an inhibitor of the γ-secretase complex on proliferation and apoptotic parameters in a FOXL2-mutated granulosa tumor cell line (KGN).

    Science.gov (United States)

    Irusta, Griselda; Pazos, Maria Camila; Maidana, Camila Pazos; Abramovich, Dalhia; De Zúñiga, Ignacio; Parborell, Fernanda; Tesone, Marta

    2013-07-01

    Ovarian granulosa cell tumors (GCTs) represent 3%-5% of all ovarian malignancies. Treatments have limited proven efficacy and biologically targeted treatment is lacking. The aim of this study was to investigate the role of Notch signaling in the proliferation, steroidogenesis, apoptosis, and phosphatidylinositol 3-kinase (PI3K)/AKT pathway in a FOXL2-mutated granulosa tumor cell line (KGN) representative of the adult form of GCTs. When Notch signaling is initiated, the receptors expose a cleavage site in the extracellular domain to the metalloproteinase TACE and, following this cleavage, Notch undergoes another cleavage mediated by the presenilin-gamma-secretase complex. To achieve our goal, DAPT, an inhibitor of the gamma-secretase complex, was used to investigate the role of the Notch system in parameters associated with cell growth and death, using a human granulosa cell tumor line (KGN) as an experimental model. We observed that JAGGED1, DLL4, NOTCH1, and NOTCH4 were highly expressed in KGN cells as compared to granulosa-lutein cells obtained from assisted reproductive techniques patients. The proliferation and viability of KGN cells, as well as progesterone and estradiol production, decreased in the presence of 20 μM DAPT. Apoptotic parameters like PARP and caspase 8 cleavages, BAX, and BCLXs increased in KGN cells cultured with DAPT, whereas others such as BCL2, BCLXl, FAS, and FAS ligand did not change. AKT phosphorylation decreased and PTEN protein increased when Notch signaling was inhibited in KGN cells. We conclude that the Notch system acts as a survival pathway in KGN cells, and might be interacting with the PI3K/AKT pathway.

  2. Structure of the Enterovirus 71 3C Protease in Complex with NK-1.8k and Indications for the Development of Antienterovirus Protease Inhibitor.

    Science.gov (United States)

    Wang, Yaxin; Cao, Lin; Zhai, Yangyang; Yin, Zheng; Sun, Yuna; Shang, Luqing

    2017-07-01

    Hand-foot-and-mouth disease (HFMD), caused by enterovirus, is a threat to public health worldwide. To date, enterovirus 71 (EV71) has been one of the major causative agents of HFMD in the Pacific-Asia region, and outbreaks with EV71 cause millions of infections. However, no drug is currently available for clinical therapeutics. In our previous works, we developed a set of protease inhibitors (PIs) targeting the EV71 3C protease (3C pro ). Among these are NK-1.8k and NK-1.9k, which have various active groups and high potencies and selectivities. In the study described here, we determined the structures of the PI NK-1.8k in complex with wild-type (WT) and drug-resistant EV71 3C pro Comparison of these structures with the structure of unliganded EV71 3C pro and its complex with AG7088 indicated that the mutation of N69 to a serine residue destabilized the S2 pocket. Thus, the mutation influenced the cleavage activity of EV71 3C pro and the inhibitory activity of NK-1.8k in an in vitro protease assay and highlighted that site 69 is an additional key site for PI design. More information for the optimization of the P1' to P4 groups of PIs was also obtained from these structures. Together with the results of our previous works, these in-depth results elucidate the inhibitory mechanism of PIs and shed light to develop PIs for the clinical treatment of infections caused by EV71 and other enteroviruses. Copyright © 2017 American Society for Microbiology.

  3. WILD PIG ATTACKS ON HUMANS

    Energy Technology Data Exchange (ETDEWEB)

    Mayer, J.

    2013-04-12

    Attacks on humans by wild pigs (Sus scrofa) have been documented since ancient times. However, studies characterizing these incidents are lacking. In an effort to better understand this phenomenon, information was collected from 412 wild pig attacks on humans. Similar to studies of large predator attacks on humans, data came from a variety of sources. The various attacks compiled occurred in seven zoogeographic realms. Most attacks occurred within the species native range, and specifically in rural areas. The occurrence was highest during the winter months and daylight hours. Most happened under non-hunting circumstances and appeared to be unprovoked. Wounded animals were the chief cause of these attacks in hunting situations. The animals involved were typically solitary, male and large in size. The fate of the wild pigs involved in these attacks varied depending upon the circumstances, however, most escaped uninjured. Most human victims were adult males traveling on foot and alone. The most frequent outcome for these victims was physical contact/mauling. The severity of resulting injuries ranged from minor to fatal. Most of the mauled victims had injuries to only one part of their bodies, with legs/feet being the most frequent body part injured. Injuries were primarily in the form of lacerations and punctures. Fatalities were typically due to blood loss. In some cases, serious infections or toxemia resulted from the injuries. Other species (i.e., pets and livestock) were also accompanying some of the humans during these attacks. The fates of these animals varied from escaping uninjured to being killed. Frequency data on both non-hunting and hunting incidents of wild pig attacks on humans at the Savannah River Site, South Carolina, showed quantitatively that such incidents are rare.

  4. Shark Attack Project - Marine Attack at Towed Hydrophone Arrays

    National Research Council Canada - National Science Library

    Kalmijn, Adrianus J

    2005-01-01

    The original objective of the SIO Marine Attack project was to identify the electric and magnetic fields causing sharks to inflict serious damage upon the towed hydrophone arrays of US Navy submarines...

  5. The Cyber-Physical Attacker

    DEFF Research Database (Denmark)

    Vigo, Roberto

    2012-01-01

    The world of Cyber-Physical Systems ranges from industrial to national interest applications. Even though these systems are pervading our everyday life, we are still far from fully understanding their security properties. Devising a suitable attacker model is a crucial element when studying...... the security properties of CPSs, as a system cannot be secured without defining the threats it is subject to. In this work an attacker scenario is presented which addresses the peculiarities of a cyber-physical adversary, and we discuss how this scenario relates to other attacker models popular in the security...

  6. The accountability problem of flooding attacks in service-oriented architectures

    DEFF Research Database (Denmark)

    Jensen, Meiko; Schwenk, Jörg

    2009-01-01

    The threat of Denial of Service attacks poses a serious problem to the security of network-based services in general. For flooding attacks against service-oriented applications, this threat is dramatically amplified with potentially much higher impact and very little effort on the attacker's side....... Additionally, due to the high distribution of a SOA application's components, fending such attacks becomes a far more complex task. In this paper, we present the problem of accountability, referring to the issue of resolving the attacker in a highly distributed service-oriented application. Using a general...

  7. Forensics Investigation of Web Application Security Attacks

    OpenAIRE

    Amor Lazzez; Thabet Slimani

    2015-01-01

    Nowadays, web applications are popular targets for security attackers. Using specific security mechanisms, we can prevent or detect a security attack on a web application, but we cannot find out the criminal who has carried out the security attack. Being unable to trace back an attack, encourages hackers to launch new attacks on the same system. Web application forensics aims to trace back and attribute a web application security attack to its originator. This may significantly reduce the sec...

  8. The Attack Navigator (Invited)

    NARCIS (Netherlands)

    Probst, Christian W.; Willemson, Jan; Pieters, Wolter; Mauw, Sjouke; Kordy, Barbara; Jajodia, Sushil

    2016-01-01

    The need to assess security and take protection decisions is at least as old as our civilisation. However, the complexity and develop-ment speed of our interconnected technical systems have surpassed our capacity to imagine and evaluate risk scenarios. This holds in particular for risks that are

  9. Superposition Attacks on Cryptographic Protocols

    DEFF Research Database (Denmark)

    Damgård, Ivan Bjerre; Funder, Jakob Løvstad; Nielsen, Jesper Buus

    2011-01-01

    of information. In this paper, we introduce a fundamentally new model of quantum attacks on classical cryptographic protocols, where the adversary is allowed to ask several classical queries in quantum superposition. This is a strictly stronger attack than the standard one, and we consider the security......Attacks on classical cryptographic protocols are usually modeled by allowing an adversary to ask queries from an oracle. Security is then defined by requiring that as long as the queries satisfy some constraint, there is some problem the adversary cannot solve, such as compute a certain piece...... of several primitives in this model. We show that a secret-sharing scheme that is secure with threshold $t$ in the standard model is secure against superposition attacks if and only if the threshold is lowered to $t/2$. We use this result to give zero-knowledge proofs for all of NP in the common reference...

  10. Panic Attacks and Panic Disorder

    Science.gov (United States)

    ... Major changes in your life, such as a divorce or the addition of a baby Smoking or ... quality of life. Complications that panic attacks may cause or be linked to include: Development of specific ...

  11. What Is a Heart Attack?

    Science.gov (United States)

    ... medical center. Support from family and friends also can help relieve stress and anxiety. Let your loved ones know how you feel and what they can do to help you. Risk of a Repeat Heart Attack Once ...

  12. Software-based Microarchitectural Attacks

    OpenAIRE

    Gruss, Daniel

    2017-01-01

    Modern processors are highly optimized systems where every single cycle of computation time matters. Many optimizations depend on the data that is being processed. Software-based microarchitectural attacks exploit effects of these optimizations. Microarchitectural side-channel attacks leak secrets from cryptographic computations, from general purpose computations, or from the kernel. This leakage even persists across all common isolation boundaries, such as processes, containers, and virtual ...

  13. OPERATION COBRA. Deliberate Attack, Exploitation

    Science.gov (United States)

    1984-05-25

    to attack Sens, then continue to Troyes , on the Seine River. CCA was in the north, crossing the Loing River at Souppes against light resistance and...advanced from Troyes and prepared positions close to Sens. Under strong artillery support, a task force from CCA (TF Oden) attacked the enemy frontally...movement towards the Seine River on 24 August with an advance toward Troyes . Facing the combat command were what remained of the 51st SS Brigade, light

  14. Attacker-defender game from a network science perspective

    Science.gov (United States)

    Li, Ya-Peng; Tan, Suo-Yi; Deng, Ye; Wu, Jun

    2018-05-01

    Dealing with the protection of critical infrastructures, many game-theoretic methods have been developed to study the strategic interactions between defenders and attackers. However, most game models ignore the interrelationship between different components within a certain system. In this paper, we propose a simultaneous-move attacker-defender game model, which is a two-player zero-sum static game with complete information. The strategies and payoffs of this game are defined on the basis of the topology structure of the infrastructure system, which is represented by a complex network. Due to the complexity of strategies, the attack and defense strategies are confined by two typical strategies, namely, targeted strategy and random strategy. The simulation results indicate that in a scale-free network, the attacker virtually always attacks randomly in the Nash equilibrium. With a small cost-sensitive parameter, representing the degree to which costs increase with the importance of a target, the defender protects the hub targets with large degrees preferentially. When the cost-sensitive parameter exceeds a threshold, the defender switches to protecting nodes randomly. Our work provides a new theoretical framework to analyze the confrontations between the attacker and the defender on critical infrastructures and deserves further study.

  15. Identifying and tracking attacks on networks: C3I displays and related technologies

    Science.gov (United States)

    Manes, Gavin W.; Dawkins, J.; Shenoi, Sujeet; Hale, John C.

    2003-09-01

    Converged network security is extremely challenging for several reasons; expanded system and technology perimeters, unexpected feature interaction, and complex interfaces all conspire to provide hackers with greater opportunities for compromising large networks. Preventive security services and architectures are essential, but in and of themselves do not eliminate all threat of compromise. Attack management systems mitigate this residual risk by facilitating incident detection, analysis and response. There are a wealth of attack detection and response tools for IP networks, but a dearth of such tools for wireless and public telephone networks. Moreover, methodologies and formalisms have yet to be identified that can yield a common model for vulnerabilities and attacks in converged networks. A comprehensive attack management system must coordinate detection tools for converged networks, derive fully-integrated attack and network models, perform vulnerability and multi-stage attack analysis, support large-scale attack visualization, and orchestrate strategic responses to cyber attacks that cross network boundaries. We present an architecture that embodies these principles for attack management. The attack management system described engages a suite of detection tools for various networking domains, feeding real-time attack data to a comprehensive modeling, analysis and visualization subsystem. The resulting early warning system not only provides network administrators with a heads-up cockpit display of their entire network, it also supports guided response and predictive capabilities for multi-stage attacks in converged networks.

  16. Key Recovery Attacks on Recent Authenticated Ciphers

    DEFF Research Database (Denmark)

    Bogdanov, Andrey; Dobraunig, Christoph; Eichlseder, Maria

    2014-01-01

    In this paper, we cryptanalyze three authenticated ciphers: AVALANCHE, Calico, and RBS. While the former two are contestants in the ongoing international CAESAR competition for authenticated encryption schemes, the latter has recently been proposed for lightweight applications such as RFID systems...... and wireless networks. All these schemes use well-established and secure components such as the AES, Grain-like NFSRs, ChaCha and SipHash as their building blocks. However, we discover key recovery attacks for all three designs, featuring square-root complexities. Using a key collision technique, we can...

  17. Inhibition of localized attack on the aluminium alloy AA 6351 in glycol/water solutions

    Energy Technology Data Exchange (ETDEWEB)

    Monticelli, C; Brunoro, G; Zucchi, F; Fagioli, F

    1989-06-01

    The objective of this work was to examine the feasibility of enhancing pitting resistance of AA 6351 (nominal composition: 1% Si, 0.6% Mg, 0.3% Mn, balance Al) by adding suitable inhibitors to the solutions. The compounds used were two inorganic salts: sodium molybdate and sodium tungstate and two derivatives of pyrimidine: 2-aminopyrimidine (2AP) and 2-hydroxypyrimidine (2HP). The inhibiting efficiencies of these substances were tested by both short-time electrochemical tests (galvanic coupling tests and polarization curves) and long-time immersions under experimental conditions causing the localized attack. Molybdate, tungstate and, to some extent, also 2AP efficiently inhibit AA 6351 localized corrosion in degraded solutions at 80/sup 0/C and in pure boiling solutions, for long exposure periods. The short-time electrochemical tests suggest that molybdate and tungstate are able to retard the electrochemical processes occurring on both the aluminium alloy and the small copper cathodic area produced by copper deposition. On the other hand, the 2AP efficiency is attributed to some complexing capability of this pyrimidine derivative towards dissolved copper ions, that are stabilized in solution. 2HP does not prevent AA 6351 localized attack. (orig./MM).

  18. Novel bis-(−)-nor-meptazinol derivatives act as dual binding site AChE inhibitors with metal-complexing property

    Energy Technology Data Exchange (ETDEWEB)

    Zheng, Wei [Department of Medicinal Chemistry, School of Pharmacy, Fudan University, 826 Zhangheng Road, Shanghai 200032 (China); NPFPC Key Laboratory of Contraceptives and Devices, Shanghai Institute of Planned Parenthood Research, 2140 Xietu Road, Shanghai 200032 (China); Li, Juan [Department of Pharmacology, Institute of Medical Sciences, Shanghai Jiaotong University School of Medicine, 280 South Chongqing Road, Shanghai 200025 (China); Qiu, Zhuibai [Department of Medicinal Chemistry, School of Pharmacy, Fudan University, 826 Zhangheng Road, Shanghai 200032 (China); Xia, Zheng [Department of Pharmacology, Institute of Medical Sciences, Shanghai Jiaotong University School of Medicine, 280 South Chongqing Road, Shanghai 200025 (China); Li, Wei [Department of Medicinal Chemistry, School of Pharmacy, Fudan University, 826 Zhangheng Road, Shanghai 200032 (China); Yu, Lining; Chen, Hailin; Chen, Jianxing [NPFPC Key Laboratory of Contraceptives and Devices, Shanghai Institute of Planned Parenthood Research, 2140 Xietu Road, Shanghai 200032 (China); Chen, Yan; Hu, Zhuqin; Zhou, Wei; Shao, Biyun; Cui, Yongyao [Department of Pharmacology, Institute of Medical Sciences, Shanghai Jiaotong University School of Medicine, 280 South Chongqing Road, Shanghai 200025 (China); Xie, Qiong, E-mail: xiejoanxq@gmail.com [Department of Medicinal Chemistry, School of Pharmacy, Fudan University, 826 Zhangheng Road, Shanghai 200032 (China); Chen, Hongzhuan, E-mail: yaoli@shsmu.edu.cn [Department of Pharmacology, Institute of Medical Sciences, Shanghai Jiaotong University School of Medicine, 280 South Chongqing Road, Shanghai 200025 (China)

    2012-10-01

    The strategy of dual binding site acetylcholinesterase (AChE) inhibition along with metal chelation may represent a promising direction for multi-targeted interventions in the pathophysiological processes of Alzheimer's disease (AD). In the present study, two derivatives (ZLA and ZLB) of a potent dual binding site AChE inhibitor bis-(−)-nor-meptazinol (bis-MEP) were designed and synthesized by introducing metal chelating pharmacophores into the middle chain of bis-MEP. They could inhibit human AChE activity with IC{sub 50} values of 9.63 μM (for ZLA) and 8.64 μM (for ZLB), and prevent AChE-induced amyloid-β (Aβ) aggregation with IC{sub 50} values of 49.1 μM (for ZLA) and 55.3 μM (for ZLB). In parallel, molecular docking analysis showed that they are capable of interacting with both the catalytic and peripheral anionic sites of AChE. Furthermore, they exhibited abilities to complex metal ions such as Cu(II) and Zn(II), and inhibit Aβ aggregation triggered by these metals. Collectively, these results suggest that ZLA and ZLB may act as dual binding site AChEIs with metal-chelating potency, and may be potential leads of value for further study on disease-modifying treatment of AD. -- Highlights: ► Two novel bis-(−)-nor-meptazinol derivatives are designed and synthesized. ► ZLA and ZLB may act as dual binding site AChEIs with metal-chelating potency. ► They are potential leads for disease-modifying treatment of Alzheimer's disease.

  19. Directional Migration in Esophageal Squamous Cell Carcinoma (ESCC is Epigenetically Regulated by SET Nuclear Oncogene, a Member of the Inhibitor of Histone Acetyltransferase Complex

    Directory of Open Access Journals (Sweden)

    Xiang Yuan

    2017-11-01

    Full Text Available Directional cell migration is of fundamental importance to a variety of biological events, including metastasis of malignant cells. Herein, we specifically investigated SET oncoprotein, a subunit of the recently identified inhibitor of acetyltransferases (INHAT complex and identified its role in the establishment of front–rear cell polarity and directional migration in Esophageal Squamous Cell Carcinoma (ESCC. We further define the molecular circuits that govern these processes by showing that SET modulated DOCK7/RAC1 and cofilin signaling events. Moreover, a detailed analysis of the spatial distribution of RAC1 and cofilin allowed us to decipher the synergistical contributions of the two in coordinating the advancing dynamics by measuring architectures, polarities, and cytoskeletal organizations of the lamellipodia leading edges. In further investigations in vivo, we identified their unique role at multiple levels of the invasive cascade for SET cell and indicate the necessity for their functional balance to enable efficient invasion as well. Additionally, SET epigenetically repressed miR-30c expression by deacetylating histones H2B and H4 on its promoter, which was functionally important for the biological effects of SET in our cell-context. Finally, we corroborated our findings in vivo by evaluating the clinical relevance of SET signaling in the metastatic burden in mice and a large series of patients with ESCC at diagnosis, observing it's significance in predicting metastasis formation. Our findings uncovered a novel signaling network initiated by SET that epigenetically modulated ESCC properties and suggest that targeting the regulatory axis might be a promising strategy to inhibit migration and metastasis.

  20. Novel bis-(−)-nor-meptazinol derivatives act as dual binding site AChE inhibitors with metal-complexing property

    International Nuclear Information System (INIS)

    Zheng, Wei; Li, Juan; Qiu, Zhuibai; Xia, Zheng; Li, Wei; Yu, Lining; Chen, Hailin; Chen, Jianxing; Chen, Yan; Hu, Zhuqin; Zhou, Wei; Shao, Biyun; Cui, Yongyao; Xie, Qiong; Chen, Hongzhuan

    2012-01-01

    The strategy of dual binding site acetylcholinesterase (AChE) inhibition along with metal chelation may represent a promising direction for multi-targeted interventions in the pathophysiological processes of Alzheimer's disease (AD). In the present study, two derivatives (ZLA and ZLB) of a potent dual binding site AChE inhibitor bis-(−)-nor-meptazinol (bis-MEP) were designed and synthesized by introducing metal chelating pharmacophores into the middle chain of bis-MEP. They could inhibit human AChE activity with IC 50 values of 9.63 μM (for ZLA) and 8.64 μM (for ZLB), and prevent AChE-induced amyloid-β (Aβ) aggregation with IC 50 values of 49.1 μM (for ZLA) and 55.3 μM (for ZLB). In parallel, molecular docking analysis showed that they are capable of interacting with both the catalytic and peripheral anionic sites of AChE. Furthermore, they exhibited abilities to complex metal ions such as Cu(II) and Zn(II), and inhibit Aβ aggregation triggered by these metals. Collectively, these results suggest that ZLA and ZLB may act as dual binding site AChEIs with metal-chelating potency, and may be potential leads of value for further study on disease-modifying treatment of AD. -- Highlights: ► Two novel bis-(−)-nor-meptazinol derivatives are designed and synthesized. ► ZLA and ZLB may act as dual binding site AChEIs with metal-chelating potency. ► They are potential leads for disease-modifying treatment of Alzheimer's disease.

  1. 1.45 A resolution crystal structure of recombinant PNP in complex with a pM multisubstrate analogue inhibitor bearing one feature of the postulated transition state

    International Nuclear Information System (INIS)

    Chojnowski, Grzegorz; Breer, Katarzyna; Narczyk, Marta; Wielgus-Kutrowska, Beata; Czapinska, Honorata; Hashimoto, Mariko; Hikishima, Sadao; Yokomatsu, Tsutomu; Bochtler, Matthias; Girstun, Agnieszka; Staron, Krzysztof; Bzowska, Agnieszka

    2010-01-01

    Low molecular mass purine nucleoside phosphorylases (PNPs, E.C. 2.4.2.1) are homotrimeric enzymes that are tightly inhibited by immucillins. Due to the positive charge on the ribose like part (iminoribitol moiety) and protonation of the N7 atom of the purine ring, immucillins are believed to act as transition state analogues. Over a wide range of concentrations, immucillins bind with strong negative cooperativity to PNPs, so that only every third binding site of the enzyme is occupied (third-of-the-sites binding). 9-(5',5'-difluoro-5'-phosphonopentyl)-9-deazaguanine (DFPP-DG) shares with immucillins the protonation of the N7, but not the positive charge on the ribose like part of the molecule. We have previously shown that DFPP-DG interacts with PNPs with subnanomolar inhibition constant. Here, we report additional biochemical experiments to demonstrate that the inhibitor can be bound with the same K d (∼190 pM) to all three substrate binding sites of the trimeric PNP, and a crystal structure of PNP in complex with DFPP-DG at 1.45 A resolution, the highest resolution published for PNPs so far. The crystals contain the full PNP homotrimer in the asymmetric unit. DFPP-DG molecules are bound in superimposable manner and with full occupancies to all three PNP subunits. Thus the postulated third-of-the-sites binding of immucillins should be rather attribute to the second feature of the transition state, ribooxocarbenium ion character of the ligand or to the coexistence of both features characteristic for the transition state. The DFPP-DG/PNP complex structure confirms the earlier observations, that the loop from Pro57 to Gly66 covering the phosphate-binding site cannot be stabilized by phosphonate analogues. The loop from Glu250 to Gln266 covering the base-binding site is organized by the interactions of Asn243 with the Hoogsteen edge of the purine base of analogues bearing one feature of the postulated transition state (protonated N7 position).

  2. Developing HIV-1 Protease Inhibitors through Stereospecific Reactions in Protein Crystals.

    Science.gov (United States)

    Olajuyigbe, Folasade M; Demitri, Nicola; De Zorzi, Rita; Geremia, Silvano

    2016-10-31

    Protease inhibitors are key components in the chemotherapy of HIV infection. However, the appearance of viral mutants routinely compromises their clinical efficacy, creating a constant need for new and more potent inhibitors. Recently, a new class of epoxide-based inhibitors of HIV-1 protease was investigated and the configuration of the epoxide carbons was demonstrated to play a crucial role in determining the binding affinity. Here we report the comparison between three crystal structures at near-atomic resolution of HIV-1 protease in complex with the epoxide-based inhibitor, revealing an in-situ epoxide ring opening triggered by a pH change in the mother solution of the crystal. Increased pH in the crystal allows a stereospecific nucleophile attack of an ammonia molecule onto an epoxide carbon, with formation of a new inhibitor containing amino-alcohol functions. The described experiments open a pathway for the development of new stereospecific protease inhibitors from a reactive lead compound.

  3. Developing HIV-1 Protease Inhibitors through Stereospecific Reactions in Protein Crystals

    Directory of Open Access Journals (Sweden)

    Folasade M. Olajuyigbe

    2016-10-01

    Full Text Available Protease inhibitors are key components in the chemotherapy of HIV infection. However, the appearance of viral mutants routinely compromises their clinical efficacy, creating a constant need for new and more potent inhibitors. Recently, a new class of epoxide-based inhibitors of HIV-1 protease was investigated and the configuration of the epoxide carbons was demonstrated to play a crucial role in determining the binding affinity. Here we report the comparison between three crystal structures at near-atomic resolution of HIV-1 protease in complex with the epoxide-based inhibitor, revealing an in-situ epoxide ring opening triggered by a pH change in the mother solution of the crystal. Increased pH in the crystal allows a stereospecific nucleophile attack of an ammonia molecule onto an epoxide carbon, with formation of a new inhibitor containing amino-alcohol functions. The described experiments open a pathway for the development of new stereospecific protease inhibitors from a reactive lead compound.

  4. Analytical Characterization of Internet Security Attacks

    Science.gov (United States)

    Sellke, Sarah H.

    2010-01-01

    Internet security attacks have drawn significant attention due to their enormously adverse impact. These attacks includes Malware (Viruses, Worms, Trojan Horse), Denial of Service, Packet Sniffer, and Password Attacks. There is an increasing need to provide adequate defense mechanisms against these attacks. My thesis proposal deals with analytical…

  5. Automated Generation of Attack Trees

    DEFF Research Database (Denmark)

    Vigo, Roberto; Nielson, Flemming; Nielson, Hanne Riis

    2014-01-01

    Attack trees are widely used to represent threat scenarios in a succinct and intuitive manner, suitable for conveying security information to non-experts. The manual construction of such objects relies on the creativity and experience of specialists, and therefore it is error-prone and impractica......Attack trees are widely used to represent threat scenarios in a succinct and intuitive manner, suitable for conveying security information to non-experts. The manual construction of such objects relies on the creativity and experience of specialists, and therefore it is error......-prone and impracticable for large systems. Nonetheless, the automated generation of attack trees has only been explored in connection to computer networks and levering rich models, whose analysis typically leads to an exponential blow-up of the state space. We propose a static analysis approach where attack trees...... are automatically inferred from a process algebraic specification in a syntax-directed fashion, encompassing a great many application domains and avoiding incurring systematically an exponential explosion. Moreover, we show how the standard propositional denotation of an attack tree can be used to phrase...

  6. An effective HIV-1 integrase inhibitor screening platform: Rationality validation of drug screening, conformational mobility and molecular recognition analysis for PFV integrase complex with viral DNA.

    Science.gov (United States)

    Du, Wenyi; Zuo, Ke; Sun, Xin; Liu, Wei; Yan, Xiao; Liang, Li; Wan, Hua; Chen, Fengzheng; Hu, Jianping

    2017-11-01

    As an important target for the development of novel anti-AIDS drugs, HIV-1 integrase (IN) has been widely concerned. However, the lack of a complete accurate crystal structure of HIV-1 IN greatly blocks the discovery of novel inhibitors. In this work, an effective HIV-1 IN inhibitor screening platform, namely PFV IN, was filtered from all species of INs. Next, the 40.8% similarity with HIV-1 IN, as well as the high efficiency of virtual screening and the good agreement between calculated binding free energies and experimental ones all proved PFV IN is a promising screening platform for HIV-1 IN inhibitors. Then, the molecular recognition mechanism of PFV IN by its substrate viral DNA and six naphthyridine derivatives (NRDs) inhibitors was investigated through molecular docking, molecular dynamics simulations and water-mediated interactions analyses. The functional partition of NRDs IN inhibitors could be divided into hydrophobic and hydrophilic ones, and the Mg 2+ ions, water molecules and conserved DDE motif residues all interacted with the hydrophilic partition, while the bases in viral DNA and residues like Tyr212, Pro214 interacted with the hydrophobic one. Finally, the free energy landscape (FEL) and cluster analyses were performed to explore the molecular motion of PFV IN-DNA system. It is found that the association with NRDs inhibitors would obviously decrease the motion amplitude of PFV IN-DNA, which may be one of the most potential mechanisms of IN inhibitors. This work will provide a theoretical basis for the inhibitor design based on the structure of HIV-1 IN. Copyright © 2017 Elsevier Inc. All rights reserved.

  7. A Model of Biological Attacks on a Realistic Population

    Science.gov (United States)

    Carley, Kathleen M.; Fridsma, Douglas; Casman, Elizabeth; Altman, Neal; Chen, Li-Chiou; Kaminsky, Boris; Nave, Demian; Yahja, Alex

    The capability to assess the impacts of large-scale biological attacks and the efficacy of containment policies is critical and requires knowledge-intensive reasoning about social response and disease transmission within a complex social system. There is a close linkage among social networks, transportation networks, disease spread, and early detection. Spatial dimensions related to public gathering places such as hospitals, nursing homes, and restaurants, can play a major role in epidemics [Klovdahl et. al. 2001]. Like natural epidemics, bioterrorist attacks unfold within spatially defined, complex social systems, and the societal and networked response can have profound effects on their outcome. This paper focuses on bioterrorist attacks, but the model has been applied to emergent and familiar diseases as well.

  8. An Analysis of Attacks on Blockchain Consensus

    OpenAIRE

    Bissias, George; Levine, Brian Neil; Ozisik, A. Pinar; Andresen, Gavin

    2016-01-01

    We present and validate a novel mathematical model of the blockchain mining process and use it to conduct an economic evaluation of the double-spend attack, which is fundamental to all blockchain systems. Our analysis focuses on the value of transactions that can be secured under a conventional double-spend attack, both with and without a concurrent eclipse attack. Our model quantifies the importance of several factors that determine the attack's success, including confirmation depth, attacke...

  9. Recurrent spontaneous attacks of dizziness.

    Science.gov (United States)

    Lempert, Thomas

    2012-10-01

    This article describes the common causes of recurrent vertigo and dizziness that can be diagnosed largely on the basis of history. Ninety percent of spontaneous recurrent vertigo and dizziness can be explained by six disorders: (1) Ménière disease is characterized by vertigo attacks, lasting 20 minutes to several hours, with concomitant hearing loss, tinnitus, and aural fullness. Aural symptoms become permanent during the course of the disease. (2) Attacks of vestibular migraine may last anywhere from minutes to days. Most patients have a previous history of migraine headaches, and many experience migraine symptoms during the attack. (3) Vertebrobasilar TIAs affect older adults with vascular risk factors. Most attacks last less than 1 hour and are accompanied by other symptoms from the posterior circulation territory. (4) Vestibular paroxysmia is caused by vascular compression of the eighth cranial nerve. It manifests itself with brief attacks of vertigo that recur many times per day, sometimes with concomitant cochlear symptoms. (5) Orthostatic hypotension causes brief episodes of dizziness lasting seconds to a few minutes after standing up and is relieved by sitting or lying down. In older adults, it may be accompanied by supine hypertension. (6) Panic attacks usually last minutes, occur in specific situations, and are accompanied by choking, palpitations, tremor, heat, and anxiety. Less common causes of spontaneous recurrent vertigo and dizziness include perilymph fistula, superior canal dehiscence, autoimmune inner ear disease, otosclerosis, cardiac arrhythmia, and medication side effects. Neurologists need to venture into otolaryngology, internal medicine, and psychiatry to master the differential diagnosis of recurrent dizziness.

  10. FSHR and LHR Expression and Signaling as Well as Maturation and Apoptosis of Cumulus-Oocyte Complexes Following Treatment with FSH Receptor Binding Inhibitor in Sheep

    Directory of Open Access Journals (Sweden)

    Suocheng Wei

    2017-09-01

    Full Text Available Background/Aims: Currently, it remains unknown whether FSH receptor binding inhibitor (FRBI influences follicular development and reproduction functions in humans and animals. The present study aimed to investigate FRBI effects on in vitro maturation (IVM and apoptosis of cumulus-oocyte complexes (COCs of sheep, to determine the effect of FRBI on mRNA and protein levels of FSHR and LHR in COCs, and to elucidate the signal pathway of FRBI effects. Methods: COCs were in vitro cultured for 24h in the IVM media supplemented with varying concentrations of FRBI (0, 10, 20, 30 and 40µg/mL and FSH (10IU/mL. The harvested COCs were observed under an inverted microscope and maturation rates of COCs were determined. Real time RT-PCR and Western blotting were utilized to detect mRNA and protein levels of FSHR and LHR. The concentrations of FSH, LH and caspase-3 were determined using especial ELISA kits for sheep, respectively. Results: Maturation rates of COCs decreased gradually as FRBI concentrations increased from 0 to 40µg/mL, reaching a bottom value of 23.76% of the FRBI-4 group. The maximal apoptosis rate was detected in the FRBI-4 group. IP3 contents of FRBI-3 and FRBI-4 groups were reduced as compared to control group (CG and FSH groups (P<0.05. Levels of FSHR protein of FRBI-3 and FRBI-4 groups as well as LHR protein of FRBI-4 group were significantly less than that of CG and FSH group. FSH contents of four FRBI treatment groups were gradually decreased along with the supplementation doses of FRBI. Caspase-3 contents of FRBI groups were reduced with a maximum reduction of the FRBI-2 group. Conclusion: Our results revealed supplement of FRBI into IVM media could dose-dependently decrease the maturation rate and increase apoptosis rate of sheep COCs. A lower dose of FRBI treatment slightly promoted IP3 production, but a higher dose of FRBI reduced IP3 production. FRBI suppressed the mRNA and protein expression levels of FSHR and LHR in sheep COCs

  11. Identification of quercitrin as an inhibitor of the p90 S6 ribosomal kinase (RSK): structure of its complex with the N-terminal domain of RSK2 at 1.8 Å resolution

    Energy Technology Data Exchange (ETDEWEB)

    Derewenda, Urszula; Artamonov, Mykhaylo; Szukalska, Gabriela; Utepbergenov, Darkhan; Olekhnovich, Natalya [University of Virginia, Charlottesville, VA 22908-0736 (United States); Parikh, Hardik I.; Kellogg, Glen E. [Virginia Commonwealth University, Richmond, VA 23298-0540 (United States); Somlyo, Avril V.; Derewenda, Zygmunt S., E-mail: zsd4n@virginia.edu [University of Virginia, Charlottesville, VA 22908-0736 (United States)

    2013-02-01

    The crystal structure of quercitrin, a naturally occurring flavonol glycoside, has been determined in a complex with the N-terminal kinase domain of murine RSK2. The structure revealed that quercitrin inhibits the RSK2 kinase in the same fashion as another known inhibitor, SL0101. Members of the RSK family of kinases constitute attractive targets for drug design, but a lack of structural information regarding the mechanism of selective inhibitors impedes progress in this field. The crystal structure of the N-terminal kinase domain (residues 45–346) of mouse RSK2, or RSK2{sup NTKD}, has recently been described in complex with one of only two known selective inhibitors, a rare naturally occurring flavonol glycoside, kaempferol 3-O-(3′′,4′′-di-O-acetyl-α-l-rhamnopyranoside), known as SL0101. Based on this structure, it was hypothesized that quercitrin (quercetin 3-O-α-l-rhamnopyranoside), a related but ubiquitous and inexpensive compound, might also act as an RSK inhibitor. Here, it is demonstrated that quercitrin binds to RSK2{sup NTKD} with a dissociation constant (K{sub d}) of 5.8 µM as determined by isothermal titration calorimetry, and a crystal structure of the binary complex at 1.8 Å resolution is reported. The crystal structure reveals a very similar mode of binding to that recently reported for SL0101. Closer inspection shows a number of small but significant differences that explain the slightly higher K{sub d} for quercitrin compared with SL0101. It is also shown that quercitrin can effectively substitute for SL0101 in a biological assay, in which it significantly suppresses the contractile force in rabbit pulmonary artery smooth muscle in response to Ca{sup 2+}.

  12. Identification of quercitrin as an inhibitor of the p90 S6 ribosomal kinase (RSK): structure of its complex with the N-terminal domain of RSK2 at 1.8 Å resolution

    International Nuclear Information System (INIS)

    Derewenda, Urszula; Artamonov, Mykhaylo; Szukalska, Gabriela; Utepbergenov, Darkhan; Olekhnovich, Natalya; Parikh, Hardik I.; Kellogg, Glen E.; Somlyo, Avril V.; Derewenda, Zygmunt S.

    2013-01-01

    The crystal structure of quercitrin, a naturally occurring flavonol glycoside, has been determined in a complex with the N-terminal kinase domain of murine RSK2. The structure revealed that quercitrin inhibits the RSK2 kinase in the same fashion as another known inhibitor, SL0101. Members of the RSK family of kinases constitute attractive targets for drug design, but a lack of structural information regarding the mechanism of selective inhibitors impedes progress in this field. The crystal structure of the N-terminal kinase domain (residues 45–346) of mouse RSK2, or RSK2 NTKD , has recently been described in complex with one of only two known selective inhibitors, a rare naturally occurring flavonol glycoside, kaempferol 3-O-(3′′,4′′-di-O-acetyl-α-l-rhamnopyranoside), known as SL0101. Based on this structure, it was hypothesized that quercitrin (quercetin 3-O-α-l-rhamnopyranoside), a related but ubiquitous and inexpensive compound, might also act as an RSK inhibitor. Here, it is demonstrated that quercitrin binds to RSK2 NTKD with a dissociation constant (K d ) of 5.8 µM as determined by isothermal titration calorimetry, and a crystal structure of the binary complex at 1.8 Å resolution is reported. The crystal structure reveals a very similar mode of binding to that recently reported for SL0101. Closer inspection shows a number of small but significant differences that explain the slightly higher K d for quercitrin compared with SL0101. It is also shown that quercitrin can effectively substitute for SL0101 in a biological assay, in which it significantly suppresses the contractile force in rabbit pulmonary artery smooth muscle in response to Ca 2+

  13. The LOCAL attack: Cryptanalysis of the authenticated encryption scheme ALE

    DEFF Research Database (Denmark)

    Khovratovich, Dmitry; Rechberger, Christian

    2014-01-01

    We show how to produce a forged (ciphertext, tag) pair for the scheme ALE with data and time complexity of 2102 ALE encryptions of short messages and the same number of authentication attempts. We use a differential attack based on a local collision, which exploits the availability of extracted...

  14. On the Estimation of the k-RSA Attack

    Directory of Open Access Journals (Sweden)

    Anatoliy Sergeyevich Makeyev

    2016-03-01

    Full Text Available In this paper, we discuss the attack on the RSA cryptosystem with  modules (≥2. We also provide estimation of the attacks’s complexity. Finally, we give the experimental results for different modules and open exponents.

  15. Mitigating Higher Ed Cyber Attacks

    Science.gov (United States)

    Rogers, Gary; Ashford, Tina

    2015-01-01

    In this presentation we will discuss the many and varied cyber attacks that have recently occurred in the higher ed community. We will discuss the perpetrators, the victims, the impact and how these institutions have evolved to meet this threat. Mitigation techniques and defense strategies will be covered as will a discussion of effective security…

  16. DAG-based attack and defense modeling: don’t miss the forest for the attack trees

    NARCIS (Netherlands)

    Kordy, Barbara; Piètre-Cambacédès, Ludovic; Schweitzer, Patrick

    2015-01-01

    This paper presents the current state of the art on attack and defense modeling approaches that are based on directed acyclic graphs (DAGs). DAGs allow for a hierarchical decomposition of complex scenarios into simple, easily understandable and quantifiable actions. Methods based on threat trees and

  17. Finding Multi-step Attacks in Computer Networks using Heuristic Search and Mobile Ambients

    NARCIS (Netherlands)

    Nunes Leal Franqueira, V.

    2009-01-01

    An important aspect of IT security governance is the proactive and continuous identification of possible attacks in computer networks. This is complicated due to the complexity and size of networks, and due to the fact that usually network attacks are performed in several steps. This thesis proposes

  18. Using attack-defense trees to analyze threats and countermeasures in an ATM: A case study

    NARCIS (Netherlands)

    Fraile, Marlon; Ford, Margaret; Gadyatskaya, Olga; Kumar, Rajesh; Stoelinga, Mariëlle Ida Antoinette; Trujillo-Rasua, Rolando

    2016-01-01

    Securing automated teller machines (ATMs), as critical and complex infrastructure, requires a precise understanding of the associated threats. This paper reports on the application of attack-defense trees to model and analyze the security of ATMs.We capture the most dangerous multi-stage attack

  19. Multidimensional zero-correlation attacks on lightweight block cipher HIGHT: Improved cryptanalysis of an ISO standard

    DEFF Research Database (Denmark)

    Wen, Long; Wang, Meiqin; Bogdanov, Andrey

    2014-01-01

    results on HIGHT, its security evaluation against the recent zero-correlation linear attacks is still lacking. At the same time, the Feistel-type structure of HIGHT suggests that it might be susceptible to this type of cryptanalysis. In this paper, we aim to bridge this gap. We identify zero......-correlation linear approximations over 16 rounds of HIGHT. Based upon those, we attack 27-round HIGHT (round 4 to round 30) with improved time complexity and practical memory requirements. This attack of ours is the best result on HIGHT to date in the classical single-key setting. We also provide the first attack...

  20. A simple coherent attack and practical security of differential phase shift quantum cryptography

    International Nuclear Information System (INIS)

    Kronberg, D A

    2014-01-01

    The differential phase shift quantum key distribution protocol reveals good security against such powerful attacks as unambiguous state discrimination and beam splitting attacks. Its complete security analysis is complex due to high dimensions of the supposed spaces and density operators. In this paper, we consider a particular and conceptually simple coherent attack, available in practical implementations. The main condition for this attack is the length of used coherent state tuples of order 8–12. We show that under this condition, no high level of practical distance between legitimate users can be achieved. (paper)

  1. Cathepsin D inhibitors

    Directory of Open Access Journals (Sweden)

    M. Gacko

    2007-11-01

    Full Text Available Inhibitors of cathepsin D belong to chemical compounds that estrify carboxyl groups of the Asp33 and Asp231residues of its catalytic site, penta-peptides containing statin, i.e. the amino acid similar in structure to the tetraedric indirectproduct, and polypeptides found in the spare organs of many plants and forming permanent noncovalent complexes withcathepsin. Cathepsin D activity is also inhibited by alpha2-macroglobulin and antibodies directed against this enzyme.Methods used to determine the activity and concentration of these inhibitors and their analytical, preparative and therapeuticapplications are discussed.

  2. Peacetime Use of Computer Network Attack

    National Research Council Canada - National Science Library

    Busby, Daniel

    2000-01-01

    .... PDD-63 alerts the nation to prepare for impending cyber attacks. This paper examines the nature, scale, and likelihood of cyber attacks posited in PDD-63 and finds that the country does not face an imminent "electronic Pearl Harbor...

  3. Women's Heart Disease: Heart Attack Symptoms

    Science.gov (United States)

    ... of this page please turn JavaScript on. Feature: Women's Heart Disease Heart Attack Symptoms Past Issues / Winter ... most common heart attack symptom in men and women is chest pain or discomfort. However, women also ...

  4. Stochastic Model of TCP SYN Attacks

    Directory of Open Access Journals (Sweden)

    Simona Ramanauskaitė

    2011-08-01

    Full Text Available A great proportion of essential services are moving into internet space making the threat of DoS attacks even more actual. To estimate the real risk of some kind of denial of service (DoS attack in real world is difficult, but mathematical and software models make this task easier. In this paper we overview the ways of implementing DoS attack models and offer a stochastic model of SYN flooding attack. It allows evaluating the potential threat of SYN flooding attacks, taking into account both the legitimate system flow as well as the possible attack power. At the same time we can assess the effect of such parameters as buffer capacity, open connection storage in the buffer or filte­ring efficiency on the success of different SYN flooding attacks. This model can be used for other type of memory depletion denial of service attacks.Article in Lithuanian

  5. Robust Detection of Stepping-Stone Attacks

    National Research Council Canada - National Science Library

    He, Ting; Tong, Lang

    2006-01-01

    The detection of encrypted stepping-stone attack is considered. Besides encryption and padding, the attacker is capable of inserting chaff packets and perturbing packet timing and transmission order...

  6. Computing Preferred Extensions for Argumentation Systems with Sets of Attacking

    DEFF Research Database (Denmark)

    Nielsen, Søren Holbech; Parsons, Simon

    2006-01-01

    The hitherto most abstract, and hence general, argumentation system, is the one described by Dung in a paper from 1995. This framework does not allow for joint attacks on arguments, but in a recent paper we adapted it to support such attacks, and proved that this adapted framework enjoyed the same...... formal properties as that of Dung. One problem posed by Dung's original framework, which was neglected for some time, is how to compute preferred extensions of the argumentation systems. However, in 2001, in a paper by Doutre and Mengin, a procedure was given for enumerating preferred extensions...... for these systems. In this paper we propose a method for enumerating preferred extensions of the potentially more complex systems, where joint attacks are allowed. The method is inspired by the one given by Doutre and Mengin....

  7. A Case Of Transient Ischemic Attack Presenting As Hemichroea

    Directory of Open Access Journals (Sweden)

    Hasan Hüseyin Özdemir

    2013-12-01

    Full Text Available Chorea is defined as; involuntary movements of the distal parts of limbs which have arrhythmic, rapid, bouncing or smooth, simple or complex properties. Choreiform movements occur when putamen, globus pallidus and subthalamic nucleus are affected. Chorea can be observed during the course of metabolic and vascular diseases, neurodegenerative or hereditary diseases. Chorea may be a rare symptom of cerebral hypoperfusion. Transient ischemic attack is an event that occurs in short term characterized by a temporary ischemia of brain. A wide variety of symptoms can be seen depending on the localization of cerebral hypoperfusion. Hemichorea is a very rare finding observed during transient ischemic attacks. In this article hemichorea in a case of symptomatic transient ischemic attack is discussed with relevant literature.

  8. Effectiveness of icatibant for treatment of hereditary angioedema attacks is not affected by body weight

    DEFF Research Database (Denmark)

    Caballero, Teresa; Zanichelli, Andrea; Aberer, Werner

    2018-01-01

    Background: Icatibant is a bradykinin B2-receptor antagonist used for the treatment of hereditary angioedema attacks resulting from C1-inhibitor deficiency. Treatment is not adjusted by body weight however the impact of body mass index (BMI) on the effectiveness of icatibant is not documented in ...

  9. Attack Graph Construction for Security Events Analysis

    Directory of Open Access Journals (Sweden)

    Andrey Alexeevich Chechulin

    2014-09-01

    Full Text Available The paper is devoted to investigation of the attack graphs construction and analysis task for a network security evaluation and real-time security event processing. Main object of this research is the attack modeling process. The paper contains the description of attack graphs building, modifying and analysis technique as well as overview of implemented prototype for network security analysis based on attack graph approach.

  10. Protecting infrastructure networks from cost-based attacks

    International Nuclear Information System (INIS)

    Wang Xingang; Guan Shuguang; Lai, Choy Heng

    2009-01-01

    It is well known that heterogeneous networks are vulnerable to the intentional removal of a small fraction of highly connected or loaded nodes, implying that to protect the network effectively, the important nodes should be allocated more defense resource than the others. However, if too much resource is allocated to the few important nodes, the numerous less-important nodes will be less protected, which if attacked together can still lead to devastating damage. A natural question is therefore how to efficiently distribute the limited defense resource among the network nodes such that the network damage is minimized against any attack strategy. In this paper, taking into account the factor of attack cost, the problem of network security is reconsidered in terms of efficient network defense against cost-based attacks. The results show that, for a general complex network, there exists an optimal distribution of the defense resource with which the network is best protected from cost-based attacks. Furthermore, it is found that the configuration of the optimal defense is dependent on the network parameters. Specifically, networks of larger size, sparser connection and more heterogeneous structure will more likely benefit from the defense optimization.

  11. Attacks and countermeasures on AES and ECC

    DEFF Research Database (Denmark)

    Tange, Henrik; Andersen, Birger

    2013-01-01

    AES (Advanced Encryption Standard) is widely used in LTE and Wi-Fi communication systems. AES has recently been exposed to new attacks which have questioned the overall security of AES. The newest attack is a so called biclique attack, which is using the fact that the content of the state array...

  12. Automated classification of computer network attacks

    CSIR Research Space (South Africa)

    Van Heerden, R

    2013-11-01

    Full Text Available according to the relevant types of attack scenarios depicted in the ontology. The two network attack instances are the Distributed Denial of Service attack on SpamHaus in 2013 and the theft of 42 million Rand ($6.7 million) from South African Postbank...

  13. Cyberprints: Identifying Cyber Attackers by Feature Analysis

    Science.gov (United States)

    Blakely, Benjamin A.

    2012-01-01

    The problem of attributing cyber attacks is one of increasing importance. Without a solid method of demonstrating the origin of a cyber attack, any attempts to deter would-be cyber attackers are wasted. Existing methods of attribution make unfounded assumptions about the environment in which they will operate: omniscience (the ability to gather,…

  14. Carbonic anhydrase inhibitors. A general approach for the preparation of water-soluble sulfonamides incorporating polyamino-polycarboxylate tails and of their metal complexes possessing long-lasting, topical intraocular pressure-lowering properties.

    Science.gov (United States)

    Scozzafava, Andrea; Menabuoni, Luca; Mincione, Francesco; Supuran, Claudiu T

    2002-03-28

    Reaction of polyamino-polycarboxylic acids or their dianhydrides with aromatic/heterocyclic sulfonamides possessing a free amino/imino/hydrazino/hydroxy group afforded mono- and bis-sulfonamides containing polyamino-polycarboxylic acid moieties in their molecule. The acids/anhydrides used in synthesis included IDA, NTA, EDDA, EDTA and EDTA dianhydride, DTPA and DTPA dianhydride, EGTA and EGTA dianhydride, and EDDHA, among others. All the newly prepared derivatives showed strong affinity toward isozymes I, II, and IV of carbonic anhydrase (CA). Metal complexes of the new compounds have also been prepared. Metal ions used in such preparations included di- and trivalent main-group and transition cations, such as Zn(II), Cu(II), Al(III), etc. Some of the new sulfonamides/disulfonamides obtained in this way, as well as their metal complexes, behaved as nanomolar CA inhibitors against isozymes II and IV, being slightly less effective in inhibiting isozyme I. Some of these sulfonamides as well as their metal complexes strongly lowered intraocular pressure (IOP) when applied topically, directly into the normotensive/glaucomatous rabbit eye, as 1-2% water solutions/suspensions. The good water solubility of these sulfonamide CA inhibitors, correlated with the neutral pH of their water solutions used in the ophthalmologic applications and the long duration of action of the IOP-lowering effect, makes them interesting candidates for developing novel types of antiglaucoma drugs devoid of serious topical side effects.

  15. Chiral gold(I vs chiral silver complexes as catalysts for the enantioselective synthesis of the second generation GSK-hepatitis C virus inhibitor

    Directory of Open Access Journals (Sweden)

    María Martín-Rodríguez

    2011-07-01

    Full Text Available The synthesis of a GSK 2nd generation inhibitor of the hepatitis C virus, by enantioselective 1,3-dipolar cycloaddition between a leucine derived iminoester and tert-butyl acrylate, was studied. The comparison between silver(I and gold(I catalysts in this reaction was established by working with chiral phosphoramidites or with chiral BINAP. The best reaction conditions were used for the total synthesis of the hepatitis C virus inhibitor by a four step procedure affording this product in 99% ee and in 63% overall yield. The origin of the enantioselectivity of the chiral gold(I catalyst was justified according to DFT calculations, the stabilizing coulombic interaction between the nitrogen atom of the thiazole moiety and one of the gold atoms being crucial.

  16. Rational optimization of drug-target residence time: Insights from inhibitor binding to the S. aureus FabI enzyme-product complex

    Science.gov (United States)

    Chang, Andrew; Schiebel, Johannes; Yu, Weixuan; Bommineni, Gopal R.; Pan, Pan; Baxter, Michael V.; Khanna, Avinash; Sotriffer, Christoph A.; Kisker, Caroline; Tonge, Peter J.

    2013-01-01

    Drug-target kinetics has recently emerged as an especially important facet of the drug discovery process. In particular, prolonged drug-target residence times may confer enhanced efficacy and selectivity in the open in vivo system. However, the lack of accurate kinetic and structural data for series of congeneric compounds hinders the rational design of inhibitors with decreased off-rates. Therefore, we chose the Staphylococcus aureus enoyl-ACP reductase (saFabI) - an important target for the development of new anti-staphylococcal drugs - as a model system to rationalize and optimize the drug-target residence time on a structural basis. Using our new, efficient and widely applicable mechanistically informed kinetic approach, we obtained a full characterization of saFabI inhibition by a series of 20 diphenyl ethers complemented by a collection of 9 saFabI-inhibitor crystal structures. We identified a strong correlation between the affinities of the investigated saFabI diphenyl ether inhibitors and their corresponding residence times, which can be rationalized on a structural basis. Due to its favorable interactions with the enzyme, the residence time of our most potent compound exceeds 10 hours. In addition, we found that affinity and residence time in this system can be significantly enhanced by modifications predictable by a careful consideration of catalysis. Our study provides a blueprint for investigating and prolonging drug-target kinetics and may aid in the rational design of long-residence-time inhibitors targeting the essential saFabI enzyme. PMID:23697754

  17. Molecular dynamics-assisted pharmacophore modeling of caspase-3-isatin sulfonamide complex: Recognizing essential intermolecular contacts and features of sulfonamide inhibitor class for caspase-3 binding.

    Science.gov (United States)

    Kumar, Sivakumar Prasanth; Patel, Chirag N; Jha, Prakash C; Pandya, Himanshu A

    2017-12-01

    The identification of isatin sulfonamide as a potent small molecule inhibitor of caspase-3 had fuelled the synthesis and characterization of the numerous sulfonamide class of inhibitors to optimize for potency. Recent works that relied on the ligand-based approaches have successfully shown the regions of optimizations for sulfonamide scaffold. We present here molecular dynamics-based pharmacophore modeling of caspase-3-isatin sulfonamide crystal structure, to elucidate the essential non-covalent contacts and its associated pharmacophore features necessary to ensure caspase-3 optimal binding. We performed 20ns long dynamics of this crystal structure to extract global conformation states and converted into structure-based pharmacophore hypotheses which were rigorously validated using an exclusive focussed library of experimental actives and inactives of sulfonamide class by Receiver Operating Characteristic (ROC) statistic. Eighteen structure-based pharmacophore hypotheses with better sensitivity and specificity measures (>0.6) were chosen which collectively showed the role of pocket residues viz. Cys163 (S 1 sub-site; required for covalent and H bonding with Michael acceptor of inhibitors), His121 (S 1 ; π stack with bicyclic isatin moiety), Gly122 (S 1 ; H bond with carbonyl oxygen) and Tyr204 (S 2 ; π stack with phenyl group of the isatin sulfonamide molecule) as stringent binding entities for enabling caspase-3 optimal binding. The introduction of spatial pharmacophore site points obtained from dynamics-based pharmacophore models in a virtual screening strategy will be helpful to screen and optimize molecules belonging to sulfonamide class of caspase-3 inhibitors. Copyright © 2017 Elsevier Ltd. All rights reserved.

  18. 4-arylazo-3,5-diamino-1H-pyrazole CDK inhibitors: SAR study, crystal structure in complex with CDK2, selectivity, and cellular effects

    Czech Academy of Sciences Publication Activity Database

    Kryštof, Vladimír; Cankař, Petr; Fryšová, I.; Slouka, J.; Kontopidis, G.; Džubák, P.; Hajdúch, M.; Srovnal, J.; de Azevedo Jr., W.F.; Orság, Martin; Paprskářová, Martina; Rolčík, Jakub; Látr, Aleš; Fischer, P.M.; Strnad, Miroslav

    2006-01-01

    Roč. 49, č. 22 (2006), s. 6500-6509 ISSN 0022-2623 R&D Projects: GA ČR GA301/05/0418 Institutional research plan: CEZ:AV0Z50380511 Source of funding: V - iné verejné zdroje Keywords : DEPENDENT KINASE INHIBITORS * POLYMERASE-II TRANSCRIPTION * TUMOR-NECROSIS-FACTOR Subject RIV: CE - Biochemistry Impact factor: 5.115, year: 2006

  19. Calculating Adversarial Risk from Attack Trees: Control Strength and Probabilistic Attackers

    NARCIS (Netherlands)

    Pieters, Wolter; Davarynejad, Mohsen

    2015-01-01

    Attack trees are a well-known formalism for quantitative analysis of cyber attacks consisting of multiple steps and alternative paths. It is possible to derive properties of the overall attacks from properties of individual steps, such as cost for the attacker and probability of success. However, in

  20. Whispering through DDoS attack

    OpenAIRE

    Miralem Mehic; Jiri Slachta; Miroslav Voznak

    2016-01-01

    Denial of service (DoS) attack is an attempt of the attacker to disable victim's machine by depleting network or computing resources. If this attack is performed with more than one machine, it is called distributed denial of service (DDoS) attack. Covert channels are those channels which are used for information transmission even though they are neither designed nor intended to transfer information at all. In this article, we investigated the possibility of using of DDoS attack for purposes o...

  1. Script-viruses Attacks on UNIX OS

    Directory of Open Access Journals (Sweden)

    D. M. Mikhaylov

    2010-06-01

    Full Text Available In this article attacks on UNIX OS are considered. Currently antivirus developers are concentrated on protecting systems from viruses that are most common and attack popular operating systems. If the system or its components are not often attacked then the antivirus products are not protecting these components as it is not profitable. The same situation is with script-viruses for UNIX OS as most experts consider that it is impossible for such viruses to get enough rights to attack. Nevertheless the main conclusion of this article is the fact that such viruses can be very powerful and can attack systems and get enough rights.

  2. Protecting Cryptographic Memory against Tampering Attack

    DEFF Research Database (Denmark)

    Mukherjee, Pratyay

    In this dissertation we investigate the question of protecting cryptographic devices from tampering attacks. Traditional theoretical analysis of cryptographic devices is based on black-box models which do not take into account the attacks on the implementations, known as physical attacks. In prac......In this dissertation we investigate the question of protecting cryptographic devices from tampering attacks. Traditional theoretical analysis of cryptographic devices is based on black-box models which do not take into account the attacks on the implementations, known as physical attacks....... In practice such attacks can be executed easily, e.g. by heating the device, as substantiated by numerous works in the past decade. Tampering attacks are a class of such physical attacks where the attacker can change the memory/computation, gains additional (non-black-box) knowledge by interacting...... with the faulty device and then tries to break the security. Prior works show that generically approaching such problem is notoriously difficult. So, in this dissertation we attempt to solve an easier question, known as memory-tampering, where the attacker is allowed tamper only with the memory of the device...

  3. Attack Tree Generation by Policy Invalidation

    DEFF Research Database (Denmark)

    Ivanova, Marieta Georgieva; Probst, Christian W.; Hansen, Rene Rydhof

    2015-01-01

    through brainstorming of experts. In this work we formalize attack tree generation including human factors; based on recent advances in system models we develop a technique to identify possible attacks analytically, including technical and human factors. Our systematic attack generation is based......Attacks on systems and organisations increasingly exploit human actors, for example through social engineering, complicating their formal treatment and automatic identification. Formalisation of human behaviour is difficult at best, and attacks on socio-technical systems are still mostly identified...... on invalidating policies in the system model by identifying possible sequences of actions that lead to an attack. The generated attacks are precise enough to illustrate the threat, and they are general enough to hide the details of individual steps....

  4. Whispering through DDoS attack

    Directory of Open Access Journals (Sweden)

    Miralem Mehic

    2016-03-01

    Full Text Available Denial of service (DoS attack is an attempt of the attacker to disable victim's machine by depleting network or computing resources. If this attack is performed with more than one machine, it is called distributed denial of service (DDoS attack. Covert channels are those channels which are used for information transmission even though they are neither designed nor intended to transfer information at all. In this article, we investigated the possibility of using of DDoS attack for purposes of hiding data or concealing the existing covert channel. In addition, in this paper we analyzed the possibility of detection of such covert communication with the well-known statistical method. Also, we proposed the coordination mechanisms of the attack which may be used. A lot of research has been done in order to describe and prevent DDoS attacks, yet research on steganography on this field is still scarce.

  5. Network Protection Against DDoS Attacks

    Directory of Open Access Journals (Sweden)

    Petr Dzurenda

    2015-03-01

    Full Text Available The paper deals with possibilities of the network protection against Distributed Denial of Service attacks (DDoS. The basic types of DDoS attacks and their impact on the protected network are presented here. Furthermore, we present basic detection and defense techniques thanks to which it is possible to increase resistance of the protected network or device against DDoS attacks. Moreover, we tested the ability of current commercial Intrusion Prevention Systems (IPS, especially Radware DefensePro 6.10.00 product against the most common types of DDoS attacks. We create five scenarios that are varied in type and strength of the DDoS attacks. The attacks intensity was much greater than the normal intensity of the current DDoS attacks.

  6. NETWORK SECURITY ATTACKS. ARP POISONING CASE STUDY

    Directory of Open Access Journals (Sweden)

    Luminiţa DEFTA

    2010-12-01

    Full Text Available Arp poisoning is one of the most common attacks in a switched network. A switch is a network device that limits the ability of attackers that use a packet sniffer to gain access to information from internal network traffic. However, using ARP poisoning the traffic between two computers can be intercepted even in a network that uses switches. This method is known as man in the middle attack. With this type of attack the affected stations from a network will have invalid entries in the ARP table. Thus, it will contain only the correspondence between the IP addresses of the stations from the same network and a single MAC address (the station that initiated the attack. In this paper we present step by step the initiation of such an attack in a network with three computers. We will intercept the traffic between two stations using the third one (the attacker.

  7. Cache timing attacks on recent microarchitectures

    DEFF Research Database (Denmark)

    Andreou, Alexandres; Bogdanov, Andrey; Tischhauser, Elmar Wolfgang

    2017-01-01

    Cache timing attacks have been known for a long time, however since the rise of cloud computing and shared hardware resources, such attacks found new potentially devastating applications. One prominent example is S$A (presented by Irazoqui et al at S&P 2015) which is a cache timing attack against...... AES or similar algorithms in virtualized environments. This paper applies variants of this cache timing attack to Intel's latest generation of microprocessors. It enables a spy-process to recover cryptographic keys, interacting with the victim processes only over TCP. The threat model is a logically...... separated but CPU co-located attacker with root privileges. We report successful and practically verified applications of this attack against a wide range of microarchitectures, from a two-core Nehalem processor (i5-650) to two-core Haswell (i7-4600M) and four-core Skylake processors (i7-6700). The attack...

  8. Corrosion inhibitor development for slightly sour environments with oxygen intrusion

    Energy Technology Data Exchange (ETDEWEB)

    Wylde, J.; Wang, H.; Li, J. [Clariant Oil Services North America, Calgary, AB (Canada)

    2009-07-01

    This presentation reported on a study that examined the effect of oxygen on the inhibition of carbon steel in slightly sour corrosion, and the initiation and propagation of localized attack. Oxygen can enter sour water injection systems through the vapor space in storage tanks and process system. Oxygen aggravates the corrosion attack by participating in the cathodic reaction under full or partial diffusion control. Laboratory testing results were reported in this presentation along with the development of corrosion inhibitors for such a slightly sour system. Bubble testing cells were used with continuous H{sub 2}/CO{sub 2} mixture gas sparging and occasional oxygen intrusion of 2 to 4 hours during a week long test. Linear polarization resistance (LPR) measurements and weight loss corrosion coupons were used to quantify the corrosion attack. The findings were presented in terms of the magnitude of localized attacks at different oxygen concentrations and intrusion periods, with and without the presence of corrosion inhibitors. tabs., figs.

  9. Epileptic negative drop attacks in atypical benign partial epilepsy: a neurophysiological study.

    Science.gov (United States)

    Hirano, Yoshiko; Oguni, Hirokazu; Osawa, Makiko

    2009-03-01

    We conducted a computer-assisted polygraphic analysis of drop attacks in a child with atypical benign partial epilepsy (ABPE) to investigate neurophysiological characteristics. The patient was a six-year two-month-old girl, who had started to have focal motor seizures, later combined with daily epileptic negative myoclonus (ENM) and drop attacks, causing multiple injuries. We studied episodes of ENM and drop attacks using video-polygraphic and computer-assisted back-averaging analysis. A total of 12 ENM episodes, seven involving the left arm (ENMlt) and five involving both arms (ENMbil), and five drop attacks were captured for analysis. All episodes were time-locked to spike-and-wave complexes (SWC) arising from both centro-temporo-parietal (CTP) areas. The latency between the onset of SWC and ENMlt, ENMbil, and drop attacks reached 68 ms, 42 ms, and 8 ms, respectively. The height of the spike as well as the slow-wave component of SWC for drop attacks were significantly larger than that for both ENMlt and ENMbil (p negative myoclonus involving not only upper proximal but also axial muscles, causing the body to fall. Thus, drop attacks in ABPE are considered to be epileptic negative drop attacks arising from bilateral CTP foci and differ from drop attacks of a generalized origin seen in Lennox-Gastaut syndrome and myoclonic-astatic epilepsy.

  10. [Comparative analysis of phenomenology of paroxysms of atrial fibrillation and panic attacks].

    Science.gov (United States)

    San'kova, T A; Solov'eva, A D; Nedostup, A V

    2004-01-01

    To study phenomenology of attacks of atrial fibrillation (AF) and to compare it with phenomenology of panic attacks for elucidation of pathogenesis of atrial fibrillation and for elaboration of rational therapeutic intervention including those aimed at correction of psychovegetative abnormalities. Patients with nonrheumatic paroxysmal AF (n=105) and 100 patients with panic attacks (n=100). Clinical, cardiological and neurological examination, analysis of patients complaints during attacks of AF, and comparison them with diagnostic criteria for panic attack. It was found that clinical picture of attacks of AF comprised vegetative, emotional and functional neurological phenomena similar to those characteristic for panic attacks. This similarity as well as positive therapeutic effect of clonazepam allowed to propose a novel pathogenic mechanism of AF attacks. Severity of psychovegetative disorders during paroxysm of AF could be evaluated by calculation of psychovegetative iudex: Psychovegetative index should be used for detection of panic attack-like component in clinical picture of AF paroxysm and thus for determination of indications for inclusion of vegetotropic drugs, e. g. clonazepam, in complex preventive therapy.

  11. SQL Injection Attacks and Defense

    CERN Document Server

    Clarke, Justin

    2012-01-01

    SQL Injection Attacks and Defense, First Edition: Winner of the Best Book Bejtlich Read Award "SQL injection is probably the number one problem for any server-side application, and this book unequaled in its coverage." -Richard Bejtlich, Tao Security blog SQL injection represents one of the most dangerous and well-known, yet misunderstood, security vulnerabilities on the Internet, largely because there is no central repository of information available for penetration testers, IT security consultants and practitioners, and web/software developers to turn to for help. SQL Injection Att

  12. Attack-Resistant Trust Metrics

    Science.gov (United States)

    Levien, Raph

    The Internet is an amazingly powerful tool for connecting people together, unmatched in human history. Yet, with that power comes great potential for spam and abuse. Trust metrics are an attempt to compute the set of which people are trustworthy and which are likely attackers. This chapter presents two specific trust metrics developed and deployed on the Advogato Website, which is a community blog for free software developers. This real-world experience demonstrates that the trust metrics fulfilled their goals, but that for good results, it is important to match the assumptions of the abstract trust metric computation to the real-world implementation.

  13. Trp[superscript 2313]-His[superscript 2315] of Factor VIII C2 Domain Is Involved in Membrane Binding Structure of a Complex Between the C[subscript 2] Domain and an Inhibitor of Membrane Binding

    Energy Technology Data Exchange (ETDEWEB)

    Liu, Zhuo; Lin, Lin; Yuan, Cai; Nicolaes, Gerry A.F.; Chen, Liqing; Meehan, Edward J.; Furie, Bruce; Furie, Barbara; Huang, Mingdong (Harvard-Med); (UAH); (Maastricht); (Chinese Aca. Sci.)

    2010-11-03

    Factor VIII (FVIII) plays a critical role in blood coagulation by forming the tenase complex with factor IXa and calcium ions on a membrane surface containing negatively charged phospholipids. The tenase complex activates factor X during blood coagulation. The carboxyl-terminal C2 domain of FVIII is the main membrane-binding and von Willebrand factor-binding region of the protein. Mutations of FVIII cause hemophilia A, whereas elevation of FVIII activity is a risk factor for thromboembolic diseases. The C2 domain-membrane interaction has been proposed as a target of intervention for regulation of blood coagulation. A number of molecules that interrupt FVIII or factor V (FV) binding to cell membranes have been identified through high throughput screening or structure-based design. We report crystal structures of the FVIII C2 domain under three new crystallization conditions, and a high resolution (1.15 {angstrom}) crystal structure of the FVIII C2 domain bound to a small molecular inhibitor. The latter structure shows that the inhibitor binds to the surface of an exposed {beta}-strand of the C2 domain, Trp{sup 2313}-His{sup 2315}. This result indicates that the Trp{sup 2313}-His{sup 2315} segment is an important constituent of the membrane-binding motif and provides a model to understand the molecular mechanism of the C2 domain membrane interaction.

  14. Preparation data of the bromodomains BRD3(1, BRD3(2, BRD4(1, and BRPF1B and crystallization of BRD4(1-inhibitor complexes

    Directory of Open Access Journals (Sweden)

    Martin Hügle

    2016-06-01

    Full Text Available This article presents detailed purification procedures for the bromodomains BRD3(1, BRD3(2, BRD4(1, and BRPF1B. In addition we provide crystallization protocols for apo BRD4(1 and BRD4(1 in complex with numerous inhibitors. The protocols described here were successfully applied to obtain affinity data by isothermal titration calorimetry (ITC and by differential scanning fluorimetry (DSF as well as structural characterizations of BRD4(1 inhibitor complexes (PDB codes: PDB: 4LYI, PDB: 4LZS, PDB: 4LYW, PDB: 4LZR, PDB: 4LYS, PDB: 5D24, PDB: 5D25, PDB: 5D26, PDB: 5D3H, PDB: 5D3J, PDB: 5D3L, PDB: 5D3N, PDB: 5D3P, PDB: 5D3R, PDB: 5D3S, PDB: 5D3T. These data have been reported previously and are discussed in more detail elsewhere [1,2].

  15. Migraine attacks the Basal Ganglia

    Directory of Open Access Journals (Sweden)

    Bigal Marcelo

    2011-09-01

    Full Text Available Abstract Background With time, episodes of migraine headache afflict patients with increased frequency, longer duration and more intense pain. While episodic migraine may be defined as 1-14 attacks per month, there are no clear-cut phases defined, and those patients with low frequency may progress to high frequency episodic migraine and the latter may progress into chronic daily headache (> 15 attacks per month. The pathophysiology of this progression is completely unknown. Attempting to unravel this phenomenon, we used high field (human brain imaging to compare functional responses, functional connectivity and brain morphology in patients whose migraine episodes did not progress (LF to a matched (gender, age, age of onset and type of medication group of patients whose migraine episodes progressed (HF. Results In comparison to LF patients, responses to pain in HF patients were significantly lower in the caudate, putamen and pallidum. Paradoxically, associated with these lower responses in HF patients, gray matter volume of the right and left caudate nuclei were significantly larger than in the LF patients. Functional connectivity analysis revealed additional differences between the two groups in regard to response to pain. Conclusions Supported by current understanding of basal ganglia role in pain processing, the findings suggest a significant role of the basal ganglia in the pathophysiology of the episodic migraine.

  16. Anger attacks in obsessive compulsive disorder

    Directory of Open Access Journals (Sweden)

    Nitesh Prakash Painuly

    2011-01-01

    Full Text Available Background: Research on anger attacks has been mostly limited to depression, and only a few studies have focused on anger attacks in obsessive compulsive disorder. Materials and Methods: In a cross-sectional study all new obsessive compulsive disorder patients aged 20-60 years attending an outpatient clinic were assessed using the anger attack questionnaire, irritability, depression and anxiety scale (for the direction of the aggressive behavior and quality of life (QOL. Results: The sample consisted of 42 consecutive subjects with obsessive compulsive disorder, out of which 21 (50% had anger attacks. The obsessive compulsive disorder subjects with and without anger attacks did not show significant differences in terms of sociodemographic variables, duration of illness, treatment, and family history. However, subjects with anger attacks had significantly higher prevalence of panic attacks and comorbid depression. Significantly more subjects with anger attacks exhibited aggressive acts toward spouse, parents, children, and other relatives in the form of yelling and threatening to hurt, trying to hurt, and threatening to leave. However, the two groups did not differ significantly in terms of QOL, except for the psychological domain being worse in the subjects with anger attacks. Conclusion: Anger attacks are present in half of the patients with obsessive compulsive disorder, and they correlate with the presence of comorbid depression.

  17. Carbohydrate linked organotin(IV) complexes as human topoisomerase Iα inhibitor and their antiproliferative effects against the human carcinoma cell line.

    Science.gov (United States)

    Khan, Rais Ahmad; Yadav, Shipra; Hussain, Zahid; Arjmand, Farukh; Tabassum, Sartaj

    2014-02-14

    Dimethyltin(IV) complexes with ethanolamine (1) and biologically significant N-glycosides (2 and 3) were designed and synthesized. The structural elucidation of complexes 1-3 was done using elemental and spectroscopic methods; in addition, complex 1 was studied by single crystal X-ray diffraction studies. The in vitro DNA binding profile of complexes 2 and 3 was carried out by employing different biophysical methods to ascertain the feasibility of glycosylated complexes. Further, the cleaving ability of 2 and 3 was investigated by the agarose gel electrophoretic mobility assay with supercoiled pBR322 DNA, and demonstrated significantly good nuclease activity. Furthermore, both the complexes exhibited significant inhibitory effects on the catalytic activity of human Topo I at lower concentration than standard drugs. Computer-aided molecular docking techniques were used to ascertain the mode and mechanism of action towards the molecular target DNA and Topo I. The cytotoxicity of 2 and 3 against human hepatoma cancer cells (Huh7) was evaluated, which revealed significant regression in cancerous cells as compared with the standard drug. The antiproliferative activities of 2 and 3 were tested against human hepatoma cancer cells (Huh7), and results showed significantly good activity. Additionally, to validate the remarkable antiproliferative activity of complexes 2 and 3, specific regulatory gene expression (MMP-2 and TGF-β) was obtained by real time PCR.

  18. Higher Order Differential Attack on 6-Round MISTY1

    Science.gov (United States)

    Tsunoo, Yukiyasu; Saito, Teruo; Nakashima, Hiroki; Shigeri, Maki

    MISTY1 is a 64-bit block cipher that has provable security against differential and linear cryptanalysis. MISTY1 is one of the algorithms selected in the European NESSIE project, and it has been recommended for Japanese e-Government ciphers by the CRYPTREC project. This paper reports a previously unknown higher order differential characteristic of 4-round MISTY1 with the FL functions. It also shows that a higher order differential attack that utilizes this newly discovered characteristic is successful against 6-round MISTY1 with the FL functions. This attack can recover a partial subkey with a data complexity of 253.7 and a computational complexity of 264.4, which is better than any previous cryptanalysis of MISTY1.

  19. Effect of clustering on attack vulnerability of interdependent scale-free networks

    International Nuclear Information System (INIS)

    Li, Rui-qi; Sun, Shi-wen; Ma, Yi-lin; Wang, Li; Xia, Cheng-yi

    2015-01-01

    In order to deeply understand the complex interdependent systems, it is of great concern to take clustering coefficient, which is an important feature of many real-world systems, into account. Previous study mainly focused on the impact of clustering on interdependent networks under random attacks, while we extend the study to the case of the more realistic attacking strategy, targeted attack. A system composed of two interdependent scale-free networks with tunable clustering is provided. The effects of coupling strength and coupling preference on attack vulnerability are explored. Numerical simulation results demonstrate that interdependent links between two networks make the entire system much more fragile to attacks. Also, it is found that clustering significantly increases the vulnerability of interdependent scale-free networks. Moreover, for fully coupled network, disassortative coupling is found to be most vulnerable to random attacks, while the random and assortative coupling have little difference. Additionally, enhancing coupling strength can greatly enhance the fragility of interdependent networks against targeted attacks. These results can not only improve the deep understanding of structural complexity of complex systems, but also provide insights into the guidance of designing resilient infrastructures.

  20. Simulating SQL-Injection Cyber-attacks using GNS3

    OpenAIRE

    Al-Mahrouqi, Aadil; Tobin, Patrick; Abdalla, Sameh; Kechadi, Tahar

    2015-01-01

    Network Forensics is a subtopic of Digital Forensics wherein research on artificat investigations and intrusions evidence acquisition is addressed. Among many challenges in the field, the problem of losing data artifacts in the state of flux, (i.e., live volatile data), when network devices are suddenly non-operational remains a topic of interest to many investigators. The main objective of this article is to simulate an SQL injection attack scenarios in a complex network environment. We desi...

  1. Cyber attacks against state estimation in power systems: Vulnerability analysis and protection strategies

    Science.gov (United States)

    Liu, Xuan

    Power grid is one of the most critical infrastructures in a nation and could suffer a variety of cyber attacks. With the development of Smart Grid, false data injection attack has recently attracted wide research interest. This thesis proposes a false data attack model with incomplete network information and develops optimal attack strategies for attacking load measurements and the real-time topology of a power grid. The impacts of false data on the economic and reliable operations of power systems are quantitatively analyzed in this thesis. To mitigate the risk of cyber attacks, a distributed protection strategies are also developed. It has been shown that an attacker can design false data to avoid being detected by the control center if the network information of a power grid is known to the attacker. In practice, however, it is very hard or even impossible for an attacker to obtain all network information of a power grid. In this thesis, we propose a local load redistribution attacking model based on incomplete network information and show that an attacker only needs to obtain the network information of the local attacking region to inject false data into smart meters in the local region without being detected by the state estimator. A heuristic algorithm is developed to determine a feasible attacking region by obtaining reduced network information. This thesis investigates the impacts of false data on the operations of power systems. It has been shown that false data can be designed by an attacker to: 1) mask the real-time topology of a power grid; 2) overload a transmission line; 3) disturb the line outage detection based on PMU data. To mitigate the risk of cyber attacks, this thesis proposes a new protection strategy, which intends to mitigate the damage effects of false data injection attacks by protecting a small set of critical measurements. To further reduce the computation complexity, a mixed integer linear programming approach is also proposed to

  2. Structure-guided approach identifies a novel class of HIV-1 ribonuclease H inhibitors: binding mode insights through magnesium complexation and site-directed mutagenesis studies

    DEFF Research Database (Denmark)

    Poongavanam, Vasanthanathan; Corona, Angela; Steinmann, Casper

    2018-01-01

    is a long and expensive process that can be speeded up by in silico methods. In the present study, a structure-guided screening is coupled with a similarity-based search on the Specs database to identify a new class of HIV-1 RNase H inhibitors. Out of the 45 compounds selected for experimental testing, 15...... inhibited the RNase H function below 100 μM with three hits exhibiting IC50 values active compound, AA, inhibits HIV-1 RNase H with an IC50 of 5.1 μM and exhibits a Mg-independent mode of inhibition. Site-directed mutagenesis studies provide valuable insight into the binding mode of newly...

  3. DDOS ATTACK DETECTION SIMULATION AND HANDLING MECHANISM

    Directory of Open Access Journals (Sweden)

    Ahmad Sanmorino

    2013-11-01

    Full Text Available In this study we discuss how to handle DDoS attack that coming from the attacker by using detection method and handling mechanism. Detection perform by comparing number of packets and number of flow. Whereas handling mechanism perform by limiting or drop the packets that detected as a DDoS attack. The study begins with simulation on real network, which aims to get the real traffic data. Then, dump traffic data obtained from the simulation used for detection method on our prototype system called DASHM (DDoS Attack Simulation and Handling Mechanism. From the result of experiment that has been conducted, the proposed method successfully detect DDoS attack and handle the incoming packet sent by attacker.

  4. Model checking exact cost for attack scenarios

    DEFF Research Database (Denmark)

    Aslanyan, Zaruhi; Nielson, Flemming

    2017-01-01

    Attack trees constitute a powerful tool for modelling security threats. Many security analyses of attack trees can be seamlessly expressed as model checking of Markov Decision Processes obtained from the attack trees, thus reaping the benefits of a coherent framework and a mature tool support....... However, current model checking does not encompass the exact cost analysis of an attack, which is standard for attack trees. Our first contribution is the logic erPCTL with cost-related operators. The extended logic allows to analyse the probability of an event satisfying given cost bounds and to compute...... the exact cost of an event. Our second contribution is the model checking algorithm for erPCTL. Finally, we apply our framework to the analysis of attack trees....

  5. Securing internet by eliminating DDOS attacks

    Science.gov (United States)

    Niranchana, R.; Gayathri Devi, N.; Santhi, H.; Gayathri, P.

    2017-11-01

    The major threat caused to the authorised usage of Internet is Distributed Denial of Service attack. The mechanisms used to prevent the DDoS attacks are said to overcome the attack’s ability in spoofing the IP packets source addresses. By utilising Internet Protocol spoofing, the attackers cause a consequential load over the networks destination for policing attack packets. To overcome the IP Spoofing level on the Internet, We propose an Inter domain Packet Filter (IPF) architecture. The proposed scheme is not based on global routing information. The packets with reliable source addresses are not rejected, the IPF frame work works in such a manner. The spoofing capability of attackers is confined by IPF, and also the filter identifies the source of an attack packet by minimal number of candidate network.

  6. [Syk inhibitors].

    Science.gov (United States)

    Kimura, Yukihiro; Chihara, Kazuyasu; Takeuchi, Kenji; Sada, Kiyonao

    2013-07-01

    Non-receptor type of protein-tyrosine kinase Syk (spleen tyrosine kinase) was isolated in the University of Fukui in 1991. Syk is known to be essential for the various physiological functions, especially in hematopoietic lineage cells. Moreover, ectopic expression of Syk by epigenetic changes is reported to cause retinoblastoma. Recently, novel Syk inhibitors were developed and its usefulness has been evaluated in the treatment of allergic rhinitis, rheumatoid arthritis, and idiopathic thrombocytopenic purpura. In this review, we will summarize the history, structure, and function of Syk, and then describe the novel Syk inhibitors and their current status. Furthermore, we will introduce our findings of the adaptor protein 3BP2 (c-Abl SH3 domain-binding protein-2), as a novel target of Syk.

  7. Shooting Alone: The Pre-Attack Experiences and Behaviors of U.S. Solo Mass Murderers.

    Science.gov (United States)

    Gill, Paul; Silver, James; Horgan, John; Corner, Emily

    2017-05-01

    This paper outlines the sociodemographic, developmental, antecedent attack, attack preparation, and commission properties of 115 mass murderers between 1990 and 2014. The results indicate that mass murderer attacks are usually the culmination of a complex mix of personal, political, and social drivers that crystalize at the same time to drive the individual down the path of violent action. We specifically focus upon areas related to prior criminal engagement, leakage, and attack location familiarity. Whether the violence comes to fruition is usually a combination of the availability and vulnerability of suitable targets that suit the heady mix of personal and political grievances and the individual's capability to engage in an attack from both a psychological and technical capability standpoint. Many individual cases share a mixture of unfortunate personal life circumstances coupled with an intensification of beliefs/grievances that later developed into the idea to engage in violence. © 2016 American Academy of Forensic Sciences.

  8. Syk inhibitors.

    Science.gov (United States)

    Chihara, Kazuyasu; Kimura, Yukihiro; Honjo, Chisato; Takeuchi, Kenji; Sada, Kiyonao

    2013-01-01

    Non-receptor type of protein-tyrosine kinase Syk (spleen tyrosine kinase) was isolated in University of Fukui in 1991. Syk is most highly expressed by haemopoietic cells and known to play crucial roles in the signal transduction through various immunoreceptors of the adaptive immune response. However, recent reports demonstrate that Syk also mediates other biological functions, such as innate immune response, osteoclast maturation, platelet activation and cellular adhesion. Moreover, ectopic expression of Syk by epigenetic changes is reported to cause retinoblastoma. Because of its critical roles on the cellular functions, the development of Syk inhibitors for clinical use has been desired. Although many candidate compounds were produced, none of them had progressed to clinical trials. However, novel Syk inhibitors were finally developed and its usefulness has been evaluated in the treatment of allergic rhinitis, rheumatoid arthritis and idiopathic thrombocytopenic purpura. In this review, we will summarize the history, structure and function of Syk, and then the novel Syk inhibitors and their current status. In addition, we will introduce our research focused on the functions of Syk on Dectin-1-mediated mast cell activation.

  9. Analysis of a two-domain binding site for the urokinase-type plasminogen activator-plasminogen activator inhibitor-1 complex in low-density-lipoprotein-receptor-related protein.

    Science.gov (United States)

    Andersen, O M; Petersen, H H; Jacobsen, C; Moestrup, S K; Etzerodt, M; Andreasen, P A; Thøgersen, H C

    2001-07-01

    The low-density-lipoprotein-receptor (LDLR)-related protein (LRP) is composed of several classes of domains, including complement-type repeats (CR), which occur in clusters that contain binding sites for a multitude of different ligands. Each approximately 40-residue CR domain contains three conserved disulphide linkages and an octahedral Ca(2+) cage. LRP is a scavenging receptor for ligands from extracellular fluids, e.g. alpha(2)-macroglobulin (alpha(2)M)-proteinase complexes, lipoprotein-containing particles and serine proteinase-inhibitor complexes, like the complex between urokinase-type plasminogen activator (uPA) and the plasminogen activator inhibitor-1 (PAI-1). In the present study we analysed the interaction of the uPA-PAI-1 complex with an ensemble of fragments representing a complete overlapping set of two-domain fragments accounting for the ligand-binding cluster II (CR3-CR10) of LRP. By ligand blotting, solid-state competition analysis and surface-plasmon-resonance analysis, we demonstrate binding to multiple CR domains, but show a preferential interaction between the uPA-PAI-1 complex and a two-domain fragment comprising CR domains 5 and 6 of LRP. We demonstrate that surface-exposed aspartic acid and tryptophan residues at identical positions in the two homologous domains, CR5 and CR6 (Asp(958,CR5), Asp(999,CR6), Trp(953,CR5) and Trp(994,CR6)), are critical for the binding of the complex as well as for the binding of the receptor-associated protein (RAP) - the folding chaperone/escort protein required for transport of LRP to the cell surface. Accordingly, the present work provides (1) an identification of a preferred binding site within LRP CR cluster II; (2) evidence that the uPA-PAI-1 binding site involves residues from two adjacent protein domains; and (3) direct evidence identifying specific residues as important for the binding of uPA-PAI-1 as well as for the binding of RAP.

  10. Where can an Insider attack?

    DEFF Research Database (Denmark)

    Probst, Christian W.; Hansen, René Rydhof; Nielson, Flemming

    2006-01-01

    By definition, an insider has better access, is more trusted, and has better information about internal procedures, high-value targets, and potential weak spots in the security, than an outsider. Consequently, an insider attack has the potential to cause significant, even catastrophic, damage...... to the targeted organisation. While the problem is well recognised in the security community as well as in law-enforcement and intelligence communities, the main resort still is to audit log files \\$\\backslash\\$emph{after the fact}. There has been little research into developing models, automated tools......, and techniques for analysing and solving (parts of) the problem. In this paper we first develop a formal model of systems, that can describe real-world scenarios. These high-level models are then mapped to acKlaim, a process algebra with support for access control, that is used to study and analyse properties...

  11. Transient ischemic attack: diagnostic evaluation.

    Science.gov (United States)

    Messé, Steven R; Jauch, Edward C

    2008-08-01

    A transient ischemic attack portends significant risk of a stroke. Consequently, the diagnostic evaluation in the emergency department is focused on identifying high-risk causes so that preventive strategies can be implemented. The evaluation consists of a facilitated evaluation of the patient's metabolic, cardiac, and neurovascular systems. At a minimum, the following tests are recommended: fingerstick glucose level, electrolyte levels, CBC count, urinalysis, and coagulation studies; noncontrast computed tomography (CT) of the head; electrocardiography; and continuous telemetry monitoring. Vascular imaging studies, such as carotid ultrasonography, CT angiography, or magnetic resonance angiography, should be performed on an urgent basis and prioritized according to the patient's risk stratification for disease. Consideration should be given for echocardiography if no large vessel abnormality is identified.

  12. Visualizing Risks: Icons for Information Attack Scenarios

    National Research Council Canada - National Science Library

    Hosmer, Hilary

    2000-01-01

    .... Visual attack scenarios help defenders see system ambiguities, imprecision, vulnerabilities and omissions, thus speeding up risk analysis, requirements gathering, safeguard selection, cryptographic...

  13. Classifying network attack scenarios using an ontology

    CSIR Research Space (South Africa)

    Van Heerden, RP

    2012-03-01

    Full Text Available ) or to the target?s reputation. The Residue sub-phase refers to damage or artefacts of the attack that occur after the attack goal has been achieved, and occurs because the attacker loses control of some systems. For example after the launch of a DDOS..., A. (1995). Hacking theft of $10 million from citibank revealed. Retrieved 10/10, 2011, from http://articles.latimes.com/1995-08-19/business/fi-36656_1_citibank-system Hurley, E. (2004). SCO site succumbs to DDoS attack. Retrieved 10/10, 2011, from...

  14. A computer network attack taxonomy and ontology

    CSIR Research Space (South Africa)

    Van Heerden, RP

    2012-01-01

    Full Text Available of the attack that occur after the attack goal has been achieved, and occurs because the attacker loses control of some systems. For example, after the launch of a DDOS (Distributed Denial of Service) attack, zombie computers may still connect to the target...-scrap- value-of-a-hacked-pc-revisited/ . Lancor, L., & Workman, R. (2007). Using Google Hacking to Enhance Defense Strategies. ACM SIGCSE Bulletin, 39 (1), 491-495. Lau, F., Rubin, S. H., Smith, M. H., & Trajkovic, L. (2000). Distributed Denial of Service...

  15. Robustness and structure of complex networks

    Science.gov (United States)

    Shao, Shuai

    This dissertation covers the two major parts of my PhD research on statistical physics and complex networks: i) modeling a new type of attack -- localized attack, and investigating robustness of complex networks under this type of attack; ii) discovering the clustering structure in complex networks and its influence on the robustness of coupled networks. Complex networks appear in every aspect of our daily life and are widely studied in Physics, Mathematics, Biology, and Computer Science. One important property of complex networks is their robustness under attacks, which depends crucially on the nature of attacks and the structure of the networks themselves. Previous studies have focused on two types of attack: random attack and targeted attack, which, however, are insufficient to describe many real-world damages. Here we propose a new type of attack -- localized attack, and study the robustness of complex networks under this type of attack, both analytically and via simulation. On the other hand, we also study the clustering structure in the network, and its influence on the robustness of a complex network system. In the first part, we propose a theoretical framework to study the robustness of complex networks under localized attack based on percolation theory and generating function method. We investigate the percolation properties, including the critical threshold of the phase transition pc and the size of the giant component Pinfinity. We compare localized attack with random attack and find that while random regular (RR) networks are more robust against localized attack, Erdoḧs-Renyi (ER) networks are equally robust under both types of attacks. As for scale-free (SF) networks, their robustness depends crucially on the degree exponent lambda. The simulation results show perfect agreement with theoretical predictions. We also test our model on two real-world networks: a peer-to-peer computer network and an airline network, and find that the real-world networks

  16. Structure of Mycobacterium tuberculosis phosphopantetheine adenylyltransferase in complex with the feedback inhibitor CoA reveals only one active-site conformation

    Energy Technology Data Exchange (ETDEWEB)

    Wubben, T.; Mesecar, A.D. (Purdue); (UIC)

    2014-10-02

    Phosphopantetheine adenylyltransferase (PPAT) catalyzes the penultimate step in the coenzyme A (CoA) biosynthetic pathway, reversibly transferring an adenylyl group from ATP to 4'-phosphopantetheine to form dephosphocoenzyme A (dPCoA). To complement recent biochemical and structural studies on Mycobacterium tuberculosis PPAT (MtPPAT) and to provide further insight into the feedback regulation of MtPPAT by CoA, the X-ray crystal structure of the MtPPAT enzyme in complex with CoA was determined to 2.11 {angstrom} resolution. Unlike previous X-ray crystal structures of PPAT-CoA complexes from other bacteria, which showed two distinct CoA conformations bound to the active site, only one conformation of CoA is observed in the MtPPAT-CoA complex.

  17. Inhibitors of Succinate: Quinone Reductase/Complex II Regulate Production of Mitochondrial Reactive Oxygen Species and Protect Normal Cells from Ischemic Damage but Induce Specific Cancer Cell Death

    Czech Academy of Sciences Publication Activity Database

    Ralph, S.J.; Moreno-Sanchez, R.; Neužil, Jiří; Rodriguez-Enriquez, S.

    2011-01-01

    Roč. 28, č. 11 (2011), s. 2695-2730 ISSN 0724-8741 Institutional research plan: CEZ:AV0Z50520701 Keywords : Mitocans * SDH/Complex II * mitochondrial ROS production Subject RIV: CE - Biochemistry Impact factor: 4.093, year: 2011

  18. Zinc(II) complexes with potent cyclin-dependent kinase inhibitors derived from 6-benzylaminopurine: synthesis, characterization, X-ray structures and biological activity

    Czech Academy of Sciences Publication Activity Database

    Trávníček, Zdeněk; Kryštof, Vladimír; Šipl, M.

    2006-01-01

    Roč. 100, č. 2 (2006), s. 214-225 ISSN 0162-0134 R&D Projects: GA ČR GA203/04/1168 Institutional research plan: CEZ:AV0Z50380511 Keywords : Zinc(II) complexes * 6-Benzylaminopurine derivatives * Bohemine * Olomoucine * X-ray structures Subject RIV: CA - Inorganic Chemistry Impact factor: 2.654, year: 2006

  19. Attack Trees for Practical Security Assessment: Ranking of Attack Scenarios with ADTool 2.0

    NARCIS (Netherlands)

    Gadyatskaya, Olga; Jhawar, Ravi; Kordy, P.T.; Lounis, Karim; Mauw, Sjouke; Trujillo-Rasua, Rolando

    2016-01-01

    In this tool demonstration paper we present the ADTool2.0: an open-source software tool for design, manipulation and analysis of attack trees. The tool supports ranking of attack scenarios based on quantitative attributes entered by the user; it is scriptable; and it incorporates attack trees with

  20. The work-averse cyber attacker model : theory and evidence from two million attack signatures

    NARCIS (Netherlands)

    Allodi, L.; Massacci, F.; Williams, J.

    The typical cyber attacker is assumed to be all powerful and to exploit all possible vulnerabilities. In this paper we present, and empirically validate, a novel and more realistic attacker model. The intuition of our model is that an attacker will optimally choose whether to act and weaponize a new

  1. Taxonomies for Reasoning About Cyber-physical Attacks in IoT-based Manufacturing Systems

    Directory of Open Access Journals (Sweden)

    Yao Pan

    2017-03-01

    Full Text Available The Internet of Things (IoT has transformed many aspects of modern manufacturing, from design to production to quality control. In particular, IoT and digital manufacturing technologies have substantially accelerated product development- cycles and manufacturers can now create products of a complexity and precision not heretofore possible. New threats to supply chain security have arisen from connecting machines to the Internet and introducing complex IoT-based systems controlling manufacturing processes. By attacking these IoT-based manufacturing systems and tampering with digital files, attackers can manipulate physical characteristics of parts and change the dimensions, shapes, or mechanical properties of the parts, which can result in parts that fail in the field. These defects increase manufacturing costs and allow silent problems to occur only under certain loads that can threaten safety and/or lives. To understand potential dangers and protect manufacturing system safety, this paper presents two taxonomies: one for classifying cyber-physical attacks against manufacturing processes and another for quality control measures for counteracting these attacks. We systematically identify and classify possible cyber-physical attacks and connect the attacks with variations in manufacturing processes and quality control measures. Our taxonomies also provide a scheme for linking emerging IoT-based manufacturing system vulnerabilities to possible attacks and quality control measures.

  2. Quantum private query with perfect user privacy against a joint-measurement attack

    Energy Technology Data Exchange (ETDEWEB)

    Yang, Yu-Guang, E-mail: yangyang7357@bjut.edu.cn [College of Computer Science and Technology, Beijing University of Technology, Beijing 100124 (China); State Key Laboratory of Information Security, Institute of Information Engineering, Chinese Academy of Sciences, Beijing 100093 (China); Liu, Zhi-Chao [College of Computer Science and Technology, Beijing University of Technology, Beijing 100124 (China); Li, Jian [School of Computer, Beijing University of Posts and Telecommunications, Beijing 100876 (China); Chen, Xiu-Bo [Information Security Center, State Key Laboratory of Networking and Switching Technology, Beijing University of Posts and Telecommunications, Beijing, 100876 (China); Zuo, Hui-Juan [College of Mathematics and Information Science, Hebei Normal University, Shijiazhuang 050024 (China); Zhou, Yi-Hua; Shi, Wei-Min [College of Computer Science and Technology, Beijing University of Technology, Beijing 100124 (China)

    2016-12-16

    The joint-measurement (JM) attack is the most powerful threat to the database security for existing quantum-key-distribution (QKD)-based quantum private query (QPQ) protocols. Wei et al. (2016) [28] proposed a novel QPQ protocol against the JM attack. However, their protocol relies on two-way quantum communication thereby affecting its real implementation and communication efficiency. Moreover, it cannot ensure perfect user privacy. In this paper, we present a new one-way QPQ protocol in which the special way of classical post-processing of oblivious key ensures the security against the JM attack. Furthermore, it realizes perfect user privacy and lower complexity of communication. - Highlights: • A special classical post-processing ensures the security against the JM attack. • It ensures perfect user privacy. • It ensures lower complexity of communication. Alice's conclusive key rate is 1/6.

  3. Internal differential collision attacks on the reduced-round Grøstl-0 hash function

    DEFF Research Database (Denmark)

    Ideguchi, Kota; Tischhauser, Elmar Wolfgang; Preneel, Bart

    2014-01-01

    . This results in collision attacks and semi-free-start collision attacks on the Grøstl-0 hash function and compression function with reduced rounds. Specifically, we show collision attacks on the Grøstl-0-256 hash function reduced to 5 and 6 out of 10 rounds with time complexities 248 and 2112 and on the Grøstl......-0-512 hash function reduced to 6 out of 14 rounds with time complexity 2183. Furthermore, we demonstrate semi-free-start collision attacks on the Grøstl-0-256 compression function reduced to 8 rounds and the Grøstl-0-512 compression function reduced to 9 rounds. Finally, we show improved...

  4. Quantum private query with perfect user privacy against a joint-measurement attack

    International Nuclear Information System (INIS)

    Yang, Yu-Guang; Liu, Zhi-Chao; Li, Jian; Chen, Xiu-Bo; Zuo, Hui-Juan; Zhou, Yi-Hua; Shi, Wei-Min

    2016-01-01

    The joint-measurement (JM) attack is the most powerful threat to the database security for existing quantum-key-distribution (QKD)-based quantum private query (QPQ) protocols. Wei et al. (2016) [28] proposed a novel QPQ protocol against the JM attack. However, their protocol relies on two-way quantum communication thereby affecting its real implementation and communication efficiency. Moreover, it cannot ensure perfect user privacy. In this paper, we present a new one-way QPQ protocol in which the special way of classical post-processing of oblivious key ensures the security against the JM attack. Furthermore, it realizes perfect user privacy and lower complexity of communication. - Highlights: • A special classical post-processing ensures the security against the JM attack. • It ensures perfect user privacy. • It ensures lower complexity of communication. Alice's conclusive key rate is 1/6.

  5. Attack Tree Generation by Policy Invalidation

    NARCIS (Netherlands)

    Ivanova, Marieta Georgieva; Probst, Christian W.; Hansen, René Rydhof; Kammüller, Florian; Naeem Akram, R.; Jajodia, S.

    2015-01-01

    Attacks on systems and organisations increasingly exploit human actors, for example through social engineering, complicating their formal treatment and automatic identi﬿cation. Formalisation of human behaviour is difficult at best, and attacks on socio-technical systems are still mostly identi﬿ed

  6. Evaluation of Crosstalk Attacks in Access Networks

    DEFF Research Database (Denmark)

    Wagner, Christoph; Eiselt, Michael; Grobe, Klaus

    2016-01-01

    WDM-PON systems regained interest as low-cost solution for metro and access networks. We present a comparative analysis of resilience of wavelength-selective and wavelength-routed architectures against crosstalk attackers. We compare the vulnerability of these architectures against attacks...

  7. Drammer : Deterministic Rowhammer attacks on mobile platforms

    NARCIS (Netherlands)

    Van Der Veen, Victor; Fratantonio, Yanick; Lindorfer, Martina; Gruss, Daniel; Maurice, Clémentine; Vigna, Giovanni; Bos, Herbert; Razavi, Kaveh; Giuffrida, Cristiano

    2016-01-01

    Recent work shows that the Rowhammer hardware bug can be used to craft powerful attacks and completely subvert a system. However, existing efforts either describe probabilistic (and thus unreliable) attacks or rely on special (and often unavailable) memory management features to place victim objects

  8. Collaborative Attack Mitigation and Response: A survey

    NARCIS (Netherlands)

    Steinberger, Jessica; Sperotto, Anna; Baier, Harald; Pras, Aiko

    2015-01-01

    Over recent years, network-based attacks have become to one of the top causes of network infrastructure and service outages. To counteract a network-based attack, an approach is to move mitigation from the target network to the networks of Internet Service Providers (ISP). However, it remains

  9. Rotational Rebound Attacks on Reduced Skein

    DEFF Research Database (Denmark)

    Khovratovich, Dmitry; Nikolic, Ivica; Rechberger, Christian

    2010-01-01

    In this paper we combine a recent rotational cryptanalysis with the rebound attack, which results in the best cryptanalysis of Skein, a candidate for the SHA-3 competition. The rebound attack approach was so far only applied to AES-like constructions. For the first time, we show that this approach...

  10. Combating Memory Corruption Attacks On Scada Devices

    Science.gov (United States)

    Bellettini, Carlo; Rrushi, Julian

    Memory corruption attacks on SCADA devices can cause significant disruptions to control systems and the industrial processes they operate. However, despite the presence of numerous memory corruption vulnerabilities, few, if any, techniques have been proposed for addressing the vulnerabilities or for combating memory corruption attacks. This paper describes a technique for defending against memory corruption attacks by enforcing logical boundaries between potentially hostile data and safe data in protected processes. The technique encrypts all input data using random keys; the encrypted data is stored in main memory and is decrypted according to the principle of least privilege just before it is processed by the CPU. The defensive technique affects the precision with which attackers can corrupt control data and pure data, protecting against code injection and arc injection attacks, and alleviating problems posed by the incomparability of mitigation techniques. An experimental evaluation involving the popular Modbus protocol demonstrates the feasibility and efficiency of the defensive technique.

  11. Use of Attack Graphs in Security Systems

    Directory of Open Access Journals (Sweden)

    Vivek Shandilya

    2014-01-01

    Full Text Available Attack graphs have been used to model the vulnerabilities of the systems and their potential exploits. The successful exploits leading to the partial/total failure of the systems are subject of keen security interest. Considerable effort has been expended in exhaustive modeling, analyses, detection, and mitigation of attacks. One prominent methodology involves constructing attack graphs of the pertinent system for analysis and response strategies. This not only gives the simplified representation of the system, but also allows prioritizing the security properties whose violations are of greater concern, for both detection and repair. We present a survey and critical study of state-of-the-art technologies in attack graph generation and use in security system. Based on our research, we identify the potential, challenges, and direction of the current research in using attack graphs.

  12. Automatic Classification of Attacks on IP Telephony

    Directory of Open Access Journals (Sweden)

    Jakub Safarik

    2013-01-01

    Full Text Available This article proposes an algorithm for automatic analysis of attack data in IP telephony network with a neural network. Data for the analysis is gathered from variable monitoring application running in the network. These monitoring systems are a typical part of nowadays network. Information from them is usually used after attack. It is possible to use an automatic classification of IP telephony attacks for nearly real-time classification and counter attack or mitigation of potential attacks. The classification use proposed neural network, and the article covers design of a neural network and its practical implementation. It contains also methods for neural network learning and data gathering functions from honeypot application.

  13. The first iron(III) complexes with cyclin-dependent kinase inhibitors: Magnetic, spectroscopic (IR, ES+ MS, NMR, Fe-57 Mossbauer), theoretical, and biological activity studies

    Czech Academy of Sciences Publication Activity Database

    Trávníček, Zdeněk; Popa, Igor; Čajan, Michal; Zbořil, R.; Kryštof, Vladimír; Mikulík, J.

    2010-01-01

    Roč. 104, č. 4 (2010), s. 405-417 ISSN 0162-0134 R&D Projects: GA MŠk 1M0512; GA ČR GA301/08/1649 Institutional research plan: CEZ:AV0Z50380511 Keywords : Iron(III) complexes * 57Fe Mössbauer spectroscopy * CDK inhibition Subject RIV: CA - Inorganic Chemistry Impact factor: 3.317, year: 2010

  14. Pharmacophore Modelling and 4D-QSAR Study of Ruthenium(II) Arene Complexes as Anticancer Agents (Inhibitors) by Electron Conformational- Genetic Algorithm Method.

    Science.gov (United States)

    Yavuz, Sevtap Caglar; Sabanci, Nazmiye; Saripinar, Emin

    2018-01-01

    The EC-GA method was employed in this study as a 4D-QSAR method, for the identification of the pharmacophore (Pha) of ruthenium(II) arene complex derivatives and quantitative prediction of activity. The arrangement of the computed geometric and electronic parameters for atoms and bonds of each compound occurring in a matrix is known as the electron-conformational matrix of congruity (ECMC). It contains the data from HF/3-21G level calculations. Compounds were represented by a group of conformers for each compound rather than a single conformation, known as fourth dimension to generate the model. ECMCs were compared within a certain range of tolerance values by using the EMRE program and the responsible pharmacophore group for ruthenium(II) arene complex derivatives was found. For selecting the sub-parameter which had the most effect on activity in the series and the calculation of theoretical activity values, the non-linear least square method and genetic algorithm which are included in the EMRE program were used. In addition, compounds were classified as the training and test set and the accuracy of the models was tested by cross-validation statistically. The model for training and test sets attained by the optimum 10 parameters gave highly satisfactory results with R2 training= 0.817, q 2=0.718 and SEtraining=0.066, q2 ext1 = 0.867, q2 ext2 = 0.849, q2 ext3 =0.895, ccctr = 0.895, ccctest = 0.930 and cccall = 0.905. Since there is no 4D-QSAR research on metal based organic complexes in the literature, this study is original and gives a powerful tool to the design of novel and selective ruthenium(II) arene complexes. Copyright© Bentham Science Publishers; For any queries, please email at epub@benthamscience.org.

  15. Quantum attack-resistent certificateless multi-receiver signcryption scheme.

    Directory of Open Access Journals (Sweden)

    Huixian Li

    Full Text Available The existing certificateless signcryption schemes were designed mainly based on the traditional public key cryptography, in which the security relies on the hard problems, such as factor decomposition and discrete logarithm. However, these problems will be easily solved by the quantum computing. So the existing certificateless signcryption schemes are vulnerable to the quantum attack. Multivariate public key cryptography (MPKC, which can resist the quantum attack, is one of the alternative solutions to guarantee the security of communications in the post-quantum age. Motivated by these concerns, we proposed a new construction of the certificateless multi-receiver signcryption scheme (CLMSC based on MPKC. The new scheme inherits the security of MPKC, which can withstand the quantum attack. Multivariate quadratic polynomial operations, which have lower computation complexity than bilinear pairing operations, are employed in signcrypting a message for a certain number of receivers in our scheme. Security analysis shows that our scheme is a secure MPKC-based scheme. We proved its security under the hardness of the Multivariate Quadratic (MQ problem and its unforgeability under the Isomorphism of Polynomials (IP assumption in the random oracle model. The analysis results show that our scheme also has the security properties of non-repudiation, perfect forward secrecy, perfect backward secrecy and public verifiability. Compared with the existing schemes in terms of computation complexity and ciphertext length, our scheme is more efficient, which makes it suitable for terminals with low computation capacity like smart cards.

  16. Evidence synthesis and decision modelling to support complex decisions: stockpiling neuraminidase inhibitors for pandemic influenza usage [version 2; referees: 2 approved

    Directory of Open Access Journals (Sweden)

    Samuel I. Watson

    2017-03-01

    Full Text Available Objectives: The stockpiling of neuraminidase inhibitor (NAI antivirals as a defence against pandemic influenza is a significant public health policy decision that must be made despite a lack of conclusive evidence from randomised controlled trials regarding the effectiveness of NAIs on important clinical end points such as mortality. The objective of this study was to determine whether NAIs should be stockpiled for treatment of pandemic influenza on the basis of current evidence. Methods: A decision model for stockpiling was designed. Data on previous pandemic influenza epidemiology was combined with data on the effectiveness of NAIs in reducing mortality obtained from a recent individual participant meta-analysis using observational data. Evidence synthesis techniques and a bias modelling method for observational data were used to incorporate the evidence into the model. The stockpiling decision was modelled for adults (≥16 years old and the United Kingdom was used as an example. The main outcome was the expected net benefits of stockpiling in monetary terms. Health benefits were estimated from deaths averted through stockpiling. Results: After adjusting for biases in the estimated effectiveness of NAIs, the expected net benefit of stockpiling in the baseline analysis was £444 million, assuming a willingness to pay of £20,000/QALY ($31,000/QALY. The decision would therefore be to stockpile NAIs. There was a greater probability that the stockpile would not be utilised than utilised. However, the rare but catastrophic losses from a severe pandemic justified the decision to stockpile. Conclusions: Taking into account the available epidemiological data and evidence of effectiveness of NAIs in reducing mortality, including potential biases, a decision maker should stockpile anti-influenza medication in keeping with the postulated decision rule.

  17. Jaguar Attack on a Child: Case Report and Literature Review

    Directory of Open Access Journals (Sweden)

    Iserson, Kenneth V.

    2015-02-01

    Full Text Available Jaguar attacks on humans rarely occur in the wild. When they do, they are often fatal. We describe a jaguar attack on a three-year-old girl near her home deep in a remote area of the Guyanese jungle. The patient had a complex but, relatively, rapid transport to a medical treatment facility for her life-threatening injuries. The child, who suffered typical jaguar-inflicted injury patterns and survived, is highlighted. We review jaguar anatomy, environmental status, hunting and killing behaviors, and discuss optimal medical management, given the resource-limited treatment environment of this international emergency medicine case. [West J Emerg Med. 2015;16(2:303–309.

  18. Signal signature and transcriptome changes of Arabidopsis during pathogen and insect attack.

    Science.gov (United States)

    De Vos, Martin; Van Oosten, Vivian R; Van Poecke, Remco M P; Van Pelt, Johan A; Pozo, Maria J; Mueller, Martin J; Buchala, Antony J; Métraux, Jean-Pierre; Van Loon, L C; Dicke, Marcel; Pieterse, Corné M J

    2005-09-01

    Plant defenses against pathogens and insects are regulated differentially by cross-communicating signaling pathways in which salicylic acid (SA), jasmonic acid (JA), and ethylene (ET) play key roles. To understand how plants integrate pathogen- and insect-induced signals into specific defense responses, we monitored the dynamics of SA, JA, and ET signaling in Arabidopsis after attack by a set of microbial pathogens and herbivorous insects with different modes of attack. Arabidopsis plants were exposed to a pathogenic leaf bacterium (Pseudomonas syringae pv. tomato), a pathogenic leaf fungus (Alternaria brassicicola), tissue-chewing caterpillars (Pieris rapae), cell-content-feeding thrips (Frankliniella occidentalis), or phloem-feeding aphids (Myzus persicae). Monitoring the signal signature in each plant-attacker combination showed that the kinetics of SA, JA, and ET production varies greatly in both quantity and timing. Analysis of global gene expression profiles demonstrated that the signal signature characteristic of each Arabidopsis-attacker combination is orchestrated into a surprisingly complex set of transcriptional alterations in which, in all cases, stress-related genes are overrepresented. Comparison of the transcript profiles revealed that consistent changes induced by pathogens and insects with very different modes of attack can show considerable overlap. Of all consistent changes induced by A. brassicicola, Pieris rapae, and E occidentalis, more than 50% also were induced consistently by P. syringae. Notably, although these four attackers all stimulated JA biosynthesis, the majority of the changes in JA-responsive gene expression were attacker specific. All together, our study shows that SA, JA, and ET play a primary role in the orchestration of the plant's defense response, but other regulatory mechanisms, such as pathway cross-talk or additional attacker-induced signals, eventually shape the highly complex attacker-specific defense response.

  19. Effectiveness of icatibant for treatment of hereditary angioedema attacks is not affected by body weight: findings from the Icatibant Outcome Survey, a cohort observational study.

    Science.gov (United States)

    Caballero, Teresa; Zanichelli, Andrea; Aberer, Werner; Maurer, Marcus; Longhurst, Hilary J; Bouillet, Laurence; Andresen, Irmgard

    2018-01-01

    Icatibant is a bradykinin B2-receptor antagonist used for the treatment of hereditary angioedema attacks resulting from C1-inhibitor deficiency. Treatment is not adjusted by body weight however the impact of body mass index (BMI) on the effectiveness of icatibant is not documented in the literature. We examined disease characteristics and icatibant treatment effectiveness in patients stratified by BMI in the Icatibant Outcome Survey, an ongoing, international, observational study monitoring the real-world safety and effectiveness of icatibant. Attack and treatment characteristics as well as outcomes following treatment with icatibant were compared among patients with underweight, normal, overweight, and obese BMI. Data from 2697 icatibant-treated attacks in 342 patients (3.5, 44.7, 34.8, and 17.0% patients of underweight, normal, overweight, and obese BMI, respectively) were analyzed. There was no significant difference in the frequency and severity of attacks across BMI groups, although obese patients tended to have more attacks of high severity. There was no impact of BMI on the frequency of laryngeal attacks, but patients with normal BMI had fewer cutaneous attacks and more abdominal attacks. Most attacks (71.9-83.8%) were treated with a single icatibant injection without the need for rescue with plasma-derived C1-inhibitor (pdC1-INH), regardless of BMI. Patients with obese BMI used pdC1-INH as rescue treatment more often (P < 0.0001; P = 0.0232 excluding 2 outliers) and treated attacks earlier than patients with normal BMI (P = 0.007). Furthermore, time to resolution and duration of attack were shorter for patients with high BMI (P < 0.001 for overweight and P < 0.05 for obese versus normal). Overall, icatibant was comparatively effective in treating attacks in patients across all BMI groups. Trial registration NCT01034969.

  20. Affect Response to Simulated Information Attack during Complex Task Performance

    Science.gov (United States)

    2014-12-02

    Positive), and 11 discrete emotions, Fear, Hostility, Guilt , Sadness, Joviality, Self- Assurance, Attentiveness, Shyness, Fatigue, Serenity, and...Force his parents to move into a home. (1.4/0) * 16. Max prides himself on his work being of the highest quality. On a joint project, other

  1. The Increasing Complexity of Hacker Attacks on Personal and ...

    African Journals Online (AJOL)

    The public telephone network, Air Traffic Control, Power systems and other utilities, the government and the military. No body is left out. To prevent the collapse of the Internet, the Internet Workforce and the industry have pooled resources together to provide some mitigation or palliative strategies, but these efforts have been ...

  2. Adaptive cyber-attack modeling system

    Science.gov (United States)

    Gonsalves, Paul G.; Dougherty, Edward T.

    2006-05-01

    The pervasiveness of software and networked information systems is evident across a broad spectrum of business and government sectors. Such reliance provides an ample opportunity not only for the nefarious exploits of lone wolf computer hackers, but for more systematic software attacks from organized entities. Much effort and focus has been placed on preventing and ameliorating network and OS attacks, a concomitant emphasis is required to address protection of mission critical software. Typical software protection technique and methodology evaluation and verification and validation (V&V) involves the use of a team of subject matter experts (SMEs) to mimic potential attackers or hackers. This manpower intensive, time-consuming, and potentially cost-prohibitive approach is not amenable to performing the necessary multiple non-subjective analyses required to support quantifying software protection levels. To facilitate the evaluation and V&V of software protection solutions, we have designed and developed a prototype adaptive cyber attack modeling system. Our approach integrates an off-line mechanism for rapid construction of Bayesian belief network (BN) attack models with an on-line model instantiation, adaptation and knowledge acquisition scheme. Off-line model construction is supported via a knowledge elicitation approach for identifying key domain requirements and a process for translating these requirements into a library of BN-based cyber-attack models. On-line attack modeling and knowledge acquisition is supported via BN evidence propagation and model parameter learning.

  3. Radiological attacks and accidents. Medical consequences

    International Nuclear Information System (INIS)

    Sakuta, Hidenari

    2007-01-01

    Probability of the occurrence of radiological attacks appears to be elevated after the terrorist attacks against the United States on September 11 in 2001. There are a lot of scenarios of radiological attack: simple radiological device, radiological disperse device (RDD or dirty bomb), attacks against nuclear reactor, improvised nuclear device, and nuclear weapons. Of these, RDD attack is the most probable scenario, because it can be easily made and can generate enormous psychological and economic damages. Radiological incidents are occurring to and fro in the world, including several cases of theft to nuclear facilities and unsuccessful terrorist attacks against them. Recently, a former Russian spy has allegedly been killed using polonium-210. In addition, serious radiological accidents have occurred in Chernobyl, Goiania, and Tokai-mura. Planning, preparation, education, and training exercise appear to be essential factors to cope with radiological attacks and accidents effectively without feeling much anxiety. Triage and psychological first aid are prerequisite to manage and provide effective medial care for mass casualties without inducing panic. (author)

  4. Classification of cyber attacks in South Africa

    CSIR Research Space (South Africa)

    Van Heerden, R

    2016-05-01

    Full Text Available various ATM's throughout South Africa. Two criminals, Motsoane and Masoleng, were arrested in February 2012 and both sentenced to 15 years in jail [36, 37]. 3.10 2013: IOL DDoS Anonymous Africa claimed responsibility for launching a Distributed Denial... of Service (DDoS) attack on the Independent Newspaper web site iol.co.za. The attack was in response to claims that the IOL group supports Zimbabwean president Robert Mugabe. The following taunt was sent to boast about the attack: “IOL bad boys bad boys...

  5. Attacker Modelling in Ubiquitous Computing Systems

    DEFF Research Database (Denmark)

    Papini, Davide

    in with our everyday life. This future is visible to everyone nowadays: terms like smartphone, cloud, sensor, network etc. are widely known and used in our everyday life. But what about the security of such systems. Ubiquitous computing devices can be limited in terms of energy, computing power and memory...... attacker remain somehow undened and still under extensive investigation. This Thesis explores the nature of the ubiquitous attacker with a focus on how she interacts with the physical world and it denes a model that captures the abilities of the attacker. Furthermore a quantitative implementation...

  6. BAY 87-2243, a highly potent and selective inhibitor of hypoxia-induced gene activation has antitumor activities by inhibition of mitochondrial complex I

    International Nuclear Information System (INIS)

    Ellinghaus, Peter; Heisler, Iring; Unterschemmann, Kerstin; Haerter, Michael; Beck, Hartmut; Greschat, Susanne; Ehrmann, Alexander; Summer, Holger; Flamme, Ingo; Oehme, Felix; Thierauch, Karlheinz; Michels, Martin; Hess-Stumpp, Holger; Ziegelbauer, Karl

    2013-01-01

    The activation of the transcription factor hypoxia-inducible factor-1 (HIF-1) plays an essential role in tumor development, tumor progression, and resistance to chemo- and radiotherapy. In order to identify compounds targeting the HIF pathway, a small molecule library was screened using a luciferase-driven HIF-1 reporter cell line under hypoxia. The high-throughput screening led to the identification of a class of aminoalkyl-substituted compounds that inhibited hypoxia-induced HIF-1 target gene expression in human lung cancer cell lines at low nanomolar concentrations. Lead structure BAY 87-2243 was found to inhibit HIF-1α and HIF-2α protein accumulation under hypoxic conditions in non-small cell lung cancer (NSCLC) cell line H460 but had no effect on HIF-1α protein levels induced by the hypoxia mimetics desferrioxamine or cobalt chloride. BAY 87-2243 had no effect on HIF target gene expression levels in RCC4 cells lacking Von Hippel–Lindau (VHL) activity nor did the compound affect the activity of HIF prolyl hydroxylase-2. Antitumor activity of BAY 87-2243, suppression of HIF-1α protein levels, and reduction of HIF-1 target gene expression in vivo were demonstrated in a H460 xenograft model. BAY 87-2243 did not inhibit cell proliferation under standard conditions. However under glucose depletion, a condition favoring mitochondrial ATP generation as energy source, BAY 87-2243 inhibited cell proliferation in the nanomolar range. Further experiments revealed that BAY 87-2243 inhibits mitochondrial complex I activity but has no effect on complex III activity. Interference with mitochondrial function to reduce hypoxia-induced HIF-1 activity in tumors might be an interesting therapeutic approach to overcome chemo- and radiotherapy-resistance of hypoxic tumors

  7. The antibiotic tiamulin is a potent inducer and inhibitor of cytochrome P4503A via the formation of a stable metabolic intermediate complex. Studies in primary hepatocyte cultures and liver microsomes of the pig.

    Science.gov (United States)

    Witkamp, R F; Nijmeijer, S M; Monshouwer, M; Van Miert, A S

    1995-05-01

    Tiamulin is a semisynthetic antibiotic frequently used in agricultural animals. The drug has been shown to produce clinically important--often lethal--interactions with other compounds that are simultaneously administered. To explain this, it has been suggested that tiamulin selectively inhibits oxidative drug metabolism via the formation of a cytochrome P450 metabolic intermediate complex. The aim of the present study was to provide further support for this hypothesis. When hepatic microsomes and cultured primary pig hepatocytes were incubated with tiamulin, a maximum in the absorbance spectrum at 455 nm was observed, which disappeared after adding KFe(CN)6. When hepatocytes were incubated with tiamulin for 72 hr, cytochrome P450 content and cytochrome P4503A apoprotein levels were increased. Tiamulin strongly inhibited and concentration dependently inhibited the hydroxylation rate of testosterone at the 6 beta-position in both microsomes and hepatocytes, and the microsomal N-demethylation rate of ethylmorphine. Other testosterone hydroxylations were inhibited to a lesser extent or not affected. The relative inhibition of the hydroxylation of testosterone at the 6 beta-position was more pronounced in microsomes from rifampicin- and triacetyloleandomycin-treated pigs. The results indicate that cytochrome P450 complex formation can at least partly explain the interactions observed with tiamulin. Tiamulin seems to be a strong, probably selective, inhibitor of the cytochrome P4503A subfamily and an interesting tool for further research.

  8. Aminopurvalanol A, a Potent, Selective, and Cell Permeable Inhibitor of Cyclins/Cdk Complexes, Causes the Reduction of in Vitro Fertilizing Ability of Boar Spermatozoa, by Negatively Affecting the Capacitation-Dependent Actin Polymerization

    Directory of Open Access Journals (Sweden)

    Nicola Bernabò

    2017-12-01

    Full Text Available The adoption of high-througput technologies demonstrated that in mature spermatozoa are present proteins that are thought to be not present or active in sperm cells, such as those involved in control of cell cycle. Here, by using an in silico approach based on the application of networks theory, we found that Cyclins/Cdk complexes could play a central role in signal transduction active during capacitation. Then, we tested this hypothesis in the vitro model. With this approach, spermatozoa were incubated under capacitating conditions in control conditions (CTRL or in the presence of Aminopurvalanol A a potent, selective and cell permeable inhibitor of Cyclins/Cdk complexes at different concentrations (2, 10, and 20 μM. We found that this treatment caused dose-dependent inhibition of sperm fertilizing ability. We attribute this event to the loss of acrosome integrity due to the inhibition of physiological capacitation-dependent actin polymerization, rather than to a detrimental effect on membrane lipid remodeling or on other signaling pathways such as tubulin reorganization or MAPKs activation. In our opinion, these data could revamp the knowledge on biochemistry of sperm capacitation and could suggest new perspectives in studying male infertility.

  9. Password-only authenticated three-party key exchange proven secure against insider dictionary attacks.

    Science.gov (United States)

    Nam, Junghyun; Choo, Kim-Kwang Raymond; Paik, Juryon; Won, Dongho

    2014-01-01

    While a number of protocols for password-only authenticated key exchange (PAKE) in the 3-party setting have been proposed, it still remains a challenging task to prove the security of a 3-party PAKE protocol against insider dictionary attacks. To the best of our knowledge, there is no 3-party PAKE protocol that carries a formal proof, or even definition, of security against insider dictionary attacks. In this paper, we present the first 3-party PAKE protocol proven secure against both online and offline dictionary attacks as well as insider and outsider dictionary attacks. Our construct can be viewed as a protocol compiler that transforms any 2-party PAKE protocol into a 3-party PAKE protocol with 2 additional rounds of communication. We also present a simple and intuitive approach of formally modelling dictionary attacks in the password-only 3-party setting, which significantly reduces the complexity of proving the security of 3-party PAKE protocols against dictionary attacks. In addition, we investigate the security of the well-known 3-party PAKE protocol, called GPAKE, due to Abdalla et al. (2005, 2006), and demonstrate that the security of GPAKE against online dictionary attacks depends heavily on the composition of its two building blocks, namely a 2-party PAKE protocol and a 3-party key distribution protocol.

  10. YET ANOTHER ATTACK ON WAGES AND CONDITIONS.

    Science.gov (United States)

    McCarthy, Andrew

    2016-10-01

    An unobjectionable-sounding title obscures the real intent of the latest in a series of Bills which the federal Coalition government is attempting to legislate in its ongoing attempts to undermine employee wages and conditions and attack unions.

  11. A Unique Fatal Moose Attack Mimicking Homicide.

    Science.gov (United States)

    Gudmannsson, Petur; Berge, Johan; Druid, Henrik; Ericsson, Göran; Eriksson, Anders

    2018-03-01

    Fatalities caused by animal attacks are rare, but have the potential to mimic homicide. We present a case in which a moose attacked and killed a woman who was walking her dog in a forest. Autopsy showed widespread blunt trauma with a large laceration on one leg in which blades of grass were embedded. Flail chest was the cause of death. The case was initially conceived as homicide by means of a riding lawn mower. A review of the case by moose experts and analyses of biological trace material that proved to originate from moose, established the true source of injury. The dog probably provoked a moose, which, in response, stomped and gored the victim to death. The injuries resembled those previously reported from attacks by cattle and water buffalo. Fatal moose attacks constitute an extremely rare threat in boreal areas, but can be considered in traumatic deaths of unknown cause. © 2017 American Academy of Forensic Sciences.

  12. Diabetes - preventing heart attack and stroke

    Science.gov (United States)

    Diabetes complications - heart; Coronary artery disease - diabetes; CAD - diabetes; Cerebrovascular disease - diabetes ... People with diabetes have a higher chance of having heart attacks and strokes. Smoking and having high blood pressure and high ...

  13. Marine Attack on Towed Hydrophone Arrays

    National Research Council Canada - National Science Library

    Kalmijn, Ad

    2002-01-01

    The original objective of the SIO Marine Attack project was to identify the electric and magnetic fields causing sharks to inflict serious damage upon the towed hydrophone arrays of US Navy submarines...

  14. Heuristic attacks against graphical password generators

    CSIR Research Space (South Africa)

    Peach, S

    2010-05-01

    Full Text Available In this paper the authors explore heuristic attacks against graphical password generators. A new trend is emerging to use user clickable pictures to generate passwords. This technique of authentication can be successfully used for - for example...

  15. On localization attacks against cloud infrastructure

    Science.gov (United States)

    Ge, Linqiang; Yu, Wei; Sistani, Mohammad Ali

    2013-05-01

    One of the key characteristics of cloud computing is the device and location independence that enables the user to access systems regardless of their location. Because cloud computing is heavily based on sharing resource, it is vulnerable to cyber attacks. In this paper, we investigate a localization attack that enables the adversary to leverage central processing unit (CPU) resources to localize the physical location of server used by victims. By increasing and reducing CPU usage through the malicious virtual machine (VM), the response time from the victim VM will increase and decrease correspondingly. In this way, by embedding the probing signal into the CPU usage and correlating the same pattern in the response time from the victim VM, the adversary can find the location of victim VM. To determine attack accuracy, we investigate features in both the time and frequency domains. We conduct both theoretical and experimental study to demonstrate the effectiveness of such an attack.

  16. Using agility to combat cyber attacks.

    Science.gov (United States)

    Anderson, Kerry

    2017-06-01

    Some incident response practitioners feel that they have been locked in a battle with cyber criminals since the popular adoption of the internet. Initially, organisations made great inroads in preventing and containing cyber attacks. In the last few years, however, cyber criminals have become adept at eluding defence security technologies and rapidly modifying their exploit strategies for financial or political gains. Similar to changes in military combat tactics, cyber criminals utilise distributed attack cells, real-time communications, and rapidly mutating exploits to minimise the potential for detection. Cyber criminals have changed their attack paradigm. This paper describes a new incident response paradigm aimed at combating the new model of cyber attacks with an emphasis on agility to increase the organisation's ability to respond rapidly to these new challenges.

  17. Social engineering attack examples, templates and scenarios

    CSIR Research Space (South Africa)

    Mouton, Francois

    2016-06-01

    Full Text Available that are representative of real-world examples, whilst still being general enough to encompass several different real-world examples. The proposed social engineering attack templates cover all three types of communication, namely bidirectional communication...

  18. Compiling symbolic attacks to protocol implementation tests

    Directory of Open Access Journals (Sweden)

    Michael Rusinowitch

    2013-07-01

    Full Text Available Recently efficient model-checking tools have been developed to find flaws in security protocols specifications. These flaws can be interpreted as potential attacks scenarios but the feasability of these scenarios need to be confirmed at the implementation level. However, bridging the gap between an abstract attack scenario derived from a specification and a penetration test on real implementations of a protocol is still an open issue. This work investigates an architecture for automatically generating abstract attacks and converting them to concrete tests on protocol implementations. In particular we aim to improve previously proposed blackbox testing methods in order to discover automatically new attacks and vulnerabilities. As a proof of concept we have experimented our proposed architecture to detect a renegotiation vulnerability on some implementations of SSL/TLS, a protocol widely used for securing electronic transactions.

  19. The role of sleep in migraine attacks

    Directory of Open Access Journals (Sweden)

    Elaine Inamorato

    1993-11-01

    Full Text Available Migraine attacks may be precipitated by sleep deprivation or excessive sleep and sleep is also associated with relief of migraine attacks. In view of this variable relationship we studied the records of 159 consecutive outpatients of our Headache Unit. In 121 records there was reference to sleep involvement, in 55% by a single form and in 45% by more than one form. When only one form was related, relief was most common (70%. 30% of that group of patients had the migraine attack precipitated by sleep, 24% by deprivation and 6% by sleep excess. When the effects of sleep were multiple, these effects were as expected logically in 65%: «in accordance» group (e.g attack precipitated by sleep deprivation and relieved by sleep onset. In a second group, («conflicting» where the involvement was not logical, there were three different combinations of sleep involvement, possibly due to more than one pathophysiological mechanism.

  20. ATTACK WARNING: Costs to Modernize NORAD's Computer System Significantly Understated

    National Research Council Canada - National Science Library

    Cross, F

    1991-01-01

    ...) Integrated Tactical Warning and Attack Assessment (ITW/AA) system. These subsystems provide critical strategic surveillance and attack warning and assessment information to United States and Canadian leaders...

  1. RAPTOR: Ransomware Attack PredicTOR

    OpenAIRE

    Quinkert, Florian; Holz, Thorsten; Hossain, KSM Tozammel; Ferrara, Emilio; Lerman, Kristina

    2018-01-01

    Ransomware, a type of malicious software that encrypts a victim's files and only releases the cryptographic key once a ransom is paid, has emerged as a potentially devastating class of cybercrimes in the past few years. In this paper, we present RAPTOR, a promising line of defense against ransomware attacks. RAPTOR fingerprints attackers' operations to forecast ransomware activity. More specifically, our method learns features of malicious domains by looking at examples of domains involved in...

  2. Attack Helicopter Operations: Art or Science

    Science.gov (United States)

    1991-05-13

    ATTACK HELICOPTER OPERATIONS: ART OR SCIENCE ? BY LIEUTENANT COLONEL JAN CALLEN United States Army DISTRIBUTION STATEMENT A: Approved for public release...TASK IWORK UNIT ELEMENT NO. NO. NO. ACCESSION NC 11. TITLE (Include Socurity Classification) Attack Helicopter Operations: Art or Science ? 12. PERSONAL...OPERATIONS: ART OR SCIENCE ? AN INDIVIDUAL STUDY PROJECT by Lieutenant Colonel Jan Callen United States Army Colonel Greg Snelgrove Project Adviser U.S

  3. Protecting mobile agents from external replay attacks

    OpenAIRE

    Garrigues Olivella, Carles; Migas, Nikos; Buchanan, William; Robles, Sergi; Borrell Viader, Joan

    2014-01-01

    Peer-reviewed This paper presents a protocol for the protection of mobile agents against external replay attacks. This kind of attacks are performed by malicious platforms when dispatching an agent multiple times to a remote host, thus making it reexecute part of its itinerary. Current proposals aiming to address this problem are based on storing agent identifiers, or trip markers, inside agent platforms, so that future reexecutions can be detected and prevented. The problem of these solut...

  4. Semantic Identification Attacks on Web Browsing

    OpenAIRE

    Guha, Neel

    2016-01-01

    We introduce a Semantic Identification Attack, in which an adversary uses semantic signals about the pages visited in one browsing session to identify other browsing sessions launched by the same user. This attack allows an adver- sary to determine if two browsing sessions originate from the same user regardless of any measures taken by the user to disguise their browser or network. We use the MSNBC Anonymous Browsing data set, which contains a large set of user visits (labeled by category) t...

  5. Consciousness in Non-Epileptic Attack Disorder

    OpenAIRE

    Reuber, M.; Kurthen, M.

    2011-01-01

    Non-epileptic attack disorder (NEAD) is one of the most important differential diagnoses of epilepsy. Impairment of\\ud consciousness is the key feature of non-epileptic attacks (NEAs). The first half of this review summarises the clinical research\\ud literature featuring observations relating to consciousness in NEAD. The second half places this evidence in the wider context\\ud of the recent discourse on consciousness in neuroscience and the philosophy of mind. We argue that studies of consci...

  6. Cyber Security Audit and Attack Detection Toolkit

    Energy Technology Data Exchange (ETDEWEB)

    Peterson, Dale

    2012-05-31

    This goal of this project was to develop cyber security audit and attack detection tools for industrial control systems (ICS). Digital Bond developed and released a tool named Bandolier that audits ICS components commonly used in the energy sector against an optimal security configuration. The Portaledge Project developed a capability for the PI Historian, the most widely used Historian in the energy sector, to aggregate security events and detect cyber attacks.

  7. High angle of attack aerodynamics subsonic, transonic, and supersonic flows

    CERN Document Server

    Rom, Josef

    1992-01-01

    The aerodynamics of aircraft at high angles of attack is a subject which is being pursued diligently, because the modern agile fighter aircraft and many of the current generation of missiles must perform well at very high incidence, near and beyond stall. However, a comprehensive presentation of the methods and results applicable to the studies of the complex aerodynamics at high angle of attack has not been covered in monographs or textbooks. This book is not the usual textbook in that it goes beyond just presenting the basic theoretical and experimental know-how, since it contains reference material to practical calculation methods and technical and experimental results which can be useful to the practicing aerospace engineers and scientists. It can certainly be used as a text and reference book for graduate courses on subjects related to high angles of attack aerodynamics and for topics related to three-dimensional separation in viscous flow courses. In addition, the book is addressed to the aerodynamicist...

  8. Technique of experimental evaluation of cloud environment attacks detection accuracy

    Directory of Open Access Journals (Sweden)

    Sergey A. Klimachev

    2018-05-01

    Full Text Available The article is devoted to research of efficiency evaluation of IDS used for dynamic and complex organizational and technical structure computing platform guard. The components of the platform have a set of heterogeneous parameters. Analysis of existing IDS evaluation technique revealed shortcomings in justification of quantitative metrics that describe the efficiency and reliability IDS resolving. This makes if difficult to prove IDS evaluation technique. The purpose of the study is to increase IDS evaluation objectivity. To achive the purpose it is necessary to develop the correct technique, tools, experimental stand. The article proposes the results of development and approbation of the technique of IDS efficiency evaluation and software for it. The technique is based on defining of optimal set of attack detection accuracy scores. The technique and the software allow solving problems of comparative analysis of IDS that have similar functionality. As a result of the research, a number of task have been solved, including the selection of universal quantitative metrics for attack detection accuracy evaluation, the defining of summarised attack detection accuracy evaluation metric based on defining of pareto-optimal set of scores that ensure the confidentiality, integrity and accessibility of cloud environment information and information resources,  the development of a functional model,  a functional scheme and a software for cloud environment IDS research.

  9. Protecting ICS Systems Within the Energy Sector from Cyber Attacks

    Science.gov (United States)

    Barnes, Shaquille

    Advance persistent threat (APT) groups are continuing to attack the energy sector through cyberspace, which poses a risk to our society, national security, and economy. Industrial control systems (ICSs) are not designed to handle cyber-attacks, which is why asset owners need to implement the correct proactive and reactive measures to mitigate the risk to their ICS environments. The Industrial Control Systems Cyber Emergency Response Team (ICS-CERT) responded to 290 incidents for fiscal year 2016, where 59 of those incidents came from the Energy Sector. APT groups know how vulnerable energy sector ICS systems are and the destruction they can cause when they go offline such as loss of production, loss of life, and economic impact. Defending against APT groups requires more than just passive controls such as firewalls and antivirus solutions. Asset owners should implement a combination of best practices and active defense in their environment to defend against APT groups. Cyber-attacks against critical infrastructure will become more complex and harder to detect and respond to with traditional security controls. The purpose of this paper was to provide asset owners with the correct security controls and methodologies to help defend against APT groups.

  10. Distinguishing attack and second-preimage attack on encrypted message authentication codes (EMAC)

    Science.gov (United States)

    Ariwibowo, Sigit; Windarta, Susila

    2016-02-01

    In this paper we show that distinguisher on CBC-MAC can be applied to Encrypted Message Authentication Code (EMAC) scheme. EMAC scheme in general is vulnerable to distinguishing attack and second preimage attack. Distinguishing attack simulation on AES-EMAC using 225 message modifications, no collision have been found. According to second preimage attack simulation on AES-EMAC no collision found between EMAC value of S1 and S2, i.e. no second preimage found for messages that have been tested. Based on distinguishing attack simulation on truncated AES-EMAC we found collision in every message therefore we cannot distinguish truncated AES-EMAC with random function. Second-preimage attack is successfully performed on truncated AES-EMAC.

  11. SCADA system vulnerabilities to cyber attack

    Energy Technology Data Exchange (ETDEWEB)

    Shaw, W. T. [Cyber Security Consulting (Canada)

    2004-10-01

    The susceptibility to terrorist attacks of computer-based supervisory control (SCADA) systems that are used to monitor and control water distribution systems, oil and gas pipelines and the electrical grid, is discussed. The discussion includes ways in which SCADA systems may be attacked and remedial actions that may be taken to reduce or eliminate the possibility of such attacks. Attacks may take the form of causing the system to generate false data to divert attention from impending system disasters, or commandeer the system to seriously disable it, or cause damage to the process or equipment being controlled by sending improper control commands. SCADA systems are also vulnerable to internal threats, either from an accidental action that results in damage, or an intentional action, as for example by a disgruntled employee, or ex-employee, usually by way of reprogramming an RTU or PLC by accessing the polling/communications circuit. Recent SCADA systems are much more susceptible to concerted cyber attacks because of the adoption of IT technologies and standards into the design of such systems. (Older systems are more likely to be unique designs, hence less susceptible to attack). As far as protection of SCADA systems is concerned, there are no technologies that would prevent a technologically sophisticated terrorist or disgruntled employee from doing major damage to the system, however, the IT world has developed a range of technologies for the protection of IT assets, and many of these same technologies can also be used to safeguard modern SCADA systems.

  12. A blind video watermarking scheme resistant to rotation and collusion attacks

    Directory of Open Access Journals (Sweden)

    Amlan Karmakar

    2016-04-01

    Full Text Available In this paper, Discrete Cosine Transform (DCT based blind video watermarking algorithm is proposed, which is perceptually invisible and robust against rotation and collusion attacks. To make the scheme resistant against rotation, watermark is embedded within the square blocks, placed on the middle position of every luminance channel. Then Zernike moments of those square blocks are calculated. The rotation invariance property of the Complex Zernike moments is exploited to predict the rotation angle of the video at the time of extraction of watermark bits. To make the scheme robust against collusion, design of the scheme is done in such a way that the embedding blocks will vary for the successive frames of the video. A Pseudo Random Number (PRN generator and a permutation vector are used to achieve the goal. The experimental results show that the scheme is robust against conventional video attacks, rotation attack and collusion attacks.

  13. Expectation-Maximization Tensor Factorization for Practical Location Privacy Attacks

    Directory of Open Access Journals (Sweden)

    Murakami Takao

    2017-10-01

    Full Text Available Location privacy attacks based on a Markov chain model have been widely studied to de-anonymize or de-obfuscate mobility traces. An adversary can perform various kinds of location privacy attacks using a personalized transition matrix, which is trained for each target user. However, the amount of training data available to the adversary can be very small, since many users do not disclose much location information in their daily lives. In addition, many locations can be missing from the training traces, since many users do not disclose their locations continuously but rather sporadically. In this paper, we show that the Markov chain model can be a threat even in this realistic situation. Specifically, we focus on a training phase (i.e. mobility profile building phase and propose Expectation-Maximization Tensor Factorization (EMTF, which alternates between computing a distribution of missing locations (E-step and computing personalized transition matrices via tensor factorization (M-step. Since the time complexity of EMTF is exponential in the number of missing locations, we propose two approximate learning methods, one of which uses the Viterbi algorithm while the other uses the Forward Filtering Backward Sampling (FFBS algorithm. We apply our learning methods to a de-anonymization attack and a localization attack, and evaluate them using three real datasets. The results show that our learning methods significantly outperform a random guess, even when there is only one training trace composed of 10 locations per user, and each location is missing with probability 80% (i.e. even when users hardly disclose two temporally-continuous locations.

  14. Classification of HTTP Attacks: A Study on the ECML/PKDD 2007 Discovery Challenge

    Energy Technology Data Exchange (ETDEWEB)

    Gallagher, Brian [Lawrence Livermore National Lab. (LLNL), Livermore, CA (United States); Eliassi-Rad, Tina [Lawrence Livermore National Lab. (LLNL), Livermore, CA (United States)

    2009-07-08

    As the world becomes more reliant on Web applications for commercial, financial, and medical transactions, cyber attacks on the World Wide Web are increasing in frequency and severity. Web applications provide an attractive alternative to traditional desktop applications due to their accessibility and ease of deployment. However, the accessibility of Web applications also makes them extremely vulnerable to attack. This inherent vulnerability is intensified by the distributed nature ofWeb applications and the complexity of configuring application servers. These factors have led to a proliferation of Web-based attacks, in which attackers surreptitiously inject code into HTTP requests, allowing them to execute arbitrary commands on remote systems and perform malicious activities such as reading, altering, or destroying sensitive data. One approach for dealing with HTTP-based attacks is to identify malicious code in incoming HTTP requests and eliminate bad requests before they are processed. Using machine learning techniques, we can build a classifier to automatically label requests as “Valid” or “Attack.” For this study, we develop a simple, but effective HTTP attack classifier, based on the vector space model used commonly for Information Retrieval. Our classifier not only separates attacks from valid requests, but can also identify specific attack types (e.g., “SQL Injection” or “Path Traversal”). We demonstrate the effectiveness of our approach through experiments on the ECML/PKDD 2007 Discovery Challenge data set. Specifically, we show that our approach achieves higher precision and recall than previous methods. In addition, our approach has a number of desirable characteristics, including robustness to missing contextual information, interpretability of models, and scalability.

  15. Exploiting Hardware Vulnerabilities to Attack Embedded System Devices: a Survey of Potent Microarchitectural Attacks

    Directory of Open Access Journals (Sweden)

    Apostolos P. Fournaris

    2017-07-01

    Full Text Available Cyber-Physical system devices nowadays constitute a mixture of Information Technology (IT and Operational Technology (OT systems that are meant to operate harmonically under a security critical framework. As security IT countermeasures are gradually been installed in many embedded system nodes, thus securing them from many well-know cyber attacks there is a lurking danger that is still overlooked. Apart from the software vulnerabilities that typical malicious programs use, there are some very interesting hardware vulnerabilities that can be exploited in order to mount devastating software or hardware attacks (typically undetected by software countermeasures capable of fully compromising any embedded system device. Real-time microarchitecture attacks such as the cache side-channel attacks are such case but also the newly discovered Rowhammer fault injection attack that can be mounted even remotely to gain full access to a device DRAM (Dynamic Random Access Memory. Under the light of the above dangers that are focused on the device hardware structure, in this paper, an overview of this attack field is provided including attacks, threat directives and countermeasures. The goal of this paper is not to exhaustively overview attacks and countermeasures but rather to survey the various, possible, existing attack directions and highlight the security risks that they can pose to security critical embedded systems as well as indicate their strength on compromising the Quality of Service (QoS such systems are designed to provide.

  16. Predicting Factors of Zone 4 Attack in Volleyball.

    Science.gov (United States)

    Costa, Gustavo C; Castro, Henrique O; Evangelista, Breno F; Malheiros, Laura M; Greco, Pablo J; Ugrinowitsch, Herbert

    2017-06-01

    This study examined 142 volleyball games of the Men's Super League 2014/2015 seasons in Brazil from which we analyzed 24-26 games of each participating team, identifying 5,267 Zone 4 attacks for further analysis. Within these Zone 4 attacks, we analyzed the association between the effect of the attack carried out and the separate effects of serve reception, tempo and type of attack. We found that the reception, tempo of attack, second tempo of attack, and power of diagonal attack were predictors of the attack effect in Zone 4. Moreover, placed attacks showed a tendency to not yield a score. In conclusion, winning points in high-level men's volleyball requires excellent receptions, a fast attack tempo and powerfully executed of attacks.

  17. Nonepileptic attack disorder among married women.

    Science.gov (United States)

    Dhanaraj, M; Rangaraj, R; Arulmozhi, T; Vengatesan, A

    2005-06-01

    To study the clinical features, precipitating stressful life events and prognosis of nonepileptic attack disorder (NEAD) among married women. Prospective cohort study with 1-year follow-up. A tertiary care teaching hospital. Of the 1020 patients with epilepsy referred to the epilepsy clinic during 2002-2003, 30 were married women with NEAD. The diagnostic criteria for NEAD included normal EEG during ictal and post-ictal phase of the generalized 'attack.' The data collected included clinical characteristics, semiology of the attacks, precipitating stressful events, and co-morbid psychiatric disorders. The control group included 30 age-matched married women with generalized tonic-clonic seizures. The long-term outcome and factors influencing the outcomes were analyzed. The mean duration of illness was 18 months, and the pattern of the attack was 'fall and lying still' in 53% and 'fall with generalized motor movements' in 47%. The frequency was one or more per week in 57% and occasionally in 43%. The important stressful events were matrimonial discord following illegal relationship of the husband with another woman (chi2 = 9.02, P = 0.003) and constant quarrel with other family members (chi2 = 5.19, P = 0.02). The prevalence of sexual abuse was low (7%). Co-morbid psychiatric disorder was observed in 70%. At the end of 1 year, 39% were free from the attack. Resolution of the stressful life events (chi2 = 4.52, P = 0.03) and lower frequency of attack at the time of reporting (chi2 = 3.88, P = 0.05) correlated with good outcomes. Among patients with NEAD in India, the major precipitating factors were matrimonial discord following illegal relationship of the husband with another woman and constant quarrel with other family members and not sexual abuse. Women with low frequency of attack at the time of reporting and the remission of the stressful events had better outcomes.

  18. Security Analysis of 7-Round MISTY1 against Higher Order Differential Attacks

    Science.gov (United States)

    Tsunoo, Yukiyasu; Saito, Teruo; Shigeri, Maki; Kawabata, Takeshi

    MISTY1 is a 64-bit block cipher that has provable security against differential and linear cryptanalysis. MISTY1 is one of the algorithms selected in the European NESSIE project, and it has been recommended for Japanese e-Government ciphers by the CRYPTREC project. This paper shows that higher order differential attacks can be successful against 7-round versions of MISTY1 with FL functions. The attack on 7-round MISTY1 can recover a partial subkey with a data complexity of 254.1 and a computational complexity of 2120.8, which signifies the first successful attack on 7-round MISTY1 with no limitation such as a weak key. This paper also evaluates the complexity of this higher order differential attack on MISTY1 in which the key schedule is replaced by a pseudorandom function. It is shown that resistance to the higher order differential attack is not substantially improved even in 7-round MISTY1 in which the key schedule is replaced by a pseudorandom function.

  19. 12 CFR 263.17 - Collateral attacks on adjudicatory proceeding.

    Science.gov (United States)

    2010-01-01

    ... 12 Banks and Banking 3 2010-01-01 2010-01-01 false Collateral attacks on adjudicatory proceeding... Collateral attacks on adjudicatory proceeding. If an interlocutory appeal or collateral attack is brought in... shall be excused based on the pendency before any court of any interlocutory appeal or collateral attack. ...

  20. 12 CFR 509.17 - Collateral attacks on adjudicatory proceeding.

    Science.gov (United States)

    2010-01-01

    ... 12 Banks and Banking 5 2010-01-01 2010-01-01 false Collateral attacks on adjudicatory proceeding....17 Collateral attacks on adjudicatory proceeding. If an interlocutory appeal or collateral attack is... shall be excused based on the pendency before any court of any interlocutory appeal or collateral attack. ...

  1. A Game Theoretic Approach to Cyber Attack Prediction

    Energy Technology Data Exchange (ETDEWEB)

    Peng Liu

    2005-11-28

    The area investigated by this project is cyber attack prediction. With a focus on correlation-based prediction, current attack prediction methodologies overlook the strategic nature of cyber attack-defense scenarios. As a result, current cyber attack prediction methodologies are very limited in predicting strategic behaviors of attackers in enforcing nontrivial cyber attacks such as DDoS attacks, and may result in low accuracy in correlation-based predictions. This project develops a game theoretic framework for cyber attack prediction, where an automatic game-theory-based attack prediction method is proposed. Being able to quantitatively predict the likelihood of (sequences of) attack actions, our attack prediction methodology can predict fine-grained strategic behaviors of attackers and may greatly improve the accuracy of correlation-based prediction. To our best knowledge, this project develops the first comprehensive framework for incentive-based modeling and inference of attack intent, objectives, and strategies; and this project develops the first method that can predict fine-grained strategic behaviors of attackers. The significance of this research and the benefit to the public can be demonstrated to certain extent by (a) the severe threat of cyber attacks to the critical infrastructures of the nation, including many infrastructures overseen by the Department of Energy, (b) the importance of cyber security to critical infrastructure protection, and (c) the importance of cyber attack prediction to achieving cyber security.

  2. Trace Attack against Biometric Mobile Applications

    Directory of Open Access Journals (Sweden)

    Sanaa Ghouzali

    2016-01-01

    Full Text Available With the exponential increase in the dependence on mobile devices in everyday life, there is a growing concern related to privacy and security issues in the Gulf countries; therefore, it is imperative that security threats should be analyzed in detail. Mobile devices store enormous amounts of personal and financial information, unfortunately without any security. In order to secure mobile devices against different threats, biometrics has been applied and shown to be effective. However, biometric mobile applications are also vulnerable to several types of attacks that can decrease their security. Biometric information itself is considered sensitive data; for example, fingerprints can leave traces in touched objects and facial images can be captured everywhere or accessed by the attacker if the facial image is stored in the mobile device (lost or stolen. Hence, an attacker can easily forge the identity of a legitimate user and access data on a device. In this paper, the effects of a trace attack on the sensitivity of biometric mobile applications are investigated in terms of security and user privacy. Experimental results carried out on facial and fingerprint mobile authentication applications using different databases have shown that these mobile applications are vulnerable to the proposed attack, which poses a serious threat to the overall system security and user privacy.

  3. Subclinical endophthalmitis following a rooster attack.

    Science.gov (United States)

    Lekse Kovach, Jaclyn; Maguluri, Srilakshmi; Recchia, Franco M

    2006-12-01

    Ocular injury resulting from rooster attacks is rarely reported in the literature. Sadly, the target of these attacks is most often children younger than 3 years old, whose naiveté of the aggressive, territorial behavior of birds can place them at risk. Acute sequelae of these attacks can result in a lifetime of visual impairment. The possibility of a subacute or occult infection is an unusual occurrence that must always be considered. In an effort to prevent future attacks and ocular casualties, we present a case of a 12-month-old boy who suffered an open globe following a rooster attack. The open globe was emergently repaired. One week later, a white cataract was noticed on examination in the absence of systemic or ocular signs of inflammation. Traumatic endophthalmitis and lenticular abscess were suspected during examination under anesthesia. Vitrectomy, lensectomy, and injection of intravitreal antibiotics were performed. Culture of lenticular and vitreous aspirates grew alpha-streptococcus. Alpha-streptococcal endophthalmitis can result from ocular injuries caused by rooster pecking. The infection may present insidiously and without typical ocular or systemic symptoms or signs. Management is challenging and may require surgery.

  4. Modeling attacking of high skills volleyball players

    Directory of Open Access Journals (Sweden)

    Vladimir Gamaliy

    2014-12-01

    Full Text Available Purpose: to determine the model indicators of technical and tactical actions in the attack highly skilled volleyball players. Material and Methods: the study used statistical data of major international competitions: Olympic Games – 2012 World Championships – 2010, World League – 2010–2014 European Championship – 2010–2014. A total of 130 analyzed games. Methods were used: analysis and generalization of scientific and methodological literature, analysis of competitive activity highly skilled volleyball players, teacher observation, modeling technical and tactical actions in attacking highly skilled volleyball players. Results: it was found that the largest volume application of technical and tactical actions in the attack belongs to the group tactics «supple movement», whose indicator is 21,3%. The smallest amount of application belongs to the group tactics «flight level» model whose indicators is 5,4%, the efficiency of 3,4%, respectively. It is found that the power service in the jump from model parameters used in 51,6% of cases, the planning targets – 21,7% and 4,4% planning to reduce. Attacks performed with the back line, on model parameters used in the amount of 20,8% efficiency –13,7%. Conclusions: we prove that the performance of technical and tactical actions in the attack can be used as model in the control system of training and competitive process highly skilled volleyball players

  5. On the anatomy of social engineering attacks : A literature-based dissection of successful attacks

    NARCIS (Netherlands)

    Bullee, Jan-Willem; Montoya, L.; Pieters, Wolter; Junger, Marianne; Hartel, Pieter H.

    The aim of this studywas to explore the extent towhich persuasion principles are used in successful social engineering attacks. Seventy-four scenarioswere extracted from 4 books on social engineering (written by social engineers) and analysed. Each scenariowas split into attack steps, containing

  6. Attacks on public telephone networks: technologies and challenges

    Science.gov (United States)

    Kosloff, T.; Moore, Tyler; Keller, J.; Manes, Gavin W.; Shenoi, Sujeet

    2003-09-01

    Signaling System 7 (SS7) is vital to signaling and control in America's public telephone networks. This paper describes a class of attacks on SS7 networks involving the insertion of malicious signaling messages via compromised SS7 network components. Three attacks are discussed in detail: IAM flood attacks, redirection attacks and point code spoofing attacks. Depending on their scale of execution, these attacks can produce effects ranging from network congestion to service disruption. Methods for detecting these denial-of-service attacks and mitigating their effects are also presented.

  7. Cross-site scripting attacks procedure and Prevention Strategies

    Directory of Open Access Journals (Sweden)

    Wang Xijun

    2016-01-01

    Full Text Available Cross-site scripting attacks and defense has been the site of attack and defense is an important issue, this paper, the definition of cross-site scripting attacks, according to the current understanding of the chaos on the cross-site scripting, analyzes the causes and harm cross-site scripting attacks formation of attacks XXS complete process XSS attacks made a comprehensive analysis, and then for the web program includes Mobility there are cross-site scripting filter laxity given from ordinary users browse the web and web application developers two the defense cross-site scripting attacks effective strategy.

  8. Overview of DOS attacks on wireless sensor networks and experimental results for simulation of interference attacks

    Directory of Open Access Journals (Sweden)

    Željko Gavrić

    2018-01-01

    Full Text Available Wireless sensor networks are now used in various fields. The information transmitted in the wireless sensor networks is very sensitive, so the security issue is very important. DOS (denial of service attacks are a fundamental threat to the functioning of wireless sensor networks. This paper describes some of the most common DOS attacks and potential methods of protection against them. The case study shows one of the most frequent attacks on wireless sensor networks – the interference attack. In the introduction of this paper authors assume that the attack interference can cause significant obstruction of wireless sensor networks. This assumption has been proved in the case study through simulation scenario and simulation results.

  9. A taxonomy and discussion of software attack technologies

    Science.gov (United States)

    Banks, Sheila B.; Stytz, Martin R.

    2005-03-01

    Software is a complex thing. It is not an engineering artifact that springs forth from a design by simply following software coding rules; creativity and the human element are at the heart of the process. Software development is part science, part art, and part craft. Design, architecture, and coding are equally important activities and in each of these activities, errors may be introduced that lead to security vulnerabilities. Therefore, inevitably, errors enter into the code. Some of these errors are discovered during testing; however, some are not. The best way to find security errors, whether they are introduced as part of the architecture development effort or coding effort, is to automate the security testing process to the maximum extent possible and add this class of tools to the tools available, which aids in the compilation process, testing, test analysis, and software distribution. Recent technological advances, improvements in computer-generated forces (CGFs), and results in research in information assurance and software protection indicate that we can build a semi-intelligent software security testing tool. However, before we can undertake the security testing automation effort, we must understand the scope of the required testing, the security failures that need to be uncovered during testing, and the characteristics of the failures. Therefore, we undertook the research reported in the paper, which is the development of a taxonomy and a discussion of software attacks generated from the point of view of the security tester with the goal of using the taxonomy to guide the development of the knowledge base for the automated security testing tool. The representation for attacks and threat cases yielded by this research captures the strategies, tactics, and other considerations that come into play during the planning and execution of attacks upon application software. The paper is organized as follows. Section one contains an introduction to our research

  10. Counteracting Power Analysis Attacks by Masking

    Science.gov (United States)

    Oswald, Elisabeth; Mangard, Stefan

    The publication of power analysis attacks [12] has triggered a lot of research activities. On the one hand these activities have been dedicated toward the development of secure and efficient countermeasures. On the other hand also new and improved attacks have been developed. In fact, there has been a continuous arms race between designers of countermeasures and attackers. This chapter provides a brief overview of the state-of-the art in the arms race in the context of a countermeasure called masking. Masking is a popular countermeasure that has been extensively discussed in the scientific community. Numerous articles have been published that explain different types of masking and that analyze weaknesses of this countermeasure.

  11. The WOMBAT Attack Attribution Method: Some Results

    Science.gov (United States)

    Dacier, Marc; Pham, Van-Hau; Thonnard, Olivier

    In this paper, we present a new attack attribution method that has been developed within the WOMBAT project. We illustrate the method with some real-world results obtained when applying it to almost two years of attack traces collected by low interaction honeypots. This analytical method aims at identifying large scale attack phenomena composed of IP sources that are linked to the same root cause. All malicious sources involved in a same phenomenon constitute what we call a Misbehaving Cloud (MC). The paper offers an overview of the various steps the method goes through to identify these clouds, providing pointers to external references for more detailed information. Four instances of misbehaving clouds are then described in some more depth to demonstrate the meaningfulness of the concept.

  12. Security attack detection algorithm for electric power gis system based on mobile application

    Science.gov (United States)

    Zhou, Chao; Feng, Renjun; Wang, Liming; Huang, Wei; Guo, Yajuan

    2017-05-01

    Electric power GIS is one of the key information technologies to satisfy the power grid construction in China, and widely used in power grid construction planning, weather, and power distribution management. The introduction of electric power GIS based on mobile applications is an effective extension of the geographic information system that has been widely used in the electric power industry. It provides reliable, cheap and sustainable power service for the country. The accurate state estimation is the important conditions to maintain the normal operation of the electric power GIS. Recent research has shown that attackers can inject the complex false data into the power system. The injection attack of this new type of false data (load integrity attack LIA) can successfully bypass the routine detection to achieve the purpose of attack, so that the control center will make a series of wrong decision. Eventually, leading to uneven distribution of power in the grid. In order to ensure the safety of the electric power GIS system based on mobile application, it is very important to analyze the attack mechanism and propose a new type of attack, and to study the corresponding detection method and prevention strategy in the environment of electric power GIS system based on mobile application.

  13. A Novel Multiple-Bits Collision Attack Based on Double Detection with Error-Tolerant Mechanism

    Directory of Open Access Journals (Sweden)

    Ye Yuan

    2018-01-01

    Full Text Available Side-channel collision attacks are more powerful than traditional side-channel attack without knowing the leakage model or establishing the model. Most attack strategies proposed previously need quantities of power traces with high computational complexity and are sensitive to mistakes, which restricts the attack efficiency seriously. In this paper, we propose a multiple-bits side-channel collision attack based on double distance voting detection (DDVD and also an improved version, involving the error-tolerant mechanism, which can find all 120 relations among 16 key bytes when applied to AES (Advanced Encryption Standard algorithm. In addition, we compare our collision detection method called DDVD with the Euclidean distance and the correlation-enhanced collision method under different intensity of noise, which indicates that our detection technique performs better in the circumstances of noise. Furthermore, 4-bit model of our collision detection method is proven to be optimal in theory and in practice. Meanwhile the corresponding practical attack experiments are also performed on a hardware implementation of AES-128 on FPGA board successfully. Results show that our strategy needs less computation time but more traces than LDPC method and the online time for our strategy is about 90% less than CECA and 96% less than BCA with 90% success rate.

  14. A novel proposed network security management approach for cyber attacks

    International Nuclear Information System (INIS)

    Ahmed, Z.; Nazir, B.; Zafar, M.F.; Anwar, M.M.; Azam, K.; Asar, A.U.

    2007-01-01

    Network security is a discipline that focuses on securing networks from unauthorized access. Given the Escalating threats of malicious cyber attacks, modern enterprises employ multiple lines of defense. A comprehensive defense strategy against such attacks should include (I) an attack detection component that deter- mines the fact that a program is compromised, (2) an attack identification and prevention component that identifies attack packets so that one can block such packets in the future and prevents the attack from further propagation. Over the last decade, a significant amount of research has been vested in the systems that can detect cyber attacks either statically at compile time or dynamically at run time, However, not much effort is spent on automated attack packet identification or attack prevention. In this paper we present a unified solution to the problems mentioned above. We implemented this solution after the forward engineering of Open Source Security Information Management (OSSIM) system called Preventive Information Security management (PrISM) system that correlates input from different sensors so that the resulting product can automatically detect any cyber attack against it and prevents by identifying the actual attack packet(s). The PrISM was always able to detect the attacks, identify the attack packets and most often prevent by blocking the attacker's IP address to continue normal execution. There is no additional run-time performance overhead for attack prevention. (author)

  15. Playing Attack and Defense with Trusted Storage

    DEFF Research Database (Denmark)

    Gonzalez, Javier; Bonnet, Philippe; Bouganim, Luc

    2014-01-01

    It is often convenient to assume in a data management platform that one or several computing devices are trusted, specially when the goal is to provide privacy guarantees over personal data. But what does it take for a computing device to be trusted? More specifically, how can a personal device...... provide trusted storage? This is the question we tackle in this demonstration. We describe how secure devices, equipped with a trusted execution environment, differ from general purpose devices. We illustrate with our demonstration scenario, that it is much more difficult to attack a storage service...... running on a secure device, than to attack the same service running on a general purpose device....

  16. Rotational Rebound Attacks on Reduced Skein

    DEFF Research Database (Denmark)

    Khovratovich, Dmitry; Nikolić, Ivica; Rechberger, Christian

    2014-01-01

    ciphers, including the new standard SHA-3 (Keccak). The rebound attack is a start-from-the-middle approach for finding differential paths and conforming pairs in byte-oriented designs like Substitution-Permutation networks and AES. We apply our new compositional attack to the reduced version of the hash...... number of rounds. We also use neutral bits and message modification methods from the practice of collision search in MD5 and SHA-1 hash functions. These methods push the rotational property through more rounds than previous analysis suggested, and eventually establish a distinguishing property...

  17. A Distinguish Attack on COSvd Cipher

    OpenAIRE

    Mohammad Ali Orumiehchi ha; R. Mirghadri

    2007-01-01

    The COSvd Ciphers has been proposed by Filiol and others (2004). It is a strengthened version of COS stream cipher family denoted COSvd that has been adopted for at least one commercial standard. We propose a distinguish attack on this version, and prove that, it is distinguishable from a random stream. In the COSvd Cipher used one S-Box (10×8) on the final part of cipher. We focus on S-Box and use weakness this S-Box for distinguish attack. In addition, found a leak on HNLL that the sub s-bo...

  18. Attacks and infections in percolation processes

    International Nuclear Information System (INIS)

    Janssen, Hans-Karl; Stenull, Olaf

    2017-01-01

    We discuss attacks and infections at propagating fronts of percolation processes based on the extended general epidemic process. The scaling behavior of the number of the attacked and infected sites in the long time limit at the ordinary and tricritical percolation transitions is governed by specific composite operators of the field-theoretic representation of this process. We calculate corresponding critical exponents for tricritical percolation in mean-field theory and for ordinary percolation to 1-loop order. Our results agree well with the available numerical data. (paper)

  19. Attack strategies on quantum cryptographic protocols

    International Nuclear Information System (INIS)

    Schauer, S.; Suda, M.

    2006-01-01

    Full text: Quantum key distribution (QKD) and quantum authentication (QA) have been a topic of extensive research in the last 20 years. In course of that many attacks on QKD and QA protocols have been studied. Among these, Zhang, Lee and Guo presented an attack on a QKD protocol using entanglement swapping. Based on that strategy we take a look at other protocols to inspect how much information an adversary may get if he shares entanglement with either one or both parties. We will present some protocols where an adversary can even get full information about the key using entanglement. (author)

  20. MACHINE LEARNING IMPLEMENTATION FOR THE CLASSIFICATION OF ATTACKS ON WEB SYSTEMS. PART 2

    Directory of Open Access Journals (Sweden)

    K. Smirnova

    2017-11-01

    Full Text Available The possibility of applying machine learning for the classification of malicious requests to aWeb application is considered. This approach excludes the use of deterministic analysis systems (for example, expert systems,and is based on the application of a cascade of neural networks or perceptrons on an approximate model to the real humanbrain. The main idea of the work is to enable to describe complex attack vectors consisting of feature sets, abstract terms forcompiling a training sample, controlling the quality of recognition and classifying each of the layers (networks participatingin the work, with the ability to adjust not the entire network, but only a small part of it, in the training of which a mistake orinaccuracy crept in. The design of the developed network can be described as a cascaded, scalable neural network.When using neural networks to detect attacks on web systems, the issue of vectorization and normalization of features isacute. The most commonly used methods for solving these problems are not designed for the case of deliberate distortion ofthe signs of an attack.The proposed approach makes it possible to obtain a neural network that has been studied in more detail by small features,and also to eliminate the normalization issues in order to avoid deliberately bypassing the intrusion detection system. Byisolating one more group of neurons in the network and teaching it to samples containing various variants of circumvention ofthe attack classification, the developed intrusion detection system remains able to classify any types of attacks as well as theiraggregates, putting forward more stringent measures to counteract attacks. This allows you to follow the life cycle of theattack in more detail: from the starting trial attack to deliberate sophisticated attempts to bypass the system and introducemore decisive measures to actively counteract the attack, eliminating the chances of a false alarm system.

  1. Crystal structure of the complex of carboxypeptidase A with a strongly bound phosphonate in a new crystalline form: comparison with structures of other complexes.

    Science.gov (United States)

    Kim, H; Lipscomb, W N

    1990-06-12

    O-[[(1R)-[[N-(Phenylmethoxycarbonyl)-L-alanyl]amino]ethyl] hydroxyphosphinyl]-L-3-phenyllacetate [ZAAP(O)F], an analogue of (benzyloxycarbonyl)-Ala-Ala-Phe or (benzyloxycarbonyl)-Ala-Ala-phenyllactate, binds to carboxypeptidase A with great affinity (Ki = 3 pM). Similar phosphonates have been shown to be transition-state analogues of the CPA-catalyzed hydrolysis [Hanson, J. E., Kaplan, A. P., & Bartlett, P. A. (1989) Biochemistry 28, 6294-6305]. In the present study, the structure of the complex of this phosphonate with carboxypeptidase A has been determined by X-ray crystallography to a resolution of 2.0 A. The complex crystallizes in the space group P2(1)2(1)2(1) with cell dimensions a = 61.9 A, b = 67.2 A, and c = 76.2 A. The structure of the complex was solved by molecular replacement. Refinement of the structure against 20,776 unique reflections between 10.0 and 2.0 A yields a crystallographic residual of 0.193, including 140 water molecules. The two phosphinyl oxygens of the inhibitor bind to the active-site zinc at 2.2 A on the electrophilic (Arg-127) side and 3.1 A on the nucleophilic (Glu-270) side. Various features of the binding mode of this phosphonate inhibitor are consistent with the hypothesis that carboxypeptidase A catalyzed hydrolysis proceeds through a general-base mechanism in which the carbonyl carbon of the substrate is attacked by Zn-hydroxyl (or Zn-water). An unexpected feature of the bound inhibitor, the cis carbamoyl ester bond at the benzyloxycarbonyl linkage to alanine, allows the benzyloxycarbonyl phenyl ring of the inhibitor to interact favorably with Tyr-198. This complex structure is compared with previous structures of carboxypeptidase A, including the complexes with the potato inhibitor, a hydrated keto methylene substrate analogue, and a phosphonamidate inhibitor. Comparisons are also made with the complexes of thermolysin with some phosphonamidate inhibitors.

  2. How oxygen attacks [FeFe] hydrogenases from photosynthetic organisms

    Science.gov (United States)

    Stripp, Sven T.; Goldet, Gabrielle; Brandmayr, Caterina; Sanganas, Oliver; Vincent, Kylie A.; Haumann, Michael; Armstrong, Fraser A.; Happe, Thomas

    2009-01-01

    Green algae such as Chlamydomonas reinhardtii synthesize an [FeFe] hydrogenase that is highly active in hydrogen evolution. However, the extreme sensitivity of [FeFe] hydrogenases to oxygen presents a major challenge for exploiting these organisms to achieve sustainable photosynthetic hydrogen production. In this study, the mechanism of oxygen inactivation of the [FeFe] hydrogenase CrHydA1 from C. reinhardtii has been investigated. X-ray absorption spectroscopy shows that reaction with oxygen results in destruction of the [4Fe-4S] domain of the active site H-cluster while leaving the di-iron domain (2FeH) essentially intact. By protein film electrochemistry we were able to determine the order of events leading up to this destruction. Carbon monoxide, a competitive inhibitor of CrHydA1 which binds to an Fe atom of the 2FeH domain and is otherwise not known to attack FeS clusters in proteins, reacts nearly two orders of magnitude faster than oxygen and protects the enzyme against oxygen damage. These results therefore show that destruction of the [4Fe-4S] cluster is initiated by binding and reduction of oxygen at the di-iron domain—a key step that is blocked by carbon monoxide. The relatively slow attack by oxygen compared to carbon monoxide suggests that a very high level of discrimination can be achieved by subtle factors such as electronic effects (specific orbital overlap requirements) and steric constraints at the active site. PMID:19805068

  3. Investigating the Possibility to Individualize Asthma Attack Therapy Based on Attack Severity and Patient Characteristics

    Directory of Open Access Journals (Sweden)

    Sárkány Zoltán

    2016-03-01

    Full Text Available Introduction: The objective of this study was to investigate with the help of a computerized simulation model whether the treatment of an acute asthma attack can be individualized based on the severity of the attack and the characteristics of the patient. Material and Method: A stochastic lung model was used to simulate the deposition of 1 nm - 10 μm particles during a mild and a moderate asthma attack. Breathing parameters were varied to maximize deposition, and simulation results were compared with those obtained in the case of a severe asthma attack. In order to investigate the effect of height on the deposition of inhaled particles, another series of simulations was carried out with identical breathing parameters, comparing patient heights of 155 cm, 175 cm and 195 cm. Results: The optimization process yielded an increase in the maximum deposition values of around 6-7% for each type of investigated asthma attack, and the difference between attacks of different degree of severity was around 5% for both the initial and the optimized values, a higher degree of obstruction increasing the amount of deposited particles. Conclusions: Our results suggest that the individualization of asthma attack treatment cannot be based on particles of different size, as the highest deposited fraction in all three types of attacks can be obtained using 0.01 μm particles. The use of a specific set of breathing parameters yields a difference between a mild and a moderate, as well as a moderate and a severe asthma attack of around 5%.

  4. Developing a virtualised testbed environment in preparation for testing of network based attacks

    CSIR Research Space (South Africa)

    Van Heerden, RP

    2013-11-01

    Full Text Available Computer network attacks are difficult to simulate due to the damage they may cause to live networks and the complexity required simulating a useful network. We constructed a virtualised network within a vSphere ESXi environment which is able...

  5. Polymorphic Attacks and Network Topology: Application of Concepts from Natural Systems

    Science.gov (United States)

    Rangan, Prahalad

    2010-01-01

    The growing complexity of interactions between computers and networks makes the subject of network security a very interesting one. As our dependence on the services provided by computing networks grows, so does our investment in such technology. In this situation, there is a greater risk of occurrence of targeted malicious attacks on computers…

  6. On Linear Hulls, Statistical Saturation Attacks, PRESENT and a Cryptanalysis of PUFFIN

    DEFF Research Database (Denmark)

    Leander, Gregor

    2011-01-01

    which breaks the cipher for at least a quarter of the keys with a complexity less than 258. In the case of PRESENT we show that the design is sound. The design criteria are sufficient to ensure the resistance against linear attacks, taking into account the notion of linear hulls. Finally, we show...

  7. Sequential and Parallel Attack Tree Modelling

    NARCIS (Netherlands)

    Arnold, Florian; Guck, Dennis; Kumar, Rajesh; Stoelinga, Mariëlle Ida Antoinette; Koornneef, Floor; van Gulijk, Coen

    The intricacy of socio-technical systems requires a careful planning and utilisation of security resources to ensure uninterrupted, secure and reliable services. Even though many studies have been conducted to understand and model the behaviour of a potential attacker, the detection of crucial

  8. Cooperative Electronic Attack using Unmanned Air Vehicles

    National Research Council Canada - National Science Library

    Mears, Mark J

    2006-01-01

    ... that are salient in the context of cooperative control. The utility of electronic attack is described in the context of integrated air defense systems that rely on RADAR sites that act as a network to gather information about potential airborne threats...

  9. Network overload due to massive attacks

    Science.gov (United States)

    Kornbluth, Yosef; Barach, Gilad; Tuchman, Yaakov; Kadish, Benjamin; Cwilich, Gabriel; Buldyrev, Sergey V.

    2018-05-01

    We study the cascading failure of networks due to overload, using the betweenness centrality of a node as the measure of its load following the Motter and Lai model. We study the fraction of survived nodes at the end of the cascade pf as a function of the strength of the initial attack, measured by the fraction of nodes p that survive the initial attack for different values of tolerance α in random regular and Erdös-Renyi graphs. We find the existence of a first-order phase-transition line pt(α ) on a p -α plane, such that if p pt , pf is large and the giant component of the network is still present. Exactly at pt, the function pf(p ) undergoes a first-order discontinuity. We find that the line pt(α ) ends at a critical point (pc,αc) , in which the cascading failures are replaced by a second-order percolation transition. We find analytically the average betweenness of nodes with different degrees before and after the initial attack, we investigate their roles in the cascading failures, and we find a lower bound for pt(α ) . We also study the difference between localized and random attacks.

  10. Attack Classification Schema for Smart City WSNs

    Directory of Open Access Journals (Sweden)

    Victor Garcia-Font

    2017-04-01

    Full Text Available Urban areas around the world are populating their streets with wireless sensor networks (WSNs in order to feed incipient smart city IT systems with metropolitan data. In the future smart cities, WSN technology will have a massive presence in the streets, and the operation of municipal services will be based to a great extent on data gathered with this technology. However, from an information security point of view, WSNs can have failures and can be the target of many different types of attacks. Therefore, this raises concerns about the reliability of this technology in a smart city context. Traditionally, security measures in WSNs have been proposed to protect specific protocols in an environment with total control of a single network. This approach is not valid for smart cities, as multiple external providers deploy a plethora of WSNs with different security requirements. Hence, a new security perspective needs to be adopted to protect WSNs in smart cities. Considering security issues related to the deployment of WSNs as a main data source in smart cities, in this article, we propose an intrusion detection framework and an attack classification schema to assist smart city administrators to delimit the most plausible attacks and to point out the components and providers affected by incidents. We demonstrate the use of the classification schema providing a proof of concept based on a simulated selective forwarding attack affecting a parking and a sound WSN.

  11. Adversarial Feature Selection Against Evasion Attacks.

    Science.gov (United States)

    Zhang, Fei; Chan, Patrick P K; Biggio, Battista; Yeung, Daniel S; Roli, Fabio

    2016-03-01

    Pattern recognition and machine learning techniques have been increasingly adopted in adversarial settings such as spam, intrusion, and malware detection, although their security against well-crafted attacks that aim to evade detection by manipulating data at test time has not yet been thoroughly assessed. While previous work has been mainly focused on devising adversary-aware classification algorithms to counter evasion attempts, only few authors have considered the impact of using reduced feature sets on classifier security against the same attacks. An interesting, preliminary result is that classifier security to evasion may be even worsened by the application of feature selection. In this paper, we provide a more detailed investigation of this aspect, shedding some light on the security properties of feature selection against evasion attacks. Inspired by previous work on adversary-aware classifiers, we propose a novel adversary-aware feature selection model that can improve classifier security against evasion attacks, by incorporating specific assumptions on the adversary's data manipulation strategy. We focus on an efficient, wrapper-based implementation of our approach, and experimentally validate its soundness on different application examples, including spam and malware detection.

  12. Intrusion-Tolerant Replication under Attack

    Science.gov (United States)

    Kirsch, Jonathan

    2010-01-01

    Much of our critical infrastructure is controlled by large software systems whose participants are distributed across the Internet. As our dependence on these critical systems continues to grow, it becomes increasingly important that they meet strict availability and performance requirements, even in the face of malicious attacks, including those…

  13. Wrap-Attack Pack: Product Packaging Exercise

    Science.gov (United States)

    Lee, Seung Hwan; Hoffman, K. Douglas

    2016-01-01

    Although many marketing courses discuss traditional concepts pertaining to product strategy, concepts specifically relating to packaging are often glossed over. This exercise, "Wrap-Attack Pack," teaches students about the utilitarian and hedonic design elements of packaging. More specifically, the primary objective is to creatively…

  14. Social Engineering Attack Detection Model: SEADMv2

    CSIR Research Space (South Africa)

    Mouton, F

    2015-10-01

    Full Text Available link in the security chain. A social engineering attack targets this weakness by using various manipulation techniques to elicit individuals to perform sensitive requests. The field of social engineering is still in its infancy as far as formal...

  15. Attack Classification Schema for Smart City WSNs.

    Science.gov (United States)

    Garcia-Font, Victor; Garrigues, Carles; Rifà-Pous, Helena

    2017-04-05

    Urban areas around the world are populating their streets with wireless sensor networks (WSNs) in order to feed incipient smart city IT systems with metropolitan data. In the future smart cities, WSN technology will have a massive presence in the streets, and the operation of municipal services will be based to a great extent on data gathered with this technology. However, from an information security point of view, WSNs can have failures and can be the target of many different types of attacks. Therefore, this raises concerns about the reliability of this technology in a smart city context. Traditionally, security measures in WSNs have been proposed to protect specific protocols in an environment with total control of a single network. This approach is not valid for smart cities, as multiple external providers deploy a plethora of WSNs with different security requirements. Hence, a new security perspective needs to be adopted to protect WSNs in smart cities. Considering security issues related to the deployment of WSNs as a main data source in smart cities, in this article, we propose an intrusion detection framework and an attack classification schema to assist smart city administrators to delimit the most plausible attacks and to point out the components and providers affected by incidents. We demonstrate the use of the classification schema providing a proof of concept based on a simulated selective forwarding attack affecting a parking and a sound WSN.

  16. Armed Deterrence: Countering Soft Target Attacks

    Science.gov (United States)

    2016-02-06

    offer no security. With over 17,430 such geographically separated military sites across the United States, these fatal shootings by a Kuwaiti- born ...increasing trend and the carnage 4 that IS sympathizers can unleash. This coordinated attack on a concert hall, a soccer stadium, and restaurant

  17. 47 CFR 76.1612 - Personal attack.

    Science.gov (United States)

    2010-10-01

    ... Telecommunication FEDERAL COMMUNICATIONS COMMISSION (CONTINUED) BROADCAST RADIO SERVICES MULTICHANNEL VIDEO AND... issues of public importance, an attack is made upon the honesty, character, integrity, or like personal qualities of an identified person or group, the cable television system operator shall, within a reasonable...

  18. Validation Method of a Telecommunications Blackout Attack

    National Research Council Canada - National Science Library

    Amado, Joao; Nunes, Paulo

    2005-01-01

    ..., and to obtain the maximum disruptive effect over the services. The proposed method uses a top-down approach, starting on the service level and ending on the different network elements that can be identified in the end as the targets for the attack.

  19. Association between Terror Attacks and Suicide Attempts

    Science.gov (United States)

    Weizman, Tal; Yagil, Yaron; Schreiber, Shaul

    2009-01-01

    Based on Durkheim's "Control theory," we explored the association between frequency of terror attacks in Israel and the frequency of suicide attempts admitted to the Emergency Room of a major general hospital in Tel-Aviv (1999-2004). Analysis of the six-year study period as a whole revealed no significant correlation between the…

  20. Understanding How Components of Organisations Contribute to Attacks

    DEFF Research Database (Denmark)

    Gu, Min; Aslanyan, Zaruhi; Probst, Christian W.

    2016-01-01

    Attacks on organisations today explore many different layers, including buildings infrastructure, IT infrastructure, and human factor – the physical, virtual, and social layer. Identifying possible attacks, understanding their impact, and attributing their origin and contributing factors is diffi......Attacks on organisations today explore many different layers, including buildings infrastructure, IT infrastructure, and human factor – the physical, virtual, and social layer. Identifying possible attacks, understanding their impact, and attributing their origin and contributing factors...... is difficult. Recently, system models have been used for automatically identifying possible attacks on the modelled organisation. The generated attacks consider all three layers, making the contribution of building infrastructure, computer infrastructure, and humans (insiders and outsiders) explicit. However......, this contribution is only visible in the attack trees as part of the performed steps; it cannot be mapped back to the model directly since the actions usually involve several elements (attacker and targeted actor or asset). Especially for large attack trees, understanding the relations between several model...

  1. An Adaptive Approach for Defending against DDoS Attacks

    Directory of Open Access Journals (Sweden)

    Muhai Li

    2010-01-01

    Full Text Available In various network attacks, the Distributed Denial-of-Service (DDoS attack is a severe threat. In order to deal with this kind of attack in time, it is necessary to establish a special type of defense system to change strategy dynamically against attacks. In this paper, we introduce an adaptive approach, which is used for defending against DDoS attacks, based on normal traffic analysis. The approach can check DDoS attacks and adaptively adjust its configurations according to the network condition and attack severity. In order to insure the common users to visit the victim server that is being attacked, we provide a nonlinear traffic control formula for the system. Our simulation test indicates that the nonlinear control approach can prevent the malicious attack packets effectively while making legitimate traffic flows arrive at the victim.

  2. Activity Modelling and Comparative Evaluation of WSN MAC Security Attacks

    DEFF Research Database (Denmark)

    Pawar, Pranav M.; Nielsen, Rasmus Hjorth; Prasad, Neeli R.

    2012-01-01

    and initiate security attacks that disturb the normal functioning of the network in a severe manner. Such attacks affect the performance of the network by increasing the energy consumption, by reducing throughput and by inducing long delays. Of all existing WSN attacks, MAC layer attacks are considered...... the most harmful as they directly affect the available resources and thus the nodes’ energy consumption. The first endeavour of this paper is to model the activities of MAC layer security attacks to understand the flow of activities taking place when mounting the attack and when actually executing it....... The second aim of the paper is to simulate these attacks on hybrid MAC mechanisms, which shows the performance degradation of aWSN under the considered attacks. The modelling and implementation of the security attacks give an actual view of the network which can be useful in further investigating secure...

  3. Quantum chemical study of halophilic interactions. Communication 3. Non-empirical study of the ways of tetrachloromethane attack by halide ions

    International Nuclear Information System (INIS)

    Kobychev, V.B.; Vitkovskaya, N.M.; Abramov, A.V.; Timokhin, B.V.

    1999-01-01

    It has been shown by means of non-empirical calculations of model reactions between tetrachloromethane and chlorine/iodine anions that in case of attack via carbon atom according to mechanism S N 2 formation of weakly-bound CCl 4 complexes with halide ions is observed at initial state. Further transformation of the complexes is restricted by considerable potential barriers. Attack of nucleophil via chlorine atom with formation of stable complexes CCl 3 -Cl-Hlg - is preferable [ru

  4. Recovery of human remains after shark attack.

    Science.gov (United States)

    Byard, Roger W; James, Ross A; Heath, Karen J

    2006-09-01

    Two cases of fatal shark attack are reported where the only tissues recovered were fragments of lung. Case 1: An 18-year-old male who was in the sea behind a boat was observed by friends to be taken by a great white shark (Carcharodon carcharias). The shark dragged him under the water and then, with a second shark, dismembered the body. Witnesses noted a large amount of blood and unrecognizable body parts coming to the surface. The only tissues recovered despite an intensive beach and sea search were 2 fragments of lung. Case 2: A 19-year-old male was attacked by a great white shark while diving. A witness saw the shark swim away with the victim's body in its mouth. Again, despite intensive beach and sea searches, the only tissue recovered was a single piece of lung, along with pieces of wetsuit and diving equipment. These cases indicate that the only tissue to escape being consumed or lost in fatal shark attacks, where there is a significant attack with dismemberment and disruption of the integrity of the body, may be lung. The buoyancy of aerated pulmonary tissue ensures that it rises quickly to the surface, where it may be recovered by searchers soon after the attack. Aeration of the lung would be in keeping with death from trauma rather than from drowning and may be a useful marker in unwitnessed deaths to separate ante- from postmortem injury, using only relatively small amounts of tissues. Early organ recovery enhances the identification of human tissues as the extent of morphologic alterations by putrefactive processes and sea scavengers will have been minimized. DNA testing is also possible on such recovered fragments, enabling confirmation of the identity of the victim.

  5. Alloys influence in ferritic steels with hydrogen attack

    International Nuclear Information System (INIS)

    Moro, L; Rey Saravia, D; Lombardich, J; Saggio, M; Juan, A; Blanco, J

    2003-01-01

    Materials exposed to a corrosive environment and high temperatures, are associated with a decrease of their mechanical properties and embitterment.At room temperatures atomic hydrogen diffuses easily through metals structure, it accumulates in lattice defects forming molecular hydrogen and generating cracking due to internal stresses.Under high temperatures the phenomenon is more complex.The steels in these conditions present different structures of precipitates, that the change under creep conditions period.In this work it is determined the influence of Cr and V alloys, the changes of ferritic steel resistance in a corrosive environment and high temperatures.1.25 Cr 1 Mo 0.25 V and 2.25Cr 1 Mo under different loads and temperatures previously attacked by hydrogen environment.The hydrogen is induced by the electrolytic technique, optimizing the choice of temperatures, current density, electrolyte, etc. In order to control an adequate cathode charge, a follow up procedure is carried out by electronic barrier microscopy.After the attack, the material is settled at room temperatures for certain period of time, to allow the hydrogen to leave and evaluate the residual damage.Creep by torsion assays, under constant load and temperature is used as an experimental technique.With the outcome data curves are drawn in order to study the secondary creep rate, with the applied load and temperature, determining the value of stress exponent n and the activation energy Q.Comparing to equal assays to the same ferritic steels but non attacked by hydrogen, these values allows the prediction of microstructure changes present during these tests

  6. New attacks on Wi-Fi Protected Setup

    OpenAIRE

    Hamed Mohtadi; Alireza Rahimi

    2015-01-01

    Wi-Fi Protected Setup (WPS) is a network security standard that is used to secure networks in home and office, introduced in 2006 by the Wi-Fi Alliance. It provides easier configuration setup and is used in almost all recent Wi-Fi devices. In this paper we propose two attacks on this standard. The first attack is an offline brute force attack that uses imbalance on registration protocol. This attack needs user action, but it is more efficient than previous attacks. The second attack uses weak...

  7. 1994 Attack Team Workshop: Phase II - Full-Scale Offensive Fog Attack Tests

    National Research Council Canada - National Science Library

    Scheffey, Joseph

    1997-01-01

    .... This report demonstrates the benefits of using a medium angle fog stream to control the overhead fire threat when conducting a direct attack on a growing/steady state fire where the sea of the fire is obstructed...

  8. A Framework for Attack-Resilient Industrial Control Systems : Attack Detection and Controller Reconfiguration

    OpenAIRE

    Paridari, Kaveh; O'Mahony, Niamh; Mady, Alie El-Din; Chabukswar, Rohan; Boubekeur, Menouer; Sandberg, Henrik

    2017-01-01

    Most existing industrial control systems (ICSs), such as building energy management systems (EMSs), were installed when potential security threats were only physical. With advances in connectivity, ICSs are now, typically, connected to communications networks and, as a result, can be accessed remotely. This extends the attack surface to include the potential for sophisticated cyber attacks, which can adversely impact ICS operation, resulting in service interruption, equipment damage, safety c...

  9. Attack Potential Evaluation in Desktop and Smartphone Fingerprint Sensors: Can They Be Attacked by Anyone?

    Directory of Open Access Journals (Sweden)

    Ines Goicoechea-Telleria

    2018-01-01

    Full Text Available The use of biometrics keeps growing. Every day, we use biometric recognition to unlock our phones or to have access to places such as the gym or the office, so we rely on the security manufacturers offer when protecting our privileges and private life. It is well known that it is possible to hack into a fingerprint sensor using fake fingers made of Play-Doh and other easy-to-obtain materials but to what extent? Is this true for all users or only for specialists with a deep knowledge on biometrics? Are smartphone fingerprint sensors as reliable as desktop sensors? To answer these questions, we performed 3 separate evaluations. First, we evaluated 4 desktop fingerprint sensors of different technologies by attacking them with 7 different fake finger materials. All of them were successfully attacked by an experienced attacker. Secondly, we carried out a similar test on 5 smartphones with embedded sensors using the most successful materials, which also hacked the 5 sensors. Lastly, we gathered 15 simulated attackers with no background in biometrics to create fake fingers of several materials, and they had one week to attack the fingerprint sensors of the same 5 smartphones, with the starting point of a short video with the techniques to create them. All 5 smartphones were successfully attacked by an inexperienced attacker. This paper will provide the results achieved, as well as an analysis on the attack potential of every case. All results are given following the metrics of the standard ISO/IEC 30107-3.

  10. Integrated situational awareness for cyber attack detection, analysis, and mitigation

    Science.gov (United States)

    Cheng, Yi; Sagduyu, Yalin; Deng, Julia; Li, Jason; Liu, Peng

    2012-06-01

    Real-time cyberspace situational awareness is critical for securing and protecting today's enterprise networks from various cyber threats. When a security incident occurs, network administrators and security analysts need to know what exactly has happened in the network, why it happened, and what actions or countermeasures should be taken to quickly mitigate the potential impacts. In this paper, we propose an integrated cyberspace situational awareness system for efficient cyber attack detection, analysis and mitigation in large-scale enterprise networks. Essentially, a cyberspace common operational picture will be developed, which is a multi-layer graphical model and can efficiently capture and represent the statuses, relationships, and interdependencies of various entities and elements within and among different levels of a network. Once shared among authorized users, this cyberspace common operational picture can provide an integrated view of the logical, physical, and cyber domains, and a unique visualization of disparate data sets to support decision makers. In addition, advanced analyses, such as Bayesian Network analysis, will be explored to address the information uncertainty, dynamic and complex cyber attack detection, and optimal impact mitigation issues. All the developed technologies will be further integrated into an automatic software toolkit to achieve near real-time cyberspace situational awareness and impact mitigation in large-scale computer networks.

  11. Cyber-Attacks and the Risks for CERN

    CERN Multimedia

    Computer Security Team

    2013-01-01

    In the previous Bulletin, we discussed the cyber-risks for the accelerator complex. However, looking at the broader picture, the cyber-risks for CERN are much more diverse.   Attacks can not only harm the operation of accelerators or experiments, but also impact negatively on the operation of the Organization as a whole and/or its reputation. This would not only hamper and impede our work while making us looking plain stupid, but might also make funding agencies reconsider whether their money is well invested in CERN… Examples? Sure, let’s be imaginative! What would be the consequences, if: a laptop holding sensitive CERN documents is lost or stolen, and ends up on eBay? your password is compromised and your mail account misused to send nasty messages to thousands of external mail addresses? an attacker manages to add photos of naked women/men onto a prominent CERN website, and boasts about this on Twitter? confidential documents like job application forms or passwo...

  12. Integrated approach for investigating the durability of self-consolidating concrete to sulfate attack

    Science.gov (United States)

    Bassuoni, Mohamed Tamer F.

    The growing use of self-consolidating concrete (SCC) in various infrastructure applications exposed to sulfate-rich environments necessitates conducting comprehensive research to evaluate its durability to external sulfate attack. Since the reliability and adequacy of standard sulfate immersion tests have been questioned, the current thesis introduced an integrated testing approach for assessing the durability of a wide scope of SCC mixtures to external sulfate attack. This testing approach involved progressive levels of complexity from single to multiple damage processes. A new series of sulfate attack tests involving multiple field-like parameters and combined damage mechanisms (various cations, controlled pH, wetting-drying, partial immersion, freezing-thawing, and cyclic cold-hot conditions with or without sustained flexural loading) were designed to evaluate the performance (suitability) of the SCC mixtures under various sulfate attack exposure scenarios. The main mixture design variables of SCC included the type of binder (single, binary, ternary and quaternary), air-entrainment, sand-to-aggregate mass ratio and hybrid fibre reinforcement. The comprehensive database and knowledge obtained from this research were used to develop smart models (fuzzy and neuro-fuzzy inference systems) based on artificial-intelligence to evaluate and predict the performance of the SCC mixtures under various sulfate attack exposure regimes implemented in this study. In full immersion tests involving high concentration sodium and magnesium sulfate solutions with controlled pH, the low penetrability of SCC was responsible for the high durability of specimens. Ternary and quaternary cementitious systems with or without limestone materials provided a passivating layer, with or without acid neutralization capacity, which protected SCC from severe damage in the aggressive sulfuric acid and ammonium sulfate solutions. In contrast to conclusions drawn from the sodium sulfate immersion

  13. Tofacitinib suppresses disease activity and febrile attacks in a patient with coexisting rheumatoid arthritis and familial Mediterranean fever.

    Science.gov (United States)

    Gök, Kevser; Cengiz, Gizem; Erol, Kemal; Ozgocmen, Salih

    2017-01-01

    Familial Mediterranean fever (FMF) is the most common hereditary auto-inflammatory (periodic fever) syndrome, and usually successfully treated with colchicine. However, nearly 5-10% of FMF cases are resistant or intolerant to colchicine and treatment options are highly restricted in these cases. Biologics including anakinra, canakinumab, rilonacept, etanercept, infliximab, interferon-alpha, and tocilizumab are shown to have efficacy to control FMF attacks. Tofacitinib, a Janus kinase (JAK) inhibitor, is an orally administered non-biologic disease modifying anti-rheumatic drug for the treatment of rheumatoid arthritis (RA). Herein we report a female patient with coexisting RA and colchicine resistant FMF whose FMF attacks and disease activity were completely controlled after treatment with tofacitinib, a small-molecule JAK3 inhibitor.

  14. Tofacitinib suppresses disease activity and febrile attacks in a patient with coexisting rheumatoid arthritis and familial Mediterranean fever

    Directory of Open Access Journals (Sweden)

    Kevser Gök

    2017-01-01

    Full Text Available Familial Mediterranean fever (FMF is the most common hereditary auto-inflammatory (periodic fever syndrome, and usually successfully treated with colchicine. However, nearly 5-10% of FMF cases are resistant or intolerant to colchicine and treatment options are highly restricted in these cases. Biologics including anakinra, canakinumab, rilonacept, etanercept, infliximab, interferon-alpha, and tocilizumab are shown to have efficacy to control FMF attacks. Tofacitinib, a Janus kinase (JAK inhibitor, is an orally administered non-biologic disease modifying anti-rheumatic drug for the treatment of rheumatoid arthritis (RA. Herein we report a female patient with coexisting RA and colchicine resistant FMF whose FMF attacks and disease activity were completely controlled after treatment with tofacitinib, a small-molecule JAK3 inhibitor.

  15. Tactic determinants of game practiced by middle attacker in men’s volleyball

    Directory of Open Access Journals (Sweden)

    Gustavo De Conti Teixeira Costa

    2016-07-01

    Full Text Available DOI: http://dx.doi.org/10.5007/1980-0037.2016v18n3p371   Among volleyball skills, spike is responsible for the highest number of scores, and the first tempo of attack is related to the higher incidence of score a point, by hindering the defensive opponent’s action. However, most of the studies show general results and do not specify the conditions and constraints of each attack zone. Thus, the aim of this study was analyzing the offensive game (complex I performed by the middle attacker at the 2014/2015 National men’s Brazilian Championship (Superliga. The sample wascomposed by 142 games of 12 teams, totaling 5350 receptions, setting and spikes actions. The results showed that the middle spikes occurred mostly after receptions A and B, being the most frequent attack scoring point as well as the most powerful one. Moreover, the relationship between the reception effect and setting effect was observed, showing that the best receptions influenced the setting type and the attack effect. Therefore, the middle attack had effective effect in the winning score, since it decreased the chances of opponent’s defense, due to the reduced time to defensive organization. Finally, the situational constraints delimited the middle attacker actions. Based on the above, we suggest that future studies should restrict the analysis conditions and situational constraints of each specific game situation.

  16. Information Warfare: Defining the Legal Response to An Attack

    National Research Council Canada - National Science Library

    Pottorff, James

    1999-01-01

    This paper discusses the difficulty in determining whether an information warfare attack, such as a computer virus, can be treated as an "armed attack" for purposes of national defense under the United Nations charter. As the U.S...

  17. Denial of Service Attack Techniques: Analysis, Implementation and Comparison

    Directory of Open Access Journals (Sweden)

    Khaled Elleithy

    2005-02-01

    Full Text Available A denial of service attack (DOS is any type of attack on a networking structure to disable a server from servicing its clients. Attacks range from sending millions of requests to a server in an attempt to slow it down, flooding a server with large packets of invalid data, to sending requests with an invalid or spoofed IP address. In this paper we show the implementation and analysis of three main types of attack: Ping of Death, TCP SYN Flood, and Distributed DOS. The Ping of Death attack will be simulated against a Microsoft Windows 95 computer. The TCP SYN Flood attack will be simulated against a Microsoft Windows 2000 IIS FTP Server. Distributed DOS will be demonstrated by simulating a distribution zombie program that will carry the Ping of Death attack. This paper will demonstrate the potential damage from DOS attacks and analyze the ramifications of the damage.

  18. Calcium Supplements: A Risk Factor for Heart Attack?

    Science.gov (United States)

    ... factor for heart attack? I've read that calcium supplements may increase the risk of heart attack. ... D. Some doctors think it's possible that taking calcium supplements may increase your risk of a heart ...

  19. Cyber Attacks During the War on Terrorism: A Predictive Analysis

    National Research Council Canada - National Science Library

    Vatis, Michael

    2001-01-01

    .... Just as the terrorist attacks of September 11, 2001 defied what many thought possible, cyber attacks could escalate in response to United States and allied retaliatory measures against the terrorists...

  20. A Smart Trust Management Method to Detect On-Off Attacks in the Internet of Things

    Directory of Open Access Journals (Sweden)

    Jean Caminha

    2018-01-01

    Full Text Available Internet of Things (IoT resources cooperate with themselves for requesting and providing services. In heterogeneous and complex environments, those resources must trust each other. On-Off attacks threaten the IoT trust security through nodes performing good and bad behaviors randomly, to avoid being rated as a menace. Some countermeasures demand prior levels of trust knowledge and time to classify a node behavior. In some cases, a malfunctioning node can be mismatched as an attacker. In this paper, we introduce a smart trust management method, based on machine learning and an elastic slide window technique that automatically assesses the IoT resource trust, evaluating service provider attributes. In simulated and real-world data, this method was able to identify On-Off attackers and fault nodes with a precision up to 96% and low time consumption.

  1. Using Combined One-Time Password for Prevention of Phishing Attacks

    Directory of Open Access Journals (Sweden)

    S. Nasiri

    2017-12-01

    Full Text Available Αs technologies and communications develop, more sabotaging attacks occur including phishing attacks which jeopardize users' security and critical information like their passwords and credentials. Several solutions have been proposed for existing dangers. One of which is the use of one-time passwords. This issue has remained as a main challenge and requires more extensive research. In this research, we have focused on one-time password combinations and we also have proposed solutions based on behavioral patterns which lead to significant optimizations while tending the simplicity for users. Efficiency of the proposed method has been measured through defining scenarios, modeling and simulations based on a prevention rate index. In addition, complexity coefficient of the proposed method showing the probability of unpredictability of passwords for attackers has been calculated. Ultimately, a descriptive comparison has shown that the proposed method is superior to some of the existing methods.

  2. Quantum Communication Attacks on Classical Cryptographic Protocols

    DEFF Research Database (Denmark)

    Damgård, Ivan Bjerre

    , one can show that the protocol remains secure even under such an attack. However, there are also cases where the honest players are quantum as well, even if the protocol uses classical communication. For instance, this is the case when classical multiparty computation is used as a “subroutine......In the literature on cryptographic protocols, it has been studied several times what happens if a classical protocol is attacked by a quantum adversary. Usually, this is taken to mean that the adversary runs a quantum algorithm, but communicates classically with the honest players. In several cases......” in quantum multiparty computation. Furthermore, in the future, players in a protocol may employ quantum computing simply to improve efficiency of their local computation, even if the communication is supposed to be classical. In such cases, it no longer seems clear that a quantum adversary must be limited...

  3. Two fatal tiger attacks in zoos.

    Science.gov (United States)

    Tantius, Britta; Wittschieber, Daniel; Schmidt, Sven; Rothschild, Markus A; Banaschak, Sibylle

    2016-01-01

    Two captive tiger attacks are presented that took place in Cologne and Münster zoos. Both attacks occurred when the handlers, intent on cleaning the enclosures, entered whilst the tigers accidently retained access to the location, and thus defended their territory against the perceived intruders. Both victims suffered fatal neck injuries from the bites. At Münster, colleagues managed to lure the tiger away from its victim to enable treatment, whilst the Cologne zoo tiger had to be shot in order to allow access to be gained. Whilst it was judged that human error led to the deaths of the experienced zookeepers, the investigation in Münster was closed as no third party was found to be at fault, whereas the Cologne zoo director was initially charged with being negligent. These charges were subsequently dismissed as safety regulations were found to be up to date.

  4. RISK DISCLOSURE AGAINST ATTACK ON CRITICAL INFRASTRUCTURES

    Science.gov (United States)

    Yoshida, Mamoru; Kobayashi, Kiyoshi

    This paper analyzes the government's defensive and disclosure strategies to reduce the damage caused by terrorists that attack critical infrastructures using subjective game theory. The government recognizes a terrorist as a hidden opponent and the government's decision making about the policies against terror attacks depends on the belief about the existence of terrorist. In addition, it is not necessarily true that the government and the terrorist play the common game and make their decisions. Considering these points, the paper formulates the model in which the government and the terrorist formulate the subjective games respectively, and they induce the strategies using the equilibriums of their subjective games. The paper concluded that the government's disclosure about the implementation of the countermeasure, rather than the disclosure of warning level related with the belief about the existence of terrorist, brings about the higher increment of the subjective payoffs of the government.

  5. Marine microalgae attack and feed on metazoans

    DEFF Research Database (Denmark)

    Berge, Terje; Poulsen, Louise K.; Moldrup, Morten

    2012-01-01

    Free-living microalgae from the dinoflagellate genus Karlodinium are known to formmassive blooms in eutrophic coastal waters worldwide and are often associated with fish kills. Natural bloom populations, recently shown to consist of the two mixotrophic and toxic species Karlodinium armiger...... and Karlodinium veneficum have caused fast paralysis and mortality of finfish and copepods in the laboratory, and have been associated with reduced metazooplankton biomass in-situ. Here we show that a strain of K. armiger (K-0688) immobilises the common marine copepod Acartia tonsa in a densitydependent manner...... and collectively ingests the grazer to promote its own growth rate. In contrast, four strains of K. veneficum did not attack or affect the motility and survival of the copepods. Copepod immobilisation by the K. armiger strain was fast (within 15min) and caused by attacks of swarming cells, likely through...

  6. Research About Attacks Over Cloud Environment

    Directory of Open Access Journals (Sweden)

    Li Jie

    2017-01-01

    Full Text Available Cloud computing is expected to continue expanding in the next few years and people will start to see some of the following benefits in their real lives. Security of cloud computing environments is the set of control-based technologies and policies absolute to adhere regulatory compliance rules and protect information data applications and infrastructure related with cloud use. In this paper we suggest a model to estimating the cloud computing security and test the services provided to users. The simulator NG-Cloud Next Generation Secure Cloud Storage is used and modified to administer the proposed model. This implementation achieved security functions potential attacks as defined in the proposed model. Finally we also solve some attacks over cloud computing to provide the security and safety of the cloud.

  7. Quantum Communication Attacks on Classical Cryptographic Protocols

    DEFF Research Database (Denmark)

    Damgård, Ivan Bjerre

    , one can show that the protocol remains secure even under such an attack. However, there are also cases where the honest players are quantum as well, even if the protocol uses classical communication. For instance, this is the case when classical multiparty computation is used as a “subroutine......” in quantum multiparty computation. Furthermore, in the future, players in a protocol may employ quantum computing simply to improve efficiency of their local computation, even if the communication is supposed to be classical. In such cases, it no longer seems clear that a quantum adversary must be limited......In the literature on cryptographic protocols, it has been studied several times what happens if a classical protocol is attacked by a quantum adversary. Usually, this is taken to mean that the adversary runs a quantum algorithm, but communicates classically with the honest players. In several cases...

  8. Blind Data Attack on BGP Routers

    Science.gov (United States)

    2017-03-01

    Second Reader Dr. Cynthia Irvine Chair, Cyber Academic Group iii THIS PAGE INTENTIONALLY LEFT BLANK iv ABSTRACT Transport Communication Protocol (TCP...Postgraduate School. The experience of higher learning at this institution was incredible, and I would whole-heartedly recommend it to any of my peers and...data attack packets to the victim device. Scapy is a Python library that is used to craft and send packets [28]. BGP is supported in Python through

  9. Fighting Through a Logistics Cyber Attack

    Science.gov (United States)

    2015-06-19

    cumulative cost of cyber-attacks was more than the combined global black market cost of cocaine, heroin and marijuana. These alarming figures raised...the country to its knees. The Luftwaffe was uncontested in the Battle of Britain until radar’s ability to detect inbound aircraft provided the...manifest information in IGC and provides inbound passenger manifest data to the aerial port of debarkation (APOD) and other receiving activities for

  10. Are blockchains immune to all malicious attacks?

    OpenAIRE

    Xu, Jennifer J.

    2016-01-01

    Background: In recent years, blockchain technology has attracted considerable attention. It records cryptographic transactions in a public ledger that is difficult to alter and compromise because of the distributed consensus. As a result, blockchain is believed to resist fraud and hacking. Results: This work explores the types of fraud and malicious activities that can be prevented by blockchain technology and identifies attacks to which blockchain remains vulnerable. Conclusions: This study ...

  11. An Explanation of Nakamoto's Analysis of Double-spend Attacks

    OpenAIRE

    Ozisik, A. Pinar; Levine, Brian Neil

    2017-01-01

    The fundamental attack against blockchain systems is the double-spend attack. In this tutorial, we provide a very detailed explanation of just one section of Satoshi Nakamoto's original paper where the attack's probability of success is stated. We show the derivation of the mathematics relied upon by Nakamoto to create a model of the attack. We also validate the model with a Monte Carlo simulation, and we determine which model component is not perfect.

  12. Defense response in non-genomic model species: methyl jasmonate exposure reveals the passion fruit leaves' ability to assemble a cocktail of functionally diversified Kunitz-type trypsin inhibitors and recruit two of them against papain.

    Science.gov (United States)

    Botelho-Júnior, Sylvio; Machado, Olga L T; Fernandes, Kátia V S; Lemos, Francisco J A; Perdizio, Viviane A; Oliveira, Antônia E A; Monteiro, Leandro R; Filho, Mauri L; Jacinto, Tânia

    2014-08-01

    Multiplicity of protease inhibitors induced by predators may increase the understanding of a plant's intelligent behavior toward environmental challenges. Information about defense mechanisms of non-genomic model plant passion fruit (Passiflora edulis Sims) in response to predator attack is still limited. Here, via biochemical approaches, we showed its flexibility to build-up a broad repertoire of potent Kunitz-type trypsin inhibitors (KTIs) in response to methyl jasmonate. Seven inhibitors (20-25 kDa) were purified from exposed leaves by chromatographic techniques. Interestingly, the KTIs possessed truncated Kunitz motif in their N-terminus and some of them also presented non-consensus residues. Gelatin-Native-PAGE established multiple isoforms for each inhibitor. Significant differences regarding inhibitors' activity toward trypsin and chymotrypsin were observed, indicating functional polymorphism. Despite its rarity, two of them also inhibited papain, and such bifunctionality suggests a recruiting process onto another mechanistic class of target protease (cysteine-type). All inhibitors acted strongly on midgut proteases from sugarcane borer, Diatraea saccharalis (a lepidopteran insect) while in vivo assays supported their insecticide properties. Moreover, the bifunctional inhibitors displayed activity toward midgut proteases from cowpea weevil, Callosobruchus maculatus (a coleopteran insect). Unexpectedly, all inhibitors were highly effective against midgut proteases from Aedes aegypti a dipteran insect (vector of neglected tropical diseases) opening new avenues for plant-derived PIs for vector control-oriented research. Our results reflect the KTIs' complexities in passion fruit which could be wisely exploited by influencing plant defense conditions. Therefore, the potential of passion fruit as source of bioactive compounds with diversified biotechnological application was strengthened.

  13. Fuzzy Expert System for Heart Attack Diagnosis

    Science.gov (United States)

    Hassan, Norlida; Arbaiy, Nureize; Shah, Noor Aziyan Ahmad; Afizah Afif@Afip, Zehan

    2017-08-01

    Heart attack is one of the serious illnesses and reported as the main killer disease. Early prevention is significant to reduce the risk of having the disease. The prevention efforts can be strengthen through awareness and education about risk factor and healthy lifestyle. Therefore the knowledge dissemination is needed to play role in order to distribute and educate public in health care management and disease prevention. Since the knowledge dissemination in medical is important, there is a need to develop a knowledge based system that can emulate human intelligence to assist decision making process. Thereby, this study utilized hybrid artificial intelligence (AI) techniques to develop a Fuzzy Expert System for Diagnosing Heart Attack Disease (HAD). This system integrates fuzzy logic with expert system, which helps the medical practitioner and people to predict the risk and as well as diagnosing heart attack based on given symptom. The development of HAD is expected not only providing expert knowledge but potentially become one of learning resources to help citizens to develop awareness about heart-healthy lifestyle.

  14. Iraqi violence, Saudi attack and further bombings

    Energy Technology Data Exchange (ETDEWEB)

    Anon

    2006-03-15

    Iraq moved closer to all-out civil war following an attack on the Imam Ali al-Hadi mosque in Samarra, one of Shi'i Islam's holiest shrines, on 22nd February. In the days that followed, several hundred Iraqis died in inter-communal violence. Attacks on installations close to the Basrah Oil Terminal were reported. Earlier in the month, the main oil storage facility in Kirkuk was bombed, forcing the Northern Oil Company to shut-in the 0.3 mn bpd field. Oil and electricity supplies in southern Iraq were cut by attacks on installations some 40 miles south of Baghdad. Turkey agreed to resume product exports to Iraq after a deal was agreed on repaying Iraqi debts of $1 bn to Turkish suppliers. An official Australian inquiry into illegal payments made under the UN's oil-for-food programme is to investigate allegations involving two Australian-controlled oil firms. (author)

  15. Basic Evaluation of the Newly Developed "Lias Auto P-FDP" Assay and the Influence of Plasmin-α2 Plasmin Inhibitor Complex Values on Discrepancy in the Comparison with "Lias Auto D-Dimer Neo" Assay.

    Science.gov (United States)

    Kumano, Osamu; Ieko, Masahiro; Komiyama, Yutaka; Naito, Sumiyoshi; Yoshida, Mika; Takahashi, Nobuhiko; Ohmura, Kazumasa; Hayasaki, Junki; Hayakawa, Mineji

    2018-04-01

    Laboratory determination of fibrin/fibrinogen degradation products (FDP) levels, along with that of the D-dimer, is important for assessing the fibrinolytic situation. Recently, we developed a new FDP reagent "Lias Auto P-FDP", which can detect various FDP fragments. The purpose of this study was to evaluate the basic performance of the newly developed Lias Auto P-FDP and compare it with Lias Auto D-Dimer Neo assay. The within-run precision of Lias Auto P-FDP and Lias Auto D-Dimer was determined 20 times in low and high value controls. The between-day precision was evaluated five times a day for five days. The linearity study was performed by diluting high value samples for 2 - 10-fold and 2 - 8-fold. The comparative study was performed using 172 patient samples with elevated FDP values. For the discrepancy analysis, the samples were divided into three groups by the discrepancy percentage between the FDP and D-dimer values. The groups were defined as follows: lower discrepancy group, less than -20%; no discrepancy group, -20% to 20%; upper discrepancy group, more than 20%. The coefficient of variation % (CV%) in within-run and between-day precision were within 3.8% for both FDP and the D-dimer. The correlation coefficients were more than 0.999 and the linearity was high. In the comparative study, the values of FDP were higher than that of the D-dimer in all samples. The median FDP and D-dimer values of lower discrepancy, no discrepancy, and upper discrepancy groups were 11.8, 20.3, and 51.4, and 8.0, 11.3, and 13.1, respectively. FDP showed an increasing tendency but D-Dimer showed constant values. Thus, the possible cause of discrepancy between FDP and D-dimer values were the elevated FDP values. In addition, the values of plasmin-α2 plasmin inhibitor complex (PIC) in the upper discrepancy group were higher than that of the lower and no discrepancy groups, indicating progression of fibrinolysis. In this study, we evaluated the newly developed Lias Auto P

  16. Quantitative Attack Tree Analysis via Priced Timed Automata

    NARCIS (Netherlands)

    Kumar, Rajesh; Ruijters, Enno Jozef Johannes; Stoelinga, Mariëlle Ida Antoinette; Sankaranarayanan, Sriram; Vicario, Enrico

    The success of a security attack crucially depends on the resources available to an attacker: time, budget, skill level, and risk appetite. Insight in these dependencies and the most vulnerable system parts is key to providing effective counter measures. This paper considers attack trees, one of the

  17. Pareto Efficient Solution of Attack-Defence Trees

    NARCIS (Netherlands)

    Aslanyan, Zaruhi; Nielson, Flemming

    Attack-defence trees are a promising approach for representing threat scenarios and possible countermeasures in a concise and intuitive manner. An attack-defence tree describes the interaction between an attacker and a defender, and is evaluated by assigning parameters to the nodes, such as

  18. Vulnerability Assessment by Learning Attack Specifications in Graphs

    NARCIS (Netherlands)

    Nunes Leal Franqueira, V.; Lopes, Raul H.C.

    This paper presents an evolutionary approach for learning attack specifications that describe attack scenarios. The objective is to find vulnerabilities in computer networks which minimise the cost of an attack with maximum impact. Although we focus on Insider Threat, the proposed approach applies

  19. Attacks on the AJPS Mersenne-based cryptosystem

    NARCIS (Netherlands)

    K. de Boer (Koen); L. Ducas (Léo); S. Jeffery (Stacey); R. M. de Wolf (Ronald)

    2018-01-01

    textabstractAggarwal, Joux, Prakash and Santha recently introduced a new potentially quantum-safe public-key cryptosystem, and suggested that a brute-force attack is essentially optimal against it. They consider but then dismiss both Meet-in-the-Middle attacks and LLL-based attacks. Very soon after

  20. 12 CFR 747.17 - Collateral attacks on adjudicatory proceeding.

    Science.gov (United States)

    2010-01-01

    ... 12 Banks and Banking 6 2010-01-01 2010-01-01 false Collateral attacks on adjudicatory proceeding... INVESTIGATIONS Uniform Rules of Practice and Procedure § 747.17 Collateral attacks on adjudicatory proceeding. If an interlocutory appeal or collateral attack is brought in any court concerning all or any part of an...

  1. 12 CFR 308.17 - Collateral attacks on adjudicatory proceeding.

    Science.gov (United States)

    2010-01-01

    ... 12 Banks and Banking 4 2010-01-01 2010-01-01 false Collateral attacks on adjudicatory proceeding... PRACTICE RULES OF PRACTICE AND PROCEDURE Uniform Rules of Practice and Procedure § 308.17 Collateral attacks on adjudicatory proceeding. If an interlocutory appeal or collateral attack is brought in any...

  2. 12 CFR 19.17 - Collateral attacks on adjudicatory proceeding.

    Science.gov (United States)

    2010-01-01

    ... 12 Banks and Banking 1 2010-01-01 2010-01-01 false Collateral attacks on adjudicatory proceeding... OF PRACTICE AND PROCEDURE Uniform Rules of Practice and Procedure § 19.17 Collateral attacks on adjudicatory proceeding. If an interlocutory appeal or collateral attack is brought in any court concerning all...

  3. Limit Asthma Attacks Caused by Colds or Flu

    Science.gov (United States)

    Asthma: Limit asthma attacks caused by colds or flu A cold or the flu can trigger an asthma attack. Here's why — and how to keep your sneeze ... plan. If you notice warning signs of an asthma attack — such as coughing, wheezing, chest tightness or shortness ...

  4. Link-layer Jamming Attacks on S-MAC

    NARCIS (Netherlands)

    Law, Y.W.; Hartel, Pieter H.; den Hartog, Jeremy; Havinga, Paul J.M.

    2004-01-01

    We argue that among denial-of-service (DoS) attacks, link-layer jamming is a more attractive option to attackers than radio jamming is. By exploiting the semantics of the link-layer protocol (aka MAC protocol), an attacker can achieve better efficiency than blindly jamming the radio signals alone.

  5. Link-layer jamming attacks on S-MAC

    NARCIS (Netherlands)

    Law, Y.W.; Hartel, Pieter H.; den Hartog, Jeremy; Havinga, Paul J.M.

    We argue that among denial-of-service (DoS) attacks, link-layer jamming is a more attractive option to attackers than radio jamming is. By exploiting the semantics of the link-layer protocol (aka MAC protocol), an attacker can achieve better efficiency than blindly jamming the radio signals alone.

  6. Regression Nodes: Extending attack trees with data from social sciences

    NARCIS (Netherlands)

    Bullee, Jan-Willem; Montoya, L.; Pieters, Wolter; Junger, Marianne; Hartel, Pieter H.

    In the field of security, attack trees are often used to assess security vulnerabilities probabilistically in relation to multi-step attacks. The nodes are usually connected via AND-gates, where all children must be executed, or via OR-gates, where only one action is necessary for the attack step to

  7. What Can We Learn?--The Algonquin Bear Attack.

    Science.gov (United States)

    Strickland, Dan

    1992-01-01

    Describes a bear attack in Algonquin Park in Lake Opeongo (Canada) in which a man and woman were killed. Hypothesizes that the bear deliberately preyed on its victims and concludes that the bear was physically normal. Despite this isolated attack, the chance of being attacked by a black bear when camping is virtually nonexistent. (KS)

  8. Quantitative Verification and Synthesis of Attack-Defence Scenarios Conference

    NARCIS (Netherlands)

    Aslanyan, Zaruhi; Nielson, Flemming; Parker, David

    Attack-defence trees are a powerful technique for formally evaluating attack-defence scenarios. They represent in an intuitive, graphical way the interaction between an attacker and a defender who compete in order to achieve conflicting objectives. We propose a novel framework for the formal

  9. Modeling and Analysis of Information Attack in Computer Networks

    National Research Council Canada - National Science Library

    Pepyne, David

    2003-01-01

    ... (as opposed to physical and other forms of attack) . Information based attacks are attacks that can be carried out from anywhere in the world, while sipping cappuccino at an Internet cafe' or while enjoying the comfort of a living room armchair...

  10. Remediation following a CBRN terrorist attack : domestic and international perspectives

    Energy Technology Data Exchange (ETDEWEB)

    Yanofsky, N. [Defence Research and Development Canada, Ottawa, ON (Canada)

    2005-07-01

    The risks of chemical, biological and radiological/nuclear (CBRN) agents in terrorist attacks is well recognized. Serious measures must be in place to respond to terrorist attacks that involve these agents, including cleanup of affected buildings, machinery, land, water and air. This paper describes what is expected from the science community in the development of adequate, reliable and economical decontamination methods and equipment. It also discusses improved detection methods and adequate personal protection. Cleanup after a terrorist attack has much in common with the cleanup of contaminated sites or dealing with the consequences of industrial accidents, particularly as most potential chemical terror agents are represented by toxic industrial chemicals. The major needs of organizations involved in cleanup procedures were reviewed. Issues concerning first responders, assessment of situations, information collecting and the detection of possible chemical, biological and radiological agents were discussed. The development of generic decontamination procedures and equipment was suggested, with reference to the fact that the spectrum of CBRN weapons is very broad. In addition, the development of detection systems and instruments capable of analyzing a broad range of agents was also seen as desirable. New generation instruments such as Toxic Industrial Materials (TIMs) detectors were reviewed. Guidelines for cleanup procedures and remediation efforts were examined. It was also noted that there is relatively little information available to predict the behaviour of potential agents of CBRN terrorism in a complex urban environment. By studying different complex threat scenarios, scientists, first responders and other parties can achieve a better understanding of how to optimize the deployment of their resources. Mechanical, physiochemical and biological methods of decontamination were evaluated. Issues concerning waste disposal were discussed. It was noted that the

  11. Unified communications forensics anatomy of common UC attacks

    CERN Document Server

    Grant, Nicholas Mr

    2013-01-01

    Unified Communications Forensics: Anatomy of Common UC Attacks is the first book to explain the issues and vulnerabilities and demonstrate the attacks, forensic artifacts, and countermeasures required to establish a secure (UC) environment. This book is written by leading UC experts Nicholas Grant and Joseph W. Shaw II and provides material never before found on the market, including: analysis of forensic artifacts in common UC attacks an in-depth look at established UC technologies and attack exploits hands-on understanding of UC attack vectors and associated countermeasures

  12. Enhancing collaborative intrusion detection networks against insider attacks using supervised intrusion sensitivity-based trust management model

    DEFF Research Database (Denmark)

    Li, Wenjuan; Meng, Weizhi; Kwok, Lam-For

    2017-01-01

    To defend against complex attacks, collaborative intrusion detection networks (CIDNs) have been developed to enhance the detection accuracy, which enable an IDS to collect information and learn experience from others. However, this kind of networks is vulnerable to malicious nodes which are utili......To defend against complex attacks, collaborative intrusion detection networks (CIDNs) have been developed to enhance the detection accuracy, which enable an IDS to collect information and learn experience from others. However, this kind of networks is vulnerable to malicious nodes which...... are utilized by insider attacks (e.g., betrayal attacks). In our previous research, we developed a notion of intrusion sensitivity and identified that it can help improve the detection of insider attacks, whereas it is still a challenge for these nodes to automatically assign the values. In this article, we...... of intrusion sensitivity based on expert knowledge. In the evaluation, we compare the performance of three different supervised classifiers in assigning sensitivity values and investigate our trust model under different attack scenarios and in a real wireless sensor network. Experimental results indicate...

  13. Hybrid attacks on model-based social recommender systems

    Science.gov (United States)

    Yu, Junliang; Gao, Min; Rong, Wenge; Li, Wentao; Xiong, Qingyu; Wen, Junhao

    2017-10-01

    With the growing popularity of the online social platform, the social network based approaches to recommendation emerged. However, because of the open nature of rating systems and social networks, the social recommender systems are susceptible to malicious attacks. In this paper, we present a certain novel attack, which inherits characteristics of the rating attack and the relation attack, and term it hybrid attack. Furtherly, we explore the impact of the hybrid attack on model-based social recommender systems in multiple aspects. The experimental results show that, the hybrid attack is more destructive than the rating attack in most cases. In addition, users and items with fewer ratings will be influenced more when attacked. Last but not the least, the findings suggest that spammers do not depend on the feedback links from normal users to become more powerful, the unilateral links can make the hybrid attack effective enough. Since unilateral links are much cheaper, the hybrid attack will be a great threat to model-based social recommender systems.

  14. Machine Learning Methods for Attack Detection in the Smart Grid.

    Science.gov (United States)

    Ozay, Mete; Esnaola, Inaki; Yarman Vural, Fatos Tunay; Kulkarni, Sanjeev R; Poor, H Vincent

    2016-08-01

    Attack detection problems in the smart grid are posed as statistical learning problems for different attack scenarios in which the measurements are observed in batch or online settings. In this approach, machine learning algorithms are used to classify measurements as being either secure or attacked. An attack detection framework is provided to exploit any available prior knowledge about the system and surmount constraints arising from the sparse structure of the problem in the proposed approach. Well-known batch and online learning algorithms (supervised and semisupervised) are employed with decision- and feature-level fusion to model the attack detection problem. The relationships between statistical and geometric properties of attack vectors employed in the attack scenarios and learning algorithms are analyzed to detect unobservable attacks using statistical learning methods. The proposed algorithms are examined on various IEEE test systems. Experimental analyses show that machine learning algorithms can detect attacks with performances higher than attack detection algorithms that employ state vector estimation methods in the proposed attack detection framework.

  15. Squash inhibitor family of serine proteinases

    International Nuclear Information System (INIS)

    Otlewski, J.; Krowarsch, D.

    1996-01-01

    Squash inhibitors of serine proteinases form an uniform family of small proteins. They are built of 27-33 amino-acid residues and cross-linked with three disulfide bridges. The reactive site peptide bond (P1-P1') is between residue 5 (Lys, Arg or Leu) and 6 (always Ile). High resolution X-ray structures are available for two squash inhibitors complexed with trypsin. NMR solution structures have also been determined for free inhibitors. The major structural motif is a distorted, triple-stranded antiparallel beta-sheet. A similar folding motif has been recently found in a number of proteins, including: conotoxins from fish-hunting snails, carboxypeptidase inhibitor from potato, kalata B1 polypeptide, and in some growth factors (e.g. nerve growth factor, transforming growth factor β2, platelet-derived growth factor). Squash inhibitors are highly stable and rigid proteins. They inhibit a number of serine proteinases: trypsin, plasmin, kallikrein, blood clotting factors: X a and XII a , cathepsin G. The inhibition spectrum can be much broadened if specific amino-acid substitutions are introduced, especially at residues which contact proteinase. Squash inhibitors inhibit proteinases via the standard mechanism. According to the mechanism, inhibitors are substrates which exhibit at neutral pH a high k cat /K m index for hydrolysis and resynthesis of the reactive site, and a low value of the hydrolysis constant. (author)

  16. Optimal counterterrorism and the recruitment effect of large terrorist attacks

    DEFF Research Database (Denmark)

    Jensen, Thomas

    2011-01-01

    We analyze a simple dynamic model of the interaction between terrorists and authorities. Our primary aim is to study optimal counterterrorism and its consequences when large terrorist attacks lead to a temporary increase in terrorist recruitment. First, we show that an increase in counterterrorism...... makes it more likely that terrorist cells plan small rather than large attacks and therefore may increase the probability of a successful attack. Analyzing optimal counterterrorism we see that the recruitment effect makes authorities increase the level of counterterrorism after large attacks. Therefore......, in periods following large attacks a new attack is more likely to be small compared to other periods. Finally, we analyze the long-run consequences of the recruitment effect. We show that it leads to more counterterrorism, more small attacks, and a higher sum of terrorism damage and counterterrorism costs...

  17. Adaptive optimisation-offline cyber attack on remote state estimator

    Science.gov (United States)

    Huang, Xin; Dong, Jiuxiang

    2017-10-01

    Security issues of cyber-physical systems have received increasing attentions in recent years. In this paper, deception attacks on the remote state estimator equipped with the chi-squared failure detector are considered, and it is assumed that the attacker can monitor and modify all the sensor data. A novel adaptive optimisation-offline cyber attack strategy is proposed, where using the current and previous sensor data, the attack can yield the largest estimation error covariance while ensuring to be undetected by the chi-squared monitor. From the attacker's perspective, the attack is better than the existing linear deception attacks to degrade the system performance. Finally, some numerical examples are provided to demonstrate theoretical results.

  18. Neuroradiological study of transient ischemic attack

    Energy Technology Data Exchange (ETDEWEB)

    Takusagawa, Yoshihiko; Fujiwara, Yasuhiro; Ichiki, Ken; Suga, Takeshi; Nishigaki, Shinichi

    1986-08-01

    Fifty-two patients with carotid TIAs and thirteen patients with vertebrobasilar TIAs were investigated by angiography and computed tomography. TIA was diagnosed by clinical symptoms in accordance with the criteria for TIA of the Joint Committee for Stroke Facilities in the U.S.A. (1974). The 65 patients with TIAs included 49 males and 16 females with average age of 63.5 years old at the initial episode of TIA. As for the diseases associated with TIA, hypertension (51 %), diabetes mellitus (15 %) and ischemic heart diseases (11 %) were the major disorders. Atrial fibrillation was observed in 2 cases. Intervals from last TIA attack to angiography were less than 7 days in 22 cases, 8 -- 30 days in 19 cases, 1 -- 4 monthes in 14 cases and more than 4 monthes in 10 cases, respectively. The cases in which angiography was done earlier after attacks displayed more abnormal findings. In 52 patients with caroted TIAs the artherosclerotic change of extracranial portion of the internal carotid artery was found in 14 cases (27 %), that of intracranial portion of the artery in 11 cases (21 %) and both lesions in 2 cases (4 %). On the other hand, in 13 patients with vertebrobasilar TIAs, this change was observed in 4 cases at the extracranival potion and in 1 case at the intracranial potion (siphon) of the internal carotid artery. Abnormal CT findings were found in 29 of 65 patients, namely 9 had ventricular dilatation and brain atrophy, 6 had cerebral infarction which was not associated with associated with symptoms of TIA. In carotid TIAs, Cerebral infarction was associated with symptoms of TIAs in 15 cases, namely 10 had a small low density area in the basal ganglia near the internal capsule and 5 had a low density area in the cortical or subcortical region. All of these 5 cases had cerebral embolism, which recanalized after attacks. (J.P.N.).

  19. Neuroradiological study of transient ischemic attack

    International Nuclear Information System (INIS)

    Takusagawa, Yoshihiko; Fujiwara, Yasuhiro; Ichiki, Ken; Suga, Takeshi; Nishigaki, Shinichi

    1986-01-01

    Fifty-two patients with carotid TIAs and thirteen patients with vertebrobasilar TIAs were investigated by angiography and computed tomography. TIA was diagnosed by clinical symptoms in accordance with the criteria for TIA of the Joint Committee for Stroke Facilities in the U.S.A. (1974). The 65 patients with TIAs included 49 males and 16 females with average age of 63.5 years old at the initial episode of TIA. As for the diseases associated with TIA, hypertension (51 %), diabetes mellitus (15 %) and ischemic heart diseases (11 %) were the major disorders. Atrial fibrillation was observed in 2 cases. Intervals from last TIA attack to angiography were less than 7 days in 22 cases, 8 ∼ 30 days in 19 cases, 1 ∼ 4 monthes in 14 cases and more than 4 monthes in 10 cases, respectively. The cases in which angiography was done earlier after attacks displayed more abnormal findings. In 52 patients with caroted TIAs the artherosclerotic change of extracranial portion of the internal carotid artery was found in 14 cases (27 %), that of intracranial portion of the artery in 11 cases (21 %) and both lesions in 2 cases (4 %). On the other hand, in 13 patients with vertebrobasilar TIAs, this change was observed in 4 cases at the extracranival potion and in 1 case at the intracranial potion (siphon) of the internal carotid artery. Abnormal CT findings were found in 29 of 65 patients, namely 9 had ventricular dilatation and brain atrophy, 6 had cerebral infarction which was not associated with associated with symptoms of TIA. In carotid TIAs, Cerebral infarction was associated with symptoms of TIAs in 15 cases, namely 10 had a small low density area in the basal ganglia near the internal capsule and 5 had a low density area in the cortical or subcortical region. All of these 5 cases had cerebral embolism, which recanalized after attacks. (J.P.N.)

  20. Cyber Attacks and Energy Infrastructures: Anticipating Risks

    International Nuclear Information System (INIS)

    Desarnaud, Gabrielle

    2017-01-01

    This study analyses the likelihood of cyber-attacks against European energy infrastructures and their potential consequences, particularly on the electricity grid. It also delivers a comparative analysis of measures taken by different European countries to protect their industries and collaborate within the European Union. The energy sector experiences an unprecedented digital transformation upsetting its activities and business models. Our energy infrastructures, sometimes more than a decade old and designed to remain functional for many years to come, now constantly interact with light digital components. The convergence of the global industrial system with the power of advanced computing and analytics reveals untapped opportunities at every step of the energy value chain. However, the introduction of digital elements in old and unprotected industrial equipment also exposes the energy industry to the cyber risk. One of the most compelling example of the type of threat the industry is facing, is the 2015 cyber-attack on the Ukraine power grid, which deprived about 200 000 people of electricity in the middle of the winter. The number and the level of technical expertise of cyber-attacks rose significantly after the discovery of the Stuxnet worm in the network of Natanz uranium enrichment site in 2010. Energy transition policies and the growing integration of renewable sources of energy will intensify this tendency, if cyber security measures are not part of the design of our future energy infrastructures. Regulators try to catch up and adapt, like in France where the authorities collaborate closely with the energy industry to set up a strict and efficient regulatory framework, and protect critical operators. This approach is adopted elsewhere in Europe, but common measures applicable to the whole European Union are essential to protect strongly interconnected energy infrastructures against a multiform threat that defies frontiers