WorldWideScience

Sample records for attack complex inhibitor

  1. Percolation of localized attack on complex networks

    CERN Document Server

    Shao, Shuai; Stanley, H Eugene; Havlin, Shlomo

    2014-01-01

    The robustness of complex networks against node failure and malicious attack has been of interest for decades, while most of the research has focused on random attack or hub-targeted attack. In many real-world scenarios, however, attacks are neither random nor hub-targeted, but localized, where a group of neighboring nodes in a network are attacked and fail. In this paper we develop a percolation framework to analytically and numerically study the robustness of complex networks against such localized attack. In particular, we investigate this robustness in Erd\\H{o}s-R\\'{e}nyi networks, random-regular networks, and scale-free networks. Our results provide insight into how to better protect networks, enhance cybersecurity, and facilitate the design of more robust infrastructures.

  2. The novel complement inhibitor human CUB and Sushi multiple domains 1 (CSMD1) protein promotes factor I-mediated degradation of C4b and C3b and inhibits the membrane attack complex assembly.

    Science.gov (United States)

    Escudero-Esparza, Astrid; Kalchishkova, Nikolina; Kurbasic, Emila; Jiang, Wen G; Blom, Anna M

    2013-12-01

    CUB and Sushi multiple domains 1 (CSMD1) is a transmembrane protein containing 15 consecutive complement control protein (CCP) domains, which are characteristic for complement inhibitors. We expressed a membrane-bound fragment of human CSMD1 composed of the 15 C-terminal CCP domains and demonstrated that it inhibits deposition of C3b by the classical pathway on the surface of Chinese hamster ovary cells by 70% at 6% serum and of C9 (component of membrane attack complex) by 90% at 1.25% serum. Furthermore, this fragment of CSMD1 served as a cofactor to factor I-mediated degradation of C3b. In all functional assays performed, well-characterized complement inhibitors were used as positive controls, whereas Coxsackie adenovirus receptor, a protein with no effect on complement, was a negative control. Moreover, attenuation of expression in human T47 breast cancer cells that express endogenous CSMD1 significantly increased C3b deposition on these cells by 45% at 8% serum compared with that for the controls. Furthermore, by expressing a soluble 17-21 CCP fragment of CSMD1, we found that CSMD1 inhibits complement by promoting factor I-mediated C4b/C3b degradation and inhibition of MAC assembly at the level of C7. Our results revealed a novel complement inhibitor for the classical and lectin pathways. PMID:23964079

  3. Modified localized attack on complex network

    Science.gov (United States)

    Dong, Gaogao; Du, Ruijin; Hao, Huifang; Tian, Lixin

    2016-01-01

    Since a shell structure contains a wealth of information, it is not only very important for understanding the transport properties of the network, but also essential to identify influential spreaders in complex networks. Nodes within each shell can be classified into two categories: protected nodes and unprotected nodes. In this paper, we propose a generalization of the localized attack, modified localized attack, which means that when a randomly chosen node (root node) is under attack, protected nodes will not be removed, but unprotected nodes in the nearest shells will fail. We numerically and analytically study the system robustness under this attack by taking an Erdös-Rényi (ER) network, a regular random (RR) network and a scale-free (SF) network as examples. Moreover, a fraction of nodes belonging to giant component S and a critical threshold q c , where S approaches to zero, are given. The result implies that increasing connection density has been found to be useful to significantly improve network robustness.

  4. Defense and attack of complex and dependent systems

    International Nuclear Information System (INIS)

    A framework is constructed for how to analyze the strategic defense of an infrastructure subject to attack by a strategic attacker. Merging operations research, reliability theory, and game theory for optimal analytical impact, the optimization program for the defender and attacker is specified. Targets can be in parallel, series, combined series-parallel, complex, k-out-of-n redundancy, independent, interdependent, and dependent. The defender and attacker determine how much to invest in defending versus attacking each of multiple targets. A target can have economic, human, and symbolic values, subjectively assessed by the defender and attacker. A contest success function determines the probability of a successful attack on each target, dependent on the investments by the defender and attacker into each target, and on characteristics of the contest. The defender minimizes the expected damage plus the defense costs. The attacker maximizes the expected damage minus the attack costs. Each agent is concerned about how his investments vary across the targets, and the impact on his utilities. Interdependent systems are analyzed where the defense and attack on one target impacts all targets. Dependent systems are analyzed applying Markov analysis and repeated games where a successful attack on one target in the first period impacts the unit costs of defense and attack, and the contest intensity, for the other target in the second period.

  5. Why cryptography should not rely on physical attack complexity

    CERN Document Server

    Krämer, Juliane

    2015-01-01

    This book presents two practical physical attacks. It shows how attackers can reveal the secret key of symmetric as well as asymmetric cryptographic algorithms based on these attacks, and presents countermeasures on the software and the hardware level that can help to prevent them in the future. Though their theory has been known for several years now, since neither attack has yet been successfully implemented in practice, they have generally not been considered a serious threat. In short, their physical attack complexity has been overestimated and the implied security threat has been underestimated. First, the book introduces the photonic side channel, which offers not only temporal resolution, but also the highest possible spatial resolution. Due to the high cost of its initial implementation, it has not been taken seriously. The work shows both simple and differential photonic side channel analyses. Then, it presents a fault attack against pairing-based cryptography. Due to the need for at least two indepe...

  6. Optimal attack strategy of complex networks based on tabu search

    Science.gov (United States)

    Deng, Ye; Wu, Jun; Tan, Yue-jin

    2016-01-01

    The problem of network disintegration has broad applications and recently has received growing attention, such as network confrontation and disintegration of harmful networks. This paper presents an optimized attack strategy model for complex networks and introduces the tabu search into the network disintegration problem to identify the optimal attack strategy, which is a heuristic optimization algorithm and rarely applied to the study of network robustness. The efficiency of the proposed solution was verified by comparing it with other attack strategies used in various model networks and real-world network. Numerical experiments suggest that our solution can improve the effect of network disintegration and that the "best" choice for node failure attacks can be identified through global searches. Our understanding of the optimal attack strategy may also shed light on a new property of the nodes within network disintegration and deserves additional study.

  7. Automatic Generation of Correlation Rules to Detect Complex Attack Scenarios

    OpenAIRE

    Godefroy, Erwan; Totel, Eric; Hurfin, Michel; Majorczyk, Frédéric

    2014-01-01

    In large distributed information systems, alert correlation systems are necessary to handle the huge amount of elementary security alerts and to identify complex multi-step attacks within the flow of low level events and alerts. In this paper, we show that, once a human expert has provided an action tree derived from an attack tree, a fully automated transformation process can generate exhaustive correlation rules that would be tedious and error prone to enumerate by hand. The transformation ...

  8. Managing Complex Battlespace Environments Using Attack the Network Methodologies

    DEFF Research Database (Denmark)

    Mitchell, Dr. William L.

    This paper examines the last 8 years of development and application of Attack the Network (AtN) intelligence methodologies for creating shared situational understanding of complex battlespace environment and the development of deliberate targeting frameworks. It will present a short history of th...

  9. Treatment response after repeated administration of C1 esterase inhibitor for successive acute hereditary angioedema attacks.

    Science.gov (United States)

    Craig, Timothy J; Bewtra, Againdra K; Hurewitz, David; Levy, Robyn; Janss, Gerti; Jacobson, Kraig W; Packer, Flint; Bernstein, Jonathan A; Rojavin, Mikhail A; Machnig, Thomas; Keinecke, Heinz-Otto; Wasserman, Richard L

    2012-01-01

    Placebo-controlled studies established the efficacy of replacement therapy with C1 esterase inhibitor (C1-INH) concentrate for treating single acute hereditary angioedema (HAE) attacks, but only limited data from prospective studies are available on repeated treatment of successive HAE attacks. This study evaluates the association between repeated treatments with 20 U/kg of C1-INH concentrate (Berinert; CSL Behring, Marburg, Germany) for HAE attacks at any body location and treatment response. In a post hoc analysis of an open-label extension study (International Multicenter Prospective Angioedema C1-INH Trial [I.M.P.A.C.T.2]), the association between repeated treatment with C1-INH and times to onset of symptom relief and complete resolution of HAE symptoms was assessed in patients who were treated for at least 15 attacks by linear regression on the ordinal attack number. Eighteen patients received C1-INH concentrate for at least 15 HAE attacks over a mean duration of 34 months. Demographic and baseline characteristics of these patients were similar to those of all patients in the study. The distribution of body locations and the intensity of HAE attacks were similar for each of the first 15 attacks and subsequent attacks. The extent of previous use of C1-INH concentrate had no effect on the time to onset of symptom relief, the time to complete resolution of HAE symptoms, or the time between attacks treated with C1-INH concentrate; the median of individual linear regression coefficients was not statistically significantly different from 0. Treatment with 20 U/kg of C1-INH concentrate provided consistent treatment response in patients treated for multiple successive HAE attacks at any body location. (Clinicaltrials.gov identifier: NCT00292981). PMID:22856636

  10. Ecallantide: a plasma kallikrein inhibitor for the treatment of acute attacks of hereditary angioedema.

    Science.gov (United States)

    Stolz, L E; Horn, P T

    2010-08-01

    Hereditary angioedema (HAE) is a debilitating, potentially fatal disease characterized by variable and unpredictable acute attacks of swelling affecting the subcutaneous tissue and mucosa. It is an autosomal dominant disorder resulting from a genetic deficiency of functional C1-esterase inhibitor. Available treatments include long-term prophylaxis, short-term prophylaxis and treatment of acute attacks. Ecallantide is a novel, specific and potent inhibitor of plasma kallikrein that was recently approved in the United States for the treatment of acute attacks of HAE in patients aged 16 years and older. In two phase III clinical trials, the subcutaneous administration of 30 mg ecallantide resulted in significantly greater symptom improvement than placebo for acute attacks of HAE. Ecallantide was generally well tolerated throughout the clinical development program. The main safety concern following ecallantide treatment is hypersensitivity reactions, including anaphylaxis. A Risk Evaluation and Management Strategy (REMS) has been implemented to minimize this risk and a long-term observational safety study is currently under way to collect more information about hypersensitivity and immunogenicity. Ecallantide represents a novel treatment option for patients with HAE. PMID:20830315

  11. Robustness of Complex Networks against Attacks Guided by Damage

    CERN Document Server

    Wang, Hui; Xu, Xiaomin; Xiao, Yanghua; Wang, Wei

    2011-01-01

    Extensive researches have been dedicated to investigating the performance of real networks and synthetic networks against random failures or intentional attack guided by degree (degree attack). Degree is one of straightforward measures to characterize the vitality of a vertex in maintaining the integrity of the network but not the only one. Damage, the decrease of the largest component size that was caused by the removal of a vertex, intuitively is a more destructive guide for intentional attack on networks since the network functionality is usually measured by the largest component size. However, it is surprising to find that little is known about behaviors of real networks or synthetic networks against intentional attack guided by damage (damage attack), in which adversaries always choose the vertex with the largest damage to attack. In this article, we dedicate our efforts to understanding damage attack and behaviors of real networks as well as synthetic networks against this attack. To this end, existing ...

  12. Analysis and visualization of large complex attack graphs for networks security

    Science.gov (United States)

    Chen, Hongda; Chen, Genshe; Blasch, Erik; Kruger, Martin; Sityar, Irma

    2007-04-01

    In this paper, we have proposed a comprehensive and innovative approach for analysis and visualization of large complex multi-step cyber attack graphs. As an automated tool for cyber attack detection, prediction, and visualization, the newly proposed method transforms large quantities of network security data into real-time actionable intelligence, which can be used to (1) provide guidance on network hardening to prevent attacks, (2) perform real-time attack event correlation during active attacks, and (3) formulate post-attack responses. We show that it is possible to visualize the complex graphs, including all possible network attack paths while still keeping complexity manageable. The proposed analysis and visualization tool provides an efficient and effective solution for predicting potential attacks upon observed intrusion evidence, as well as interactive multi-resolution views such that an analyst can first obtain high-level overviews quickly, and then drill down to specific details.

  13. Ecallantide is a novel treatment for attacks of hereditary angioedema due to C1 inhibitor deficiency

    Directory of Open Access Journals (Sweden)

    Farkas H

    2011-05-01

    Full Text Available Henriette Farkas, Lilian Varga3rd Department of Internal Medicine, Semmelweis University, Budapest, HungaryAbstract: Hereditary angioedema (HAE resulting from the deficiency of the C1 inhibitor protein is a rare disease, characterized by paroxysms of edema formation in the subcutis and in the submucosa. Edema can cause obstruction of the upper airway, which may lead to suffocation. Prompt elimination of edema is necessary to save patients from this life-threatening condition. Essentially, these edematous attacks are related to the activation of the kinin-kallikrein system and the consequent release of bradykinin. Ecallantide (known as DX-88 previously, a potent and specific inhibitor of plasma kallikrein is an innovative medicinal product. This is the only agent approved recently by the FDA for all localizations of edematous HAE attacks. Its advantages include no risk of viral contamination, high selectivity, very rapid onset of action, good tolerability, and straightforward subcutaneous administration. Owing to the risk of anaphylaxis, ecallantide should be administered by a health care professional. A postmarketing survey to improve risk-assessment and risk-minimization has been launched. The results of these studies may lead to the approval of ecallantide for self-administration.Keywords: hereditary angioedema, C1-inhibitor deficiency, treatment, bradykinin, kallikrein inhibitor, subcutaneous administration

  14. Structural basis of complement membrane attack complex formation

    Science.gov (United States)

    Serna, Marina; Giles, Joanna L.; Morgan, B. Paul; Bubeck, Doryen

    2016-02-01

    In response to complement activation, the membrane attack complex (MAC) assembles from fluid-phase proteins to form pores in lipid bilayers. MAC directly lyses pathogens by a `multi-hit' mechanism; however, sublytic MAC pores on host cells activate signalling pathways. Previous studies have described the structures of individual MAC components and subcomplexes; however, the molecular details of its assembly and mechanism of action remain unresolved. Here we report the electron cryo-microscopy structure of human MAC at subnanometre resolution. Structural analyses define the stoichiometry of the complete pore and identify a network of interaction interfaces that determine its assembly mechanism. MAC adopts a `split-washer' configuration, in contrast to the predicted closed ring observed for perforin and cholesterol-dependent cytolysins. Assembly precursors partially penetrate the lipid bilayer, resulting in an irregular β-barrel pore. Our results demonstrate how differences in symmetric and asymmetric components of the MAC underpin a molecular basis for pore formation and suggest a mechanism of action that extends beyond membrane penetration.

  15. An Anti-attack Model Based on Complex Network Theory in P2P networks

    CERN Document Server

    Peng, Hao; Zhao, Dandan; Zhang, Aixin; Li, Jianhua

    2011-01-01

    Complex network theory is a useful way to study many real systems. In this paper, an anti-attack model based on complex network theory is introduced. The mechanism of this model is based on dynamic compensation process and reverse percolation process in P2P networks. The main purpose of the paper is: (i) a dynamic compensation process can turn an attacked P2P network into a power-law (PL) network with exponential cutoff; (ii) a local healing process can restore the maximum degree of peers in an attacked P2P network to a normal level; (iii) a restoring process based on reverse percolation theory connects the fragmentary peers of an attacked P2P network together into a giant connected component. In this way, the model based on complex network theory can be effectively utilized for anti-attack and protection purposes in P2P networks.

  16. The dynamic correlation between degree and betweenness of complex network under attack

    Science.gov (United States)

    Nie, Tingyuan; Guo, Zheng; Zhao, Kun; Lu, Zhe-Ming

    2016-09-01

    Complex networks are often subjected to failure and attack. Recent work has addressed the resilience of complex networks to either random or intentional deletion of nodes or links. Here we simulate the breakdown of the small-world network and the scale-free network under node failure or attacks. We analyze and discuss the dynamic correlation between degree and betweenness in the process of attack. The simulation results show that the correlation for scale-free network obeys a power law distribution until the network collapses, while it represents irregularly for small-world network.

  17. A Robustness Model of Complex Networks with Tunable Attack Information Parameter

    Institute of Scientific and Technical Information of China (English)

    WU Jun; TAN Yue-Jin; DENG Hong-Zhong; LI Yong

    2007-01-01

    We introduce a novel model for robustness of complex with a tunable attack information parameter. The random failure and intentional attack known are the two extreme cases of our model. Based on the model, we study the robustness of complex networks under random information and preferential information, respectively. Using the generating function method, we derive the exact value of the critical removal fraction of nodes for the disintegration of networks and the size of the giant component. We show that hiding just a small fraction of nodes randomly can prevent a scale-free network from collapsing and detecting just a small fraction of nodes preferentially can destroy a scale-free network.

  18. Efficiency of attack strategies on complex model and real-world networks

    CERN Document Server

    Bellingeri, Michele; Vincenzi, Simone

    2013-01-01

    We investigated the efficiency of attack strategies to network nodes when targeting several complex model and real-world networks. We tested 5 attack strategies, 3 of which were introduced in this work for the first time, to attack 3 model (Erdos and Renyi, Barabasi and Albert preferential attachment network, and scale-free network configuration models) and 3 real networks (Gnutella peer-to-peer network, email network of the University of Rovira i Virgili, and immunoglobulin interaction network). Nodes were removed sequentially according to the importance criterion defined by the attack strategy. We used the size of the largest connected component (LCC) as a measure of network damage. We found that the efficiency of attack strategies (fraction of nodes to be deleted for a given reduction of LCC size) depends on the topology of the network, although attacks based on the number of connections of a node and betweenness centrality were often the most efficient strategies. Sequential deletion of nodes in decreasin...

  19. Heart Attack

    Science.gov (United States)

    ... having another heart attack. These medicines include: aspirin, beta blockers, statins, ACE inhibitors and fish oil. Your doctor ... have had a stent placed in your heart. Beta blockers are a group of drugs that lower the ...

  20. Bush animal attacks: management of complex injuries in a resource-limited setting

    Directory of Open Access Journals (Sweden)

    Mitchell Katrina B

    2011-12-01

    Full Text Available Abstract Introduction Though animal-related injuries and fatalities have been documented throughout the world, the variety of attacks by wild animals native to rural East Africa are less commonly described. Given the proximity of our northwestern Tanzania hospital to Lake Victoria, Lake Tanganyika, and the Serengeti National Park, and presentation of several patients attacked by bush animals and suffering a variety of complex injuries, we sought to report the pattern of attacks and surgical management in a resource-limited setting. Materials and methods Four patients who were admitted to the northwestern Tanzania tertiary referral hospital, Bugando Medical Centre (BMC, in 2010-2011 suffered attacks by different bush animals: hyena, elephant, crocodile, and vervet monkey. These patients were triaged as trauma patients in the Casualty Ward, then admitted for inpatient monitoring and treatment. Their outcomes were followed to discharge. Results The age and gender of the patients attacked was variable, though all but the pediatric patient were participating in food gathering or guarding activities in rural locations at the time of the attacks. All patients required surgical management of their injuries, which included debridement and closure of wounds, chest tube insertion, amputation, and external fixation of an extremity fracture. All patients survived and were discharged home. Discussion Though human injuries secondary to encounters with undomesticated animals such as cows, moose, and camel are reported, they often are indirect traumas resulting from road traffic collisions. Snake attacks are well documented and common. However, this series of unique bush animal attacks describes the initial and surgical management of human injuries in the resource-limited setting of the developing world. Conclusion Animal attacks are common throughout the world, but their pattern may vary in Africa throughout jungle and bush environmental settings. It is

  1. Identifying Vulnerable Nodes of Complex Networks in Cascading Failures Induced by Node-Based Attacks

    Directory of Open Access Journals (Sweden)

    Shudong Li

    2013-01-01

    Full Text Available In the research on network security, distinguishing the vulnerable components of networks is very important for protecting infrastructures systems. Here, we probe how to identify the vulnerable nodes of complex networks in cascading failures, which was ignored before. Concerned with random attack (RA and highest load attack (HL on nodes, we model cascading dynamics of complex networks. Then, we introduce four kinds of weighting methods to characterize the nodes of networks including Barabási-Albert scale-free networks (SF, Watts-Strogatz small-world networks (WS, Erdos-Renyi random networks (ER, and two real-world networks. The simulations show that, for SF networks under HL attack, the nodes with small value of the fourth kind of weight are the most vulnerable and the ones with small value of the third weight are also vulnerable. Also, the real-world autonomous system with power-law distribution verifies these findings. Moreover, for WS and ER networks under both RA and HL attack, when the nodes have low tolerant ability, the ones with small value of the fourth kind of weight are more vulnerable and also the ones with high degree are easier to break down. The results give us important theoretical basis for digging the potential safety loophole and making protection strategy.

  2. Complex polysaccharides as PCR inhibitors in feces: Helicobacter pylori model.

    OpenAIRE

    Monteiro, L; Bonnemaison, D; Vekris, A. (A.); Petry, K G; Bonnet, J; Vidal, R.; Cabrita, J; Mégraud, F.

    1997-01-01

    A model was developed to study inhibitors present in feces which prevent the use of PCR for the detection of Helicobacter pylori. A DNA fragment amplified with the same primers as H. pylori was used to spike samples before extraction by a modified QIAamp tissue method. Inhibitors, separated on an Ultrogel AcA44 column, were characterized. Inhibitors in feces are complex polysaccharides possibly originating from vegetable material in the diet.

  3. Complex polysaccharides as PCR inhibitors in feces: Helicobacter pylori model.

    Science.gov (United States)

    Monteiro, L; Bonnemaison, D; Vekris, A; Petry, K G; Bonnet, J; Vidal, R; Cabrita, J; Mégraud, F

    1997-04-01

    A model was developed to study inhibitors present in feces which prevent the use of PCR for the detection of Helicobacter pylori. A DNA fragment amplified with the same primers as H. pylori was used to spike samples before extraction by a modified QIAamp tissue method. Inhibitors, separated on an Ultrogel AcA44 column, were characterized. Inhibitors in feces are complex polysaccharides possibly originating from vegetable material in the diet. PMID:9157172

  4. Effect of the selective serotonin reuptake inhibitor fluvoxamine on CCK-4 induced panic attacks

    NARCIS (Netherlands)

    vanMegen, HJGM; Westenberg, HGM; denBoer, JA; Slaap, B; Scheepmakers, A

    1997-01-01

    Data from animal studies suggest a functional relationship between the cholecystokinin-ergic (CCK) and the serotonergic (5-HT) system. There is increasing evidence that the cholecystokinin-4 (CCK4) challenge test could be a valid experimental model for panic attacks in man. The aim of the present st

  5. Octahedral ruthenium complexes as protein kinase inhibitors

    OpenAIRE

    Li FENG

    2010-01-01

    Die vorliegende Arbeit beschäftigt sich mit einer Strategie zur Darstellung von selektiven Proteinkinaseinhibitoren unter Verwendung starrer, oktaedrischer Rutheniumkomplexe als Strukturmerkmal. Nanomolare Inhibitoren für die Proteinkinasen PAK1, MLCK und DAPK1, sowie ein picomolarer Inhibitor für die Proteinkinase Pim1 wurden entwickelt. Diese Inhibitoren weisen eine außerordentlich hohe Selektivität gegenüber den anderen ...

  6. Cobalt (III) complexes as novel matrix metalloproteinase-9 inhibitors

    International Nuclear Information System (INIS)

    We have synthesized a series of novel MMP-9 inhibitors containing cobalt(III) complexes. The synthesized cobalt(III) complexes are effective as enzyme inhibitors and the attachment of a biphenyl group enhanced the efficiency of enzyme inhibition up to 6-fold. When compared to the reported non-hydroxamate MMP inhibitors, the synthesized complexes showed comparable in vitro potency. The enzyme assay showed that the cobalt(III) complex can disrupt the zinc binding active site of MMP-9 and is proposed to work via a ligand exchange mechanism. Since histidine residues are essential for the catalytic activity of a large percentage of enzymes and zinc finger proteins, these cobalt(III) complexes can serve as a prototype inhibitor towards various zinc containing enzymes and proteins. Matrix metalloproteinases (MMPs) are a family of zinc binding endopeptidases that play crucial roles in various physiological processes and diseases such as embryogenic growth, angiogenesis, arthritis, skin ulceration, liver fibrosis and tumor metastasis. Because of their implications in a wide range of diseases, MMPs are considered as intriguing drug targets. The majority of MMP inhibitors are organic small molecules containing a hydroxamate functionality for the zinc binding group. This hydroxamate group binds to a zinc(II) center in a bidentate fashion and creates a distorted trigonal bipyramidal geometry

  7. Cobalt (III) complexes as novel matrix metalloproteinase-9 inhibitors

    Energy Technology Data Exchange (ETDEWEB)

    Lee, Jiyoun [Sungshin Women' s Univ., Seoul (Korea, Republic of)

    2012-04-15

    We have synthesized a series of novel MMP-9 inhibitors containing cobalt(III) complexes. The synthesized cobalt(III) complexes are effective as enzyme inhibitors and the attachment of a biphenyl group enhanced the efficiency of enzyme inhibition up to 6-fold. When compared to the reported non-hydroxamate MMP inhibitors, the synthesized complexes showed comparable in vitro potency. The enzyme assay showed that the cobalt(III) complex can disrupt the zinc binding active site of MMP-9 and is proposed to work via a ligand exchange mechanism. Since histidine residues are essential for the catalytic activity of a large percentage of enzymes and zinc finger proteins, these cobalt(III) complexes can serve as a prototype inhibitor towards various zinc containing enzymes and proteins. Matrix metalloproteinases (MMPs) are a family of zinc binding endopeptidases that play crucial roles in various physiological processes and diseases such as embryogenic growth, angiogenesis, arthritis, skin ulceration, liver fibrosis and tumor metastasis. Because of their implications in a wide range of diseases, MMPs are considered as intriguing drug targets. The majority of MMP inhibitors are organic small molecules containing a hydroxamate functionality for the zinc binding group. This hydroxamate group binds to a zinc(II) center in a bidentate fashion and creates a distorted trigonal bipyramidal geometry.

  8. The Levels of the Lectin Pathway Serine Protease MASP-1 and Its Complex Formation with C1 Inhibitor Are Linked to the Severity of Hereditary Angioedema

    DEFF Research Database (Denmark)

    Hansen, Cecilie Bo; Csuka, Dorottya; Munthe-Fog, Lea; Varga, Lilian; Farkas, Henriette; Hansen, Karin Møller; Koch, Claus; Skjødt, Karsten; Garred, Peter; Skjoedt, Mikkel-Ole

    2015-01-01

    C1 inhibitor (C1-INH) is known to form complexes with the lectin complement pathway serine proteases MASP-1 and MASP-2. Deficiency of C1-INH is associated with hereditary angioedema (HAE), an autosomal inherited disease characterized by swelling attacks caused by elevated levels of bradykinin. MASP...

  9. Building Damage-Resilient Dominating Sets in Complex Networks against Random and Targeted Attacks

    CERN Document Server

    Molnar, F; Szymanski, B K; Korniss, G

    2014-01-01

    We study the vulnerability of dominating sets against random and targeted node removals in complex networks. While small, cost-efficient dominating sets play a significant role in controllability and observability of these networks, a fixed and intact network structure is always implicitly assumed. We find that cost-efficiency of dominating sets optimized for small size alone comes at a price of being vulnerable to damage; domination in the remaining network can be severely disrupted, even if a small fraction of dominator nodes are lost. We develop two new methods for finding flexible dominating sets, allowing either adjustable overall resilience, or dominating set size, while maximizing the dominated fraction of the remaining network after the attack. We analyze the efficiency of each method on synthetic scale-free networks, as well as real complex networks.

  10. Structure of the poly-C9 component of the complement membrane attack complex

    Science.gov (United States)

    Dudkina, Natalya V.; Spicer, Bradley A.; Reboul, Cyril F.; Conroy, Paul J.; Lukoyanova, Natalya; Elmlund, Hans; Law, Ruby H. P.; Ekkel, Susan M.; Kondos, Stephanie C.; Goode, Robert J. A.; Ramm, Georg; Whisstock, James C.; Saibil, Helen R.; Dunstone, Michelle A.

    2016-02-01

    The membrane attack complex (MAC)/perforin-like protein complement component 9 (C9) is the major component of the MAC, a multi-protein complex that forms pores in the membrane of target pathogens. In contrast to homologous proteins such as perforin and the cholesterol-dependent cytolysins (CDCs), all of which require the membrane for oligomerisation, C9 assembles directly onto the nascent MAC from solution. However, the molecular mechanism of MAC assembly remains to be understood. Here we present the 8 Å cryo-EM structure of a soluble form of the poly-C9 component of the MAC. These data reveal a 22-fold symmetrical arrangement of C9 molecules that yield an 88-strand pore-forming β-barrel. The N-terminal thrombospondin-1 (TSP1) domain forms an unexpectedly extensive part of the oligomerisation interface, thus likely facilitating solution-based assembly. These TSP1 interactions may also explain how additional C9 subunits can be recruited to the growing MAC subsequent to membrane insertion.

  11. The classical and alternative pathways of complement activation play distinct roles in spontaneous C3 fragment deposition and membrane attack complex (MAC) formation on human B lymphocytes

    DEFF Research Database (Denmark)

    Leslie, Robert Graham Quinton; Nielsen, Claus Henrik

    2004-01-01

    The contributions of the classical (CP) and alternative (AP) pathways of complement activation to the spontaneous deposition of C3 fragments and the formation of membrane attack complexes (MAC) on human B lymphocytes, were assessed by incubating peripheral blood mononuclear cells with autologous...... serum in the absence and presence of selective inhibitors of the AP and CP, respectively. While the total amount of C3 fragments deposited was relatively unaffected by blocking either pathway individually, deposition was virtually abrogated by their combined blockade. A marked difference was observed......, however, in the nature of the fragments deposited as a result of CP and AP activation: C3b fragments deposited via the CP were extensively ( approximately 90%) converted to the terminal degradation product, C3dg, whereas about 50% of those deposited by the AP persisted as C3b/iC3b fragments. The extent of...

  12. $k$-core percolation on complex networks: Comparing random, localized and targeted attacks

    CERN Document Server

    Yuan, Xin; Stanley, H Eugene; Havlin, Shlomo

    2016-01-01

    The type of malicious attack inflicting on networks greatly influences their stability under ordinary percolation in which a node fails when it becomes disconnected from the giant component. Here we study its generalization, $k$-core percolation, in which a node fails when it loses connection to a threshold $k$ number of neighbors. We study and compare analytically and by numerical simulations of $k$-core percolation the stability of networks under random attacks (RA), localized attacks (LA) and targeted attacks (TA), respectively. By mapping a network under LA or TA into an equivalent network under RA, we find that in both single and interdependent networks, TA exerts the greatest damage to the core structure of a network. We also find that for Erd\\H{o}s-R\\'{e}nyi (ER) networks, LA and RA exert equal damage to the core structure whereas for scale-free (SF) networks, LA exerts much more damage than RA does to the core structure.

  13. k -core percolation on complex networks: Comparing random, localized, and targeted attacks

    Science.gov (United States)

    Yuan, Xin; Dai, Yang; Stanley, H. Eugene; Havlin, Shlomo

    2016-06-01

    The type of malicious attack inflicting on networks greatly influences their stability under ordinary percolation in which a node fails when it becomes disconnected from the giant component. Here we study its generalization, k -core percolation, in which a node fails when it loses connection to a threshold k number of neighbors. We study and compare analytically and by numerical simulations of k -core percolation the stability of networks under random attacks (RA), localized attacks (LA) and targeted attacks (TA), respectively. By mapping a network under LA or TA into an equivalent network under RA, we find that in both single and interdependent networks, TA exerts the greatest damage to the core structure of a network. We also find that for Erdős-Rényi (ER) networks, LA and RA exert equal damage to the core structure, whereas for scale-free (SF) networks, LA exerts much more damage than RA does to the core structure.

  14. Mathematical Attacks on RSA Cryptosystem

    Directory of Open Access Journals (Sweden)

    Imad K. Salah

    2006-01-01

    Full Text Available In this paper some of the most common attacks against Rivest, Shamir, and Adleman (RSA cryptosystem are presented. We describe the integer factoring attacks, attacks on the underlying mathematical function, as well as attacks that exploit details in implementations of the algorithm. Algorithms for each type of attacks are developed and analyzed by their complexity, memory requirements and area of usage.

  15. Recent developments in the treatment of acute abdominal and facial attacks of hereditary angioedema: focus on human C1 esterase inhibitor.

    Science.gov (United States)

    Cardona, Lourdes Pastó; Bellfill, Ramon Lleonart; Caus, Joaquim Marcoval

    2010-01-01

    Hereditary angioedema (HAE) is a potentially fatal genetic disorder typified by a deficiency (type I) or dysfunction (type II) of the C1-inhibitor (C1-INH) and characterized by swelling of the extremities, face, trunk, abdominal viscera, and upper airway. Type III is normal estrogen-sensitive C1-INH HAE. Bradykinin, the main mediator of HAE, binds to endothelial B2 receptors, increasing vascular permeability and resulting in edema. HAE management includes short- and long-term prophylaxis. For treating acute episodes, C1-INH concentrate is recommended with regression of symptoms achieved in 30-90 min. Infusions of 500-1000 U have been used in Europe for years. Two plasma-derived C1-INH concentrates have been licensed recently in the United States: Berinert(®) for treating acute attacks and Cinryze(®) for prophylaxis in adolescent/adult patients. A recombinant C1-INH that is being considered for approval (conestat alfa) exhibited significant superiority versus placebo. Ecallantide (Kalbitor(®)) is a selective kallikrein inhibitor recently licensed in the United States for treating acute attacks in patients aged >16 years. It is administered in three 10-mg subcutaneous injections with the risk of anaphylactic reactions. Icatibant (Firazyr(®)) is a bradykinin B2 receptor competitor. It is administered subcutaneously as a 30-mg injection and approved in Europe but not in the United States. PMID:23776358

  16. 86 The Efficacy and Safety of Human Plasma-derived C1-Inhibitor Concentrate Administered for the Treatment of Attacks in Pediatric Patients with Hereditary Angioedema Due to C1-Inhibitor Deficiency

    OpenAIRE

    Farkas, Henriette; Csuka, Dorottya; Zotter, Zsuzsanna; Szabó, Erika; Kelemen, Zsuzsanna; Varga, Lilian; Fejes, János; Harmat, George

    2012-01-01

    Background Hereditary angioedema due to C1-inhibitor deficiency (HAE-C1-INH) is a life-threatening, rare disease characterized by recurrent edematous attacks. In 50% of cases, the initial onset of symptoms occurs between 5 and 11 years of age. There are limited data on the emergency treatment of acute episodes in pediatric patients. Our aim was to analyze the efficacy and safety of human plasma-derived C1-INH concentrate in our pediatric patient population with HAE-C1-INH. Methods 50 pediatri...

  17. CR2-mediated activation of the complement alternative pathway results in formation of membrane attack complexes on human B lymphocytes

    DEFF Research Database (Denmark)

    Nielsen, C H; Marquart, H V; Prodinger, W M;

    2001-01-01

    Normal human B lymphocytes activate the alternative pathway of complement via complement receptor type 2 (CR2, CD21), that binds hydrolysed C3 (iC3) and thereby promotes the formation of a membrane-bound C3 convertase. We have investigated whether this might lead to the generation of a C5...... convertase and consequent formation of membrane attack complexes (MAC). Deposition of C3 fragments and MAC was assessed on human peripheral B lymphocytes in the presence of 30% autologous serum containing 4.4 mM MgCl2/20 mM EGTA, which abrogates the classical pathway of complement without affecting the...

  18. CR2-mediated activation of the complement alternative pathway results in formation of membrane attack complexes on human B lymphocytes

    DEFF Research Database (Denmark)

    Nielsen, C H; Marquart, H V; Prodinger, W M; Leslie, R G

    2001-01-01

    convertase and consequent formation of membrane attack complexes (MAC). Deposition of C3 fragments and MAC was assessed on human peripheral B lymphocytes in the presence of 30% autologous serum containing 4.4 mM MgCl2/20 mM EGTA, which abrogates the classical pathway of complement without affecting the......Normal human B lymphocytes activate the alternative pathway of complement via complement receptor type 2 (CR2, CD21), that binds hydrolysed C3 (iC3) and thereby promotes the formation of a membrane-bound C3 convertase. We have investigated whether this might lead to the generation of a C5...

  19. Stability of Dominating Sets in Complex Networks against Random and Targeted Attacks

    Science.gov (United States)

    Molnar, F.; Derzsy, N.; Szymanski, B. K.; Korniss, G.

    2014-03-01

    Minimum dominating sets (MDS) are involved in efficiently controlling and monitoring many social and technological networks. However, MDS influence over the entire network may be significantly reduced when some MDS nodes are disabled due to random breakdowns or targeted attacks against nodes in the network. We investigate the stability of domination in scale-free networks in such scenarios. We define stability as the fraction of nodes in the network that are still dominated after some nodes have been removed, either randomly, or by targeting the highest-degree nodes. We find that although the MDS is the most cost-efficient solution (requiring the least number of nodes) for reaching every node in an undamaged network, it is also very sensitive to damage. Further, we investigate alternative methods for finding dominating sets that are less efficient (more costly) than MDS but provide better stability. Finally we construct an algorithm based on greedy node selection that allows us to precisely control the balance between domination stability and cost, to achieve any desired stability at minimum cost, or the best possible stability at any given cost. Analysis of our method shows moderate improvement of domination cost efficiency against random breakdowns, but substantial improvements against targeted attacks. Supported by DARPA, DTRA, ARL NS-CTA, ARO, and ONR.

  20. 86 The Efficacy and Safety of Human Plasma-derived C1-Inhibitor Concentrate Administered for the Treatment of Attacks in Pediatric Patients with Hereditary Angioedema Due to C1-Inhibitor Deficiency

    Science.gov (United States)

    Farkas, Henriette; Csuka, Dorottya; Zotter, Zsuzsanna; Szabó, Erika; Kelemen, Zsuzsanna; Varga, Lilian; Fejes, János; Harmat, George

    2012-01-01

    Background Hereditary angioedema due to C1-inhibitor deficiency (HAE-C1-INH) is a life-threatening, rare disease characterized by recurrent edematous attacks. In 50% of cases, the initial onset of symptoms occurs between 5 and 11 years of age. There are limited data on the emergency treatment of acute episodes in pediatric patients. Our aim was to analyze the efficacy and safety of human plasma-derived C1-INH concentrate in our pediatric patient population with HAE-C1-INH. Methods 50 pediatric patients (23 boys, 27 girls; 45 HAE type I, 5 HAE type II patients) were enrolled. The follow-up period began at the time of diagnosis and ended when the patient turned 18 years old. The indications for the use of C1-INH concentrate were upper airway oedema of any severity; moderate-to-severe abdominal edema; edema of face, neck, or lips and severe edema of the extremities and trunk. Clinical and laboratory data were entered into the Hungarian HAE Registry. Results 152 attacks out of 1392 experienced by 42 patients were treated with C1-INH concentrate (28% of attacks at home and 72% at the clinic). The distribution of C1-INH-treated attacks by location was as follows: 38% subcutaneous, 32% abdominal, 30% upper airway. In all locations, the clinical symptoms were consistently relieved by 500 IU C1-INH concentrate. An additional 500 IU dose of C1-INH concentrate was required in 4 cases only. The symptoms improved within 15 to 60 minutes of drug administration. Time to complete resolution was 24 to 48 hours in subcutaneous edema, 12 to 24 hours in abdominal attacks, and less than 12 hours when the edema involved the upper airways. No progression or recurrence of the attack was observed. Repeated administration did not reduce therapeutic efficacy of the drug. Adverse events did not occur. Transmission of viral infections (HIV, HBV, HBC, Parvo virus B19) was not detected. Comparing the first and last year of follow-up, anti-C1-INH antibodies (IgA, IgG, IgM types) did not show any

  1. Structure of a membrane-attack complex/perforin (MACPF) family protein from the human gut symbiont Bacteroides thetaiotaomicron

    International Nuclear Information System (INIS)

    The crystal structure of a novel MACPF protein, which may play a role in the adaptation of commensal bacteria to host environments in the human gut, was determined and analyzed. Membrane-attack complex/perforin (MACPF) proteins are transmembrane pore-forming proteins that are important in both human immunity and the virulence of pathogens. Bacterial MACPFs are found in diverse bacterial species, including most human gut-associated Bacteroides species. The crystal structure of a bacterial MACPF-domain-containing protein BT-3439 (Bth-MACPF) from B. thetaiotaomicron, a predominant member of the mammalian intestinal microbiota, has been determined. Bth-MACPF contains a membrane-attack complex/perforin (MACPF) domain and two novel C-terminal domains that resemble ribonuclease H and interleukin 8, respectively. The entire protein adopts a flat crescent shape, characteristic of other MACPF proteins, that may be important for oligomerization. This Bth-MACPF structure provides new features and insights not observed in two previous MACPF structures. Genomic context analysis infers that Bth-MACPF may be involved in a novel protein-transport or nutrient-uptake system, suggesting an important role for these MACPF proteins, which were likely to have been inherited from eukaryotes via horizontal gene transfer, in the adaptation of commensal bacteria to the host environment

  2. Detrended Fluctuation Analysis on Correlations of Complex Networks Under Attack and Repair Strategy

    Institute of Scientific and Technical Information of China (English)

    2006-01-01

    We analyze the correlation properties of the Erdos-Rényi random graph (RG) and the Barabási-Albert scale-free network (SF) under the attack and repair strategy with detrended fluctuation analysis (DFA). The maximum degree k representing the local property of the system, shows similar scaling behaviors for random graphs and scale-free networks. The fluctuations are quite random at short time scales but display strong anticorrelation at longer time scales under the same system size N and different repair probability pre. The average degree , revealing the statistical property of the system, exhibits completely different scaling behaviors for random graphs and scale-free networks. Random graphs display long-range power-law correlations. Scale-free networks are uncorrelated at short time scales; while anticorrelated at longer time scales and the anticorrelation becoming stronger with the increase of pre.

  3. Panic Attack or Heart Attack?

    Science.gov (United States)

    Panic Attack or Heart Attack? Diagnosing heart disease in women A Healthy Hearts Guide ® Heart disease in women is often mistaken for panic attack with shortness of breath, anxiety, palpitations and indigestion. ...

  4. Complex structure of a bacterial class 2 histone deacetylase homologue with a trifluoromethylketone inhibitor

    International Nuclear Information System (INIS)

    The crystal structure of HDAH FB188 in complex with a trifluoromethylketone at 2.2 Å resolution is reported and compared to a previously determined inhibitor complex. Histone deacetylases (HDACs) have emerged as attractive targets in anticancer drug development. To date, a number of HDAC inhibitors have been developed and most of them are hydroxamic acid derivatives, typified by suberoylanilide hydroxamic acid (SAHA). Not surprisingly, structural information that can greatly enhance the design of novel HDAC inhibitors is so far only available for hydroxamic acids in complex with HDAC or HDAC-like enzymes. Here, the first structure of an enzyme complex with a nonhydroxamate HDAC inhibitor is presented. The structure of the trifluoromethyl ketone inhibitor 9,9,9-trifluoro-8-oxo-N-phenylnonanamide in complex with bacterial FB188 HDAH (histone deacetylase-like amidohydrolase from Bordetella/Alcaligenes strain FB188) has been determined. HDAH reveals high sequential and functional homology to human class 2 HDACs and a high structural homology to human class 1 HDACs. Comparison with the structure of HDAH in complex with SAHA reveals that the two inhibitors superimpose well. However, significant differences in binding to the active site of HDAH were observed. In the presented structure the O atom of the trifluoromethyl ketone moiety is within binding distance of the Zn atom of the enzyme and the F atoms participate in interactions with the enzyme, thereby involving more amino acids in enzyme–inhibitor binding

  5. Complex structure of a bacterial class 2 histone deacetylase homologue with a trifluoromethylketone inhibitor

    Energy Technology Data Exchange (ETDEWEB)

    Nielsen, Tine Kragh [Abteilung für Molekulare Strukturbiologie, Institut für Mikrobiologie und Genetik and GZMB, Justus-von-Liebig Weg 11, 37077 Göttingen (Germany); Hildmann, Christian; Riester, Daniel; Wegener, Dennis; Schwienhorst, Andreas [Abteilung für Molekulare Genetik und Präparative Molekularbiologie, Institut für Mikrobiologie und Genetik, Grisebachstrasse 8, 37077 Göttingen (Germany); Ficner, Ralf, E-mail: rficner@gwdg.de [Abteilung für Molekulare Strukturbiologie, Institut für Mikrobiologie und Genetik and GZMB, Justus-von-Liebig Weg 11, 37077 Göttingen (Germany)

    2007-04-01

    The crystal structure of HDAH FB188 in complex with a trifluoromethylketone at 2.2 Å resolution is reported and compared to a previously determined inhibitor complex. Histone deacetylases (HDACs) have emerged as attractive targets in anticancer drug development. To date, a number of HDAC inhibitors have been developed and most of them are hydroxamic acid derivatives, typified by suberoylanilide hydroxamic acid (SAHA). Not surprisingly, structural information that can greatly enhance the design of novel HDAC inhibitors is so far only available for hydroxamic acids in complex with HDAC or HDAC-like enzymes. Here, the first structure of an enzyme complex with a nonhydroxamate HDAC inhibitor is presented. The structure of the trifluoromethyl ketone inhibitor 9,9,9-trifluoro-8-oxo-N-phenylnonanamide in complex with bacterial FB188 HDAH (histone deacetylase-like amidohydrolase from Bordetella/Alcaligenes strain FB188) has been determined. HDAH reveals high sequential and functional homology to human class 2 HDACs and a high structural homology to human class 1 HDACs. Comparison with the structure of HDAH in complex with SAHA reveals that the two inhibitors superimpose well. However, significant differences in binding to the active site of HDAH were observed. In the presented structure the O atom of the trifluoromethyl ketone moiety is within binding distance of the Zn atom of the enzyme and the F atoms participate in interactions with the enzyme, thereby involving more amino acids in enzyme–inhibitor binding.

  6. Efficient reconfigurable hardware architecture for accurately computing success probability and data complexity of linear attacks

    DEFF Research Database (Denmark)

    Bogdanov, Andrey; Kavun, Elif Bilge; Tischhauser, Elmar;

    2012-01-01

    An accurate estimation of the success probability and data complexity of linear cryptanalysis is a fundamental question in symmetric cryptography. In this paper, we propose an efficient reconfigurable hardware architecture to compute the success probability and data complexity of Matsui's Algorithm...... block lengths ensures that any empirical observations are not due to differences in statistical behavior for artificially small block lengths. Rather surprisingly, we observed in previous experiments a significant deviation between the theory and practice for Matsui's Algorithm 2 for larger block sizes...

  7. DNA radiolysis in DNA-protein complex: a stochastic simulation of attack by hydroxyl radicals

    Czech Academy of Sciences Publication Activity Database

    Běgusová, Marie; Giliberto, S.; Gras, J.; Sy, D.; Charlier, M.; Spotheim Maurizot, M.

    2003-01-01

    Roč. 79, č. 6 (2003), s. 385-391. ISSN 0955-3002 R&D Projects: GA AV ČR IAA1048103 Institutional research plan: CEZ:AV0Z1048901 Keywords : radiolysis * DNA-protein complexes * hydroxyl radicals Subject RIV: BO - Biophysics Impact factor: 2.165, year: 2003

  8. Soluble form of membrane attack complex independently predicts mortality and cardiovascular events in patients with ST-elevation myocardial infarction treated with primary percutaneous coronary intervention

    DEFF Research Database (Denmark)

    Lindberg, Søren; Pedersen, Sune H; Mogelvang, Rasmus;

    2012-01-01

    The complement system is an important mediator of inflammation, which plays a pivotal role in atherosclerosis and acute myocardial infarction (AMI). Animal studies suggest that activation of the complement cascade resulting in the formation of soluble membrane attack complex (sMAC), contributes to...

  9. [Proteinase-proteinase inhibitor complex in rats under oxidative stress caused by administration of cobalt chloride].

    Science.gov (United States)

    Kaliman, P A; Samokhin, A A; Samokhina, L M

    2000-01-01

    Mechanisms of proteinase-inhibitor proteinase system response was estimated following of cobalt chloride injection. The increase proteinase activity, which led to significant decrease of alpha-2-macroglobulin (alpha-2-MG) level was established that indicated to the removal of the proteinase in complex with alpha-2-MG from the organism. Increase of alpha-1-proteinase inhibitor (alpha-1-PI) trypsin-inhibitory activity in the kidneys testify about removal of oxidative alpha-1-PI. PMID:10979565

  10. Crystal structure of a complex of human chymase with its benzimidazole derived inhibitor

    Energy Technology Data Exchange (ETDEWEB)

    Matsumoto, Yoshiyuki; Kakuda, Shinji; Koizumi, Masahiro; Mizuno, Tsuyoshi; Muroga, Yumiko; Kawamura, Takashi; Takimoto-Kamimura, Midori, E-mail: m.kamimura@teijin.co.jp [Teijin Institute for Bio-medical Research, 4-3-2 Asahigaoka, Hino, Tokyo 191-8512 (Japan)

    2013-11-01

    The crystal structure of human chymase complexed with a novel benzimidazole inhibitor, TJK002, was determined at 2.8 Å resolution. The present study shows that the benzimidazole ring of the inhibitor takes the stable stacking interaction with the protonated His57 in the catalytic domain of human chymase. The crystal structure of human chymase complexed with a novel benzimidazole inhibitor, TJK002, was determined at 2.8 Å resolution. The X-ray crystallographic study shows that the benzimidazole inhibitor forms a non-covalent interaction with the catalytic domain of human chymase. The hydrophobic fragment of the inhibitor occupies the S1 pocket. The carboxylic acid group of the inhibitor forms hydrogen bonds with the imidazole N(∊) atom of His57 and/or the O(γ) atom of Ser195 which are members of the catalytic triad. This imidazole ring of His57 induces π–π stacking to the benzene ring of the benzimidazole scaffold as P2 moiety. Fragment molecular orbital calculation of the atomic coordinates by X-ray crystallography shows that this imidazole ring of His57 could be protonated with the carboxyl group of Asp102 or hydroxyl group of Ser195 and the stacking interaction is stabilized. A new drug design strategy is proposed where the stacking to the protonated imidazole of the drug target protein with the benzimidazole scaffold inhibitor causes unpredicted potent inhibitory activity for some enzymes.

  11. Exactin: A specific inhibitor of Factor X activation by extrinsic tenase complex from the venom of Hemachatus haemachatus.

    Science.gov (United States)

    Girish, Vallerinteavide Mavelli; Kini, R Manjunatha

    2016-01-01

    Unwanted clots lead to heart attack and stroke that result in a large number of deaths. Currently available anticoagulants have some drawbacks including their non-specific actions. Therefore novel anticoagulants that target specific steps in the coagulation pathway are being sought. Here we describe the identification and characterization of a novel anticoagulant protein from the venom of Hemachatus haemachatus (African Ringhals cobra) that specifically inhibits factor X (FX) activation by the extrinsic tenase complex (ETC) and thus named as exactin. Exactin belongs to the three-finger toxin (3FTx) family, with high sequence identity to neurotoxins and low identity to the well-characterized 3FTx anticoagulants-hemextin and naniproin. It is a mixed-type inhibitor of ETC with the kinetic constants, Ki' and Ki determined as 30.62 ± 7.73 nM and 153.75 ± 17.96 nM, respectively. Exactin does not bind to the active site of factor VIIa and factor Xa based on its weak inhibition (IC50 ≫ 300 μM) to the amidolytic activities of these proteases. Exactin shows exquisite macromolecular specificity to FX activation as compared to factor IX activation by ETC. Exactin thus displays a distinct mechanism when compared to other anticoagulants targeting ETC, with its selective preference to ETC-FX [ES] complex. PMID:27558950

  12. Structures of plasmepsin II from Plasmodium falciparum in complex with two hydroxyethylamine-based inhibitors.

    Science.gov (United States)

    Recacha, Rosario; Leitans, Janis; Akopjana, Inara; Aprupe, Lilija; Trapencieris, Peteris; Jaudzems, Kristaps; Jirgensons, Aigars; Tars, Kaspars

    2015-12-01

    Plasmepsin II (PMII) is one of the ten plasmepsins (PMs) identified in the genome of Plasmodium falciparum, the causative agent of the most severe and deadliest form of malaria. Owing to the emergence of P. falciparum strains that are resistant to current antimalarial agents such as chloroquine and sulfadoxine/pyrimethamine, there is a constant pressure to find new and lasting chemotherapeutic drug therapies. Previously, the crystal structure of PMII in complex with NU655, a potent antimalarial hydroxyethylamine-based inhibitor, and the design of new compounds based on it have been reported. In the current study, two of these newly designed hydroxyethylamine-based inhibitors, PG418 and PG394, were cocrystallized with PMII and their structures were solved, analyzed and compared with that of the PMII-NU655 complex. Structural analysis of the PMII-PG418 complex revealed that the flap loop can adopt a fully closed conformation, stabilized by interactions with the inhibitor, and a fully open conformation, causing an overall expansion in the active-site cavity, which in turn causes unstable binding of the inhibitor. PG418 also stabilizes the flexible loop Gln275-Met286 of another monomer in the asymmetric unit of PMII, which is disordered in the PMII-NU655 complex structure. The crystal structure of PMII in complex with the inhibitor PG418 demonstrates the conformational flexibility of the active-site cavity of the plasmepsins. The interactions of the different moieties in the P1' position of PG418 and PG394 with Thr217 have to be taken into account in the design of new potent plasmepsin inhibitors. PMID:26625296

  13. Inhibitors

    Science.gov (United States)

    ... wrong place in the body. Immune Tolerance Induction (ITI) Therapy: The goal of ITI therapy is to stop the inhibitor reaction from ... body to accept clotting factor concentrate treatments. With ITI therapy, people receive large amounts of clotting factor ...

  14. Dermatological side effects of epidermal growth factor receptor inhibitors: ′Pride′ complex

    Directory of Open Access Journals (Sweden)

    Bhushan Madke

    2014-01-01

    Full Text Available Epidermal growth factor receptor (EGFR inhibitor therapy has become the standard treatment for non-small cell lung cancer and head neck malignancy. This class of drug comprises EGFR inhibitors (erlotinib and gefitinib and monoclonal antibody (cetuximab. Use of this class of drugs has been associated frequently with dermatological side effects termed as PRIDE complex-Papulopustules and/ or paronychia, Regulatory abnormalities of hair growth, Itching, Dryness due to EGFR inhibitors. We hereby report the cutaneous side effects of EGFR inhibitor therapy in 15 patients of lung and head/neck cancer. The major clinical findings being acneiform eruption and severe xerosis of skin. Management of these dermatological adverse effects rarely requires discontinuation of targeted therapy and can be managed symptomatically.

  15. The Levels of the Lectin Pathway Serine Protease MASP-1 and Its Complex Formation with C1 Inhibitor Are Linked to the Severity of Hereditary Angioedema.

    Science.gov (United States)

    Hansen, Cecilie Bo; Csuka, Dorottya; Munthe-Fog, Lea; Varga, Lilian; Farkas, Henriette; Hansen, Karin Møller; Koch, Claus; Skjødt, Karsten; Garred, Peter; Skjoedt, Mikkel-Ole

    2015-10-15

    C1 inhibitor (C1-INH) is known to form complexes with the lectin complement pathway serine proteases MASP-1 and MASP-2. Deficiency of C1-INH is associated with hereditary angioedema (HAE), an autosomal inherited disease characterized by swelling attacks caused by elevated levels of bradykinin. MASP-1 was shown to cleave high m.w. kininogen into bradykinin; therefore, we hypothesized that MASP-1 levels and the quantity of MASP-1/C1-INH complexes might be associated with different paraclinical and clinical outcomes of HAE. We measured MASP-1 serum concentrations and endogenous MASP-1/C1-INH complex levels in 128 HAE patients and 100 controls. Relatively high levels of pre-existing MASP-1/C1-INH complexes were observed in normal serum, and we found that both the serum levels of MASP-1 and the complex formation between MASP-1 and C1-INH were significantly reduced in HAE patients compared with matched controls (p < 0.0001). The level of MASP-1 and MASP-1/C1-INH complexes in HE patients correlated with the level of C1-INH (p = 0.0009 and p = 0.0047, respectively), the level of C4 (p = 0.0084 and p < 0.0001, respectively), and the number of attacks in the year of blood sampling (p = 0.0075 and p = 0.0058, respectively). In conclusion, we show that MASP-1/C1-INH complexes circulate in normal human blood. The levels of MASP-1 and MASP-1/C1-INH complexes are reduced in HAE patients compared with controls. Both MASP-1 and MASP-1/C1-INH complexes are related to the degree of complement C4 consumption, as well as the severity of disease. These results suggest that MASP-1 may exert a previously unrecognized role in the pathophysiology of HAE. PMID:26371246

  16. Crystal structure of two new bifunctional nonsubstrate type thrombin inhibitors complexed with human alpha-thrombin.

    Science.gov (United States)

    Féthière, J.; Tsuda, Y.; Coulombe, R.; Konishi, Y.; Cygler, M.

    1996-01-01

    The crystal structures of two new thrombin inhibitors, P498 and P500, complexed with human alpha-thrombin have been determined at 2.0 A resolution and refined to crystallographic R-factors of 0.170 and 0.169, respectively. These compounds, with picomolar binding constants, belong to a family of potent bifunctional inhibitors that bind thrombin at two remote sites: the active site and the fibrinogen recognition exosite (FRE). The inhibitors incorporate a nonsubstrate type active site binding fragment: Dansyl-Arg-(D)Pipecolic acid (Dns-Arg-(D)Pip), reminiscent of the active-site directed inhibitors MD-805 and MQPA, rendering them resistant to thrombin-induced hydrolysis. The FRE binding fragment of these inhibitors corresponds to the hirudin55-65 sequence. They differ in the chemical nature of the nonpeptidyl linker bridging these two functional activities. In both cases, the active site binding fragment is well defined in the electron density. The DnsH1, ArgH2, and (D)PipH3 groups occupy the S3, S1, and S2 subsites of thrombin, respectively, in a way similar to that observed in the thrombin-MQPA complexes. Binding in the active site of thrombin is characterized by numerous van der Waals contacts and ring-ring system interactions. Unlike in the substrate-like inhibitors, ArgH2 enters the S1 specificity pocket from the P2 position and adopts a bent conformation to make an hydrogen bond to the carboxylate of Asp189. In this noncanonical position, its carbonyl points away from the oxyanion hole, which is now occupied by well-ordered solvent molecules. The linkers fit in the groove extending from the active site to the FRE. The C-terminal fragments of both inhibitors bind in the same way as analogous FRE binding elements in previously described complexes. PMID:8762149

  17. Metabolic responses in Candida tropicalis to complex inhibitors during xylitol bioconversion.

    Science.gov (United States)

    Wang, Shizeng; Li, Hao; Fan, Xiaoguang; Zhang, Jingkun; Tang, Pingwah; Yuan, Qipeng

    2015-09-01

    During xylitol fermentation, Candida tropicalis is often inhibited by inhibitors in hemicellulose hydrolysate. The mechanisms involved in the metabolic responses to inhibitor stress and the resistances to inhibitors are still not clear. To understand the inhibition mechanisms and the metabolic responses to inhibitors, a GC/MS-based metabolomics approach was performed on C. tropicalis treated with and without complex inhibitors (CI, including furfural, phenol and acetic acid). Partial least squares discriminant analysis was used to determine the metabolic variability between CI-treated groups and control groups, and 25 metabolites were identified as possible entities responsible for the discrimination caused by inhibitors. We found that xylose uptake rate and xylitol oxidation rate were promoted by CI treatment. Metabolomics analysis showed that the flux from xylulose to pentose phosphate pathway increased, and tricarboxylic acid cycle was disturbed by CI. Moreover, the changes in levels of 1,3-propanediol, trehalose, saturated fatty acids and amino acids showed different mechanisms involved in metabolic responses to inhibitor stress. The increase of 1,3-propanediol was considered to be correlated with regulating redox balance and osmoregulation. The increase of trehalose might play a role in protein stabilization and cellular membranes protection. Saturated fatty acids could cause the decrease of membrane fluidity and make the plasma membrane rigid to maintain the integrity of plasma membrane. The deeper understanding of the inhibition mechanisms and the metabolic responses to inhibitors will provide us with more information on the metabolism regulation during xylitol bioconversion and the construction of industrial strains with inhibitor tolerance for better utilization of bioresource. PMID:26127015

  18. Crystal structures of inhibitor complexes of human T-cell leukemia virus (HTLV-1) protease

    Energy Technology Data Exchange (ETDEWEB)

    Satoh, Tadashi; Li, Mi; Nguyen, Jeffrey-Tri; Kiso, Yoshiaki; Gustchina, Alla; Wlodawer, Alexander (NCI); (Kyoto)

    2010-09-28

    Human T-cell leukemia virus type 1 (HTLV-1) is a retrovirus associated with several serious diseases, such as adult T-cell leukemia and tropical spastic paraparesis/myelopathy. For a number of years, the protease (PR) encoded by HTLV-1 has been a target for designing antiviral drugs, but that effort was hampered by limited available structural information. We report a high-resolution crystal structure of HTLV-1 PR complexed with a statine-containing inhibitor, a significant improvement over the previously available moderate-resolution structure. We also report crystal structures of the complexes of HTLV-1 PR with five different inhibitors that are more compact and more potent. A detailed study of structure-activity relationships was performed to interpret in detail the influence of the polar and hydrophobic interactions between the inhibitors and the protease.

  19. Attack surfaces

    DEFF Research Database (Denmark)

    Gruschka, Nils; Jensen, Meiko

    The new paradigm of cloud computing poses severe security risks to its adopters. In order to cope with these risks, appropriate taxonomies and classification criteria for attacks on cloud computing are required. In this work-in-progress paper we present one such taxonomy based on the notion of at...... attack surfaces of the cloud computing scenario participants. © 2010 IEEE....

  20. Heart Attack

    Science.gov (United States)

    ... a million people in the U.S. have a heart attack. About half of them die. Many people have permanent heart damage or die because they don't get ... It's important to know the symptoms of a heart attack and call 9-1-1 if someone ...

  1. Structure of a HIV-1 Protease-Inhibitor Complex determined at 1.1A resolution

    Czech Academy of Sciences Publication Activity Database

    Brynda, Jiří; Řezáčová, Pavlína; Štouračová, Renata; Fábry, Milan; Hradilek, Martin; Souček, Milan; Konvalinka, Jan; Sedláček, Juraj

    Jena : Jena, 2002, s. -. [International Conference on the crystal lization of Biological Macromolecules /9./. Jena, Německo (DE), 23.03.2002-28.03.2002] Institutional research plan: CEZ:AV0Z4055905; CEZ:AV0Z5052915 Keywords : Structure of a HIV-1 * protease * Inhibitor complex Subject RIV: EB - Genetics ; Molecular Biology

  2. Polycomb repressive complex 2 structure with inhibitor reveals a mechanism of activation and drug resistance.

    Science.gov (United States)

    Brooun, Alexei; Gajiwala, Ketan S; Deng, Ya-Li; Liu, Wei; Bolaños, Ben; Bingham, Patrick; He, You-Ai; Diehl, Wade; Grable, Nicole; Kung, Pei-Pei; Sutton, Scott; Maegley, Karen A; Yu, Xiu; Stewart, Al E

    2016-01-01

    Polycomb repressive complex 2 (PRC2) mediates gene silencing through chromatin reorganization by methylation of histone H3 lysine 27 (H3K27). Overexpression of the complex and point mutations in the individual subunits of PRC2 have been shown to contribute to tumorigenesis. Several inhibitors of the PRC2 activity have shown efficacy in EZH2-mutated lymphomas and are currently in clinical development, although the molecular basis of inhibitor recognition remains unknown. Here we report the crystal structures of the inhibitor-bound wild-type and Y641N PRC2. The structures illuminate an important role played by a stretch of 17 residues in the N-terminal region of EZH2, we call the activation loop, in the stimulation of the enzyme activity, inhibitor recognition and the potential development of the mutation-mediated drug resistance. The work presented here provides new avenues for the design and development of next-generation PRC2 inhibitors through establishment of a structure-based drug design platform. PMID:27122193

  3. Blocking of Brute Force Attack

    Directory of Open Access Journals (Sweden)

    M.Venkata Krishna Reddy

    2012-08-01

    Full Text Available A common threat Web developers face is a password-guessing attack known as a brute-force attack. A brute-force attack is an attempt to discover a password by systematically trying every possible combination of letters, numbers, and symbols until you discover the one correct combination that works. If your Web site requires user authentication, you are a good target for a brute-force attack. An attacker can always discover a password through a brute-force attack, but the downside is that it could take years to find it. Depending on the password's length and complexity, there could be trillions of possible combinations. To speed things up a bit, a brute-force attack could start with dictionary words or slightly modified dictionary words because most people will use those rather than a completely random password. These attacks are called dictionary attacks or hybrid brute-force attacks. Brute-force attacks put user accounts at risk and flood your site with unnecessary traffic. Hackers launch brute-force attacks using widely available tools that utilize wordlists and smart rule set to intelligently and automatically guess user passwords. Although such attacks are easy to detect, they are not so easy to prevent

  4. An in cellulo-derived structure of PAK4 in complex with its inhibitor Inka1

    OpenAIRE

    Baskaran, Yohendran; Ang, Khay C.; Anekal, Praju V.; Chan, Wee L.; Grimes, Jonathan M.; Manser, Ed; Robinson, Robert C.

    2015-01-01

    PAK4 is a metazoan-specific kinase acting downstream of Cdc42. Here we describe the structure of human PAK4 in complex with Inka1, a potent endogenous kinase inhibitor. Using single mammalian cells containing crystals 50 μm in length, we have determined the in cellulo crystal structure at 2.95 Å resolution, which reveals the details of how the PAK4 catalytic domain binds cellular ATP and the Inka1 inhibitor. The crystal lattice consists only of PAK4–PAK4 contacts, which form a hexagonal array...

  5. Panic Attack

    OpenAIRE

    Scantamburlo, Gabrielle; Ansseau, Marc

    2004-01-01

    Panic attacks can occur unexpectedly and in almost any situation. The present article discusses the main features of anxiety states, the approach, the management and the practice guidelines for the treatment of panic disorder. Peer reviewed

  6. Systemic effects of treatment with mTOR inhibitors in tuberous sclerosis complex: a comprehensive review.

    Science.gov (United States)

    Sadowski, K; Kotulska, K; Schwartz, R A; Jóźwiak, S

    2016-04-01

    Tuberous sclerosis complex (TSC) is a genetic multisystem disorder associated with constitutive overactivation of the mammalian target of rapamycin (mTOR) pathway and characterized by development of benign tumours in various organs. mTOR inhibitors have proven to be effective in the targeted therapy of certain TSC-associated pathologies such as subependymal giant cell astrocytomas (SEGAs) and renal angiomyolipomas (AMLs). Accumulating experimental and clinical data suggest that mTOR inhibitors might have a systemic, disease-modifying influence on affected individuals. This systematic review provides an analysis of available clinical data concerning systemic effect of mTOR inhibitors and the influence of mTOR inhibition on different manifestations of TSC in individual patients. PMID:26403211

  7. Crystal structure of the PIM2 kinase in complex with an organoruthenium inhibitor.

    Directory of Open Access Journals (Sweden)

    Alex N Bullock

    Full Text Available BACKGROUND: The serine/threonine kinase PIM2 is highly expressed in human leukemia and lymphomas and has been shown to positively regulate survival and proliferation of tumor cells. Its diverse ATP site makes PIM2 a promising target for the development of anticancer agents. To date our knowledge of catalytic domain structures of the PIM kinase family is limited to PIM1 which has been extensively studied and which shares about 50% sequence identity with PIM2. PRINCIPAL FINDINGS: Here we determined the crystal structure of PIM2 in complex with an organoruthenium complex (inhibition in sub-nanomolar level. Due to its extraordinary shape complementarity this stable organometallic compound is a highly potent inhibitor of PIM kinases. SIGNIFICANCE: The structure of PIM2 revealed several differences to PIM1 which may be explored further to generate isoform selective inhibitors. It has also demonstrated how an organometallic inhibitor can be adapted to the binding site of protein kinases to generate highly potent inhibitors. ENHANCED VERSION: This article can also be viewed as an enhanced version in which the text of the article is integrated with interactive 3D representations and animated transitions. Please note that a web plugin is required to access this enhanced functionality. Instructions for the installation and use of the web plugin are available in Text S1.

  8. A preliminary neutron crystallography on the trypsin-bovine pancreatic trypsin inhibitor complex

    International Nuclear Information System (INIS)

    Trypsin is one of serine proteases. BPTI (Bovine Pancreatic Trypsin Inhibitor) is a protein inhibitor, which binds trypsin tightly and inhibits cleavage of peptide bonds. X-ray structure determination of trypsin-BPTI complex could make clear the overview of the active site. However, information of hydrogen atoms related to catalytic mechanism has not been satisfied. In this study, the trypsin-BPTI complex structure has been determined by neutron diffraction data at 2.0 A resolution. Deuterium atoms of catalytic triad, hydration structures in the binding pocket of trypsin and hydrogen bonds were observed. We would like to discuss details of hydrogen bonds in the interface between trypsin and BPTI and the adjacent water molecules including hydrogen atoms involved in the enzymatic reaction.

  9. A preliminary neutron crystallography on the trypsin-bovine pancreatic trypsin inhibitor complex

    Energy Technology Data Exchange (ETDEWEB)

    Kawamura, K; Yamada, T; Kurihara, K; Tamada, T; Kuroki, R; Tanaka, I; Takahashi, H; Niimura, N, E-mail: niimura@mx.ibaraki.ac.jp

    2010-11-01

    Trypsin is one of serine proteases. BPTI (Bovine Pancreatic Trypsin Inhibitor) is a protein inhibitor, which binds trypsin tightly and inhibits cleavage of peptide bonds. X-ray structure determination of trypsin-BPTI complex could make clear the overview of the active site. However, information of hydrogen atoms related to catalytic mechanism has not been satisfied. In this study, the trypsin-BPTI complex structure has been determined by neutron diffraction data at 2.0 A resolution. Deuterium atoms of catalytic triad, hydration structures in the binding pocket of trypsin and hydrogen bonds were observed. We would like to discuss details of hydrogen bonds in the interface between trypsin and BPTI and the adjacent water molecules including hydrogen atoms involved in the enzymatic reaction.

  10. New carboxylate and hydroxamate inhibitors of prostaglandin-H-synthase and their metal complexes

    OpenAIRE

    Al Agha, Ahmed

    2009-01-01

    The thesis describes new carboxylate and hydroxamate inhibitors of prostaglandin-H-synthase (PGHS) as well as the synthesis and structures of metal complexes of the hydroxamates which were synthesised. This enzyme, also called cyclooxygenase (COX), has two active sites a cyclooxygenase (COX) active site which is the target for aspirin and a peroxidase (POX) active site, upon which the COX site depends. The thesis is divided in to three chapters. The first chapter describes the attempted sy...

  11. Three-dimensional structures of Drosophila melanogaster acetylcholinesterase and of its complexes with two potent inhibitors.

    OpenAIRE

    Harel, M; Kryger, G.; Rosenberry, T. L.; Mallender, W. D.; Lewis, T.; Fletcher, R. J.; Guss, J.M.; Silman, I.; Sussman, J. L.

    2000-01-01

    We have crystallized Drosophila melanogaster acetylcholinesterase and solved the structure of the native enzyme and of its complexes with two potent reversible inhibitors, 1,2,3,4-tetrahydro-N-(phenylmethyl)-9-acridinamine and 1,2,3,4-tetrahydro-N-(3-iodophenyl-methyl)-9-acridinamine--all three at 2.7 A resolution. The refined structure of D. melanogaster acetylcholinesterase is similar to that of vertebrate acetylcholinesterases, for example, human, mouse, and fish, in its overall fold, char...

  12. X-ray Structure of Gelatinase A Catalytic Domain Complexed with a Hydroxamate Inhibitor

    OpenAIRE

    Dhanaraj, Venugopal; Williams, Mark G.; Ye, Qi-Zhuang; Molina, Franck; Linda L. Johnson; Ortwine, Daniel F.; Pavlovsky, Alexander; Rubin, J. Ron; Skeean, Richard W.; White, Andy D.; Humblet, Christine; Hupe, Donald J.; Tom L Blundell

    1999-01-01

    Gelatinase A is a key enzyme in the family of matrix metalloproteinases (matrixins) that are involved in the degradation of the extracellular matrix. As this process is an integral part of tumour cell metastasis and angiogenesis, gelatinase is an important target for therapeutic intervention. The X-ray crystal structure of the gelatinase A catalytic domain (GaCD) complexed with batimastat (BB94), a hydroxamate inhibitor, shows an active site with a large S1' specificity pocket. The structure ...

  13. [A case report of hereditary angioedema and studies on the serum components of complement, C1-inactivator and proteinase inhibitors during edema attack].

    Science.gov (United States)

    Mikami, A; Kohno, M

    1987-05-01

    Sixteen years old girl was admitted because of for the past ten years' frequent edema attack and abdominal pain. Laboratory examination revealed hypocomplementemia, marked depletion of the fourth component of complement and low level of C1-inactivator. Familial studies revealed that her mother was also hypocomplementemic and in low level of C1-inactivator. Serial studies performed on the alterlation of components of complement, C1-inactivator, alpha 1-antitrypsin, antithrombin III, and alpha 2-macroglobulin during edema attack. The fourth component of complement and C1-inactivator were markedly depleted in remission and attack. Remarkable depletion was found in antithrombin III and esterase inhibition activity of C1-inactivator during attack. In contrast, alpha 1-antitrypsin and alpha 2-macroglobulin did not change. The present study may explain that Hageman factor fragments, activated by C1s, promotes kinin generation via kalikrein activation. And the condition that complete functional deficiency of C1-inactivator was main role in this circuit. Fibrynolysis and late components of complement was less influence on edema attack. PMID:3610041

  14. Improving Attack Graph Visualization through Data Reduction and Attack Grouping

    Energy Technology Data Exchange (ETDEWEB)

    John Homer; Ashok Varikuti; Xinming Ou; Miles A. McQueen

    2008-09-01

    Various tools exist to analyze enterprise network systems and to produce attack graphs detailing how attackers might penetrate into the system. These attack graphs, however, are often complex and difficult to comprehend fully, and a human user may find it problematic to reach appropriate configuration decisions. This paper presents methodologies that can 1) automatically identify portions of an attack graph that do not help a user to understand the core security problems and so can be trimmed, and 2) automatically group similar attack steps as virtual nodes in a model of the network topology, to immediately increase the understandability of the data. We believe both methods are important steps toward improving visualization of attack graphs to make them more useful in configuration management for large enterprise networks. We implemented our methods using one of the existing attack-graph toolkits. Initial experimentation shows that the proposed approaches can 1) significantly reduce the complexity of attack graphs by trimming a large portion of the graph that is not needed for a user to understand the security problem, and 2) significantly increase the accessibility and understandability of the data presented in the attack graph by clearly showing, within a generated visualization of the network topology, the number and type of potential attacks to which each host is exposed.

  15. Metal complexes of 2((ethylthio)methyl)-4-aminophenol as oxidation inhibitors

    Energy Technology Data Exchange (ETDEWEB)

    Rarog, B.G.; Ivanov, V.A.; Potekhin, V.M.; Nesterov, M.V.

    1983-07-10

    Interest in the use of complex compounds as inhibitors of liquid-phase oxidation of hydrocarbons has increased in recent years. Sulfur- and nitrogen-containing metal complexes are known whose inhibiting properties are determined to a considerable extent by the composition of the chelate system, the nature of the metal, and the structure of the complex. At the same time, there is no information on metal compounds whose molecules contain functional groups not included in the chelate system but capable of taking part in inhibition reactions, and there are no data on the possible influence of the metal in the chelate system on the antioxidant activity of these groups. Accordingly, the inhibiting properties of metal complexes of 2((ethylthio)-methyl)-4-aminophenol, having a free amino group, in liquid-phase oxidation of hydrocarbons were studied. Decalin was chosen as the model oxidizable compound in studies of the antioxidant action of metal chelates.

  16. Discovery of Novel Small-Molecule HIV-1 Replication Inhibitors That Stabilize Capsid Complexes

    Science.gov (United States)

    Titolo, Steve; Lemke, Christopher T.; Goudreau, Nathalie; Mercier, Jean-François; Wardrop, Elizabeth; Shah, Vaibhav B.; von Schwedler, Uta K.; Langelier, Charles; Banik, Soma S. R.; Aiken, Christopher; Sundquist, Wesley I.

    2013-01-01

    The identification of novel antiretroviral agents is required to provide alternative treatment options for HIV-1-infected patients. The screening of a phenotypic cell-based viral replication assay led to the identification of a novel class of 4,5-dihydro-1H-pyrrolo[3,4-c]pyrazol-6-one (pyrrolopyrazolone) HIV-1 inhibitors, exemplified by two compounds: BI-1 and BI-2. These compounds inhibited early postentry stages of viral replication at a step(s) following reverse transcription but prior to 2 long terminal repeat (2-LTR) circle formation, suggesting that they may block nuclear targeting of the preintegration complex. Selection of viruses resistant to BI-2 revealed that substitutions at residues A105 and T107 within the capsid (CA) amino-terminal domain (CANTD) conferred high-level resistance to both compounds, implicating CA as the antiviral target. Direct binding of BI-1 and/or BI-2 to CANTD was demonstrated using isothermal titration calorimetry and nuclear magnetic resonance (NMR) chemical shift titration analyses. A high-resolution crystal structure of the BI-1:CANTD complex revealed that the inhibitor bound within a recently identified inhibitor binding pocket (CANTD site 2) between CA helices 4, 5, and 7, on the surface of the CANTD, that also corresponds to the binding site for the host factor CPSF-6. The functional consequences of BI-1 and BI-2 binding differ from previously characterized inhibitors that bind the same site since the BI compounds did not inhibit reverse transcription but stabilized preassembled CA complexes. Hence, this new class of antiviral compounds binds CA and may inhibit viral replication by stabilizing the viral capsid. PMID:23817385

  17. Discovery of Novel Nonactive Site Inhibitors of the Prothrombinase Enzyme Complex.

    Science.gov (United States)

    Kapoor, Karan; McGill, Nicole; Peterson, Cynthia B; Meyers, Harold V; Blackburn, Michael N; Baudry, Jerome

    2016-03-28

    The risk of serious bleeding is a major liability of anticoagulant drugs that are active-site competitive inhibitors targeting the Factor Xa (FXa) prothrombin (PT) binding site. The present work identifies several new classes of small molecule anticoagulants that can act as nonactive site inhibitors of the prothrombinase (PTase) complex composed of FXa and Factor Va (FVa). These new classes of anticoagulants were identified, using a novel agnostic computational approach to identify previously unrecognized binding pockets at the FXa-FVa interface. From about three million docking calculations of 281,128 compounds in a conformational ensemble of FXa heavy chains identified by molecular dynamics (MD) simulations, 97 compounds and their structural analogues were selected for experimental validation, through a series of inhibition assays. The compound selection was based on their predicted binding affinities to FXa and their ability to successfully bind to multiple protein conformations while showing selectivity for particular binding sites at the FXa/FVa interface. From these, thirty-one (31) compounds were experimentally identified as nonactive site inhibitors. Concentration-based assays further identified 10 compounds represented by four small-molecule families of inhibitors that achieve dose-independent partial inhibition of PTase activity in a nonactive site-dependent and self-limiting mechanism. Several compounds were identified for their ability to bind to protein conformations only seen during MD, highlighting the importance of accounting for protein flexibility in structure-based drug discovery approaches. PMID:26848511

  18. The classical and alternative pathways of complement activation play distinct roles in spontaneous C3 fragment deposition and membrane attack complex (MAC) formation on human B lymphocytes

    DEFF Research Database (Denmark)

    Leslie, Robert Graham Quinton; Nielsen, Claus Henrik

    2004-01-01

    The contributions of the classical (CP) and alternative (AP) pathways of complement activation to the spontaneous deposition of C3 fragments and the formation of membrane attack complexes (MAC) on human B lymphocytes, were assessed by incubating peripheral blood mononuclear cells with autologous......, however, in the nature of the fragments deposited as a result of CP and AP activation: C3b fragments deposited via the CP were extensively ( approximately 90%) converted to the terminal degradation product, C3dg, whereas about 50% of those deposited by the AP persisted as C3b/iC3b fragments. The extent of...

  19. Crystal structures of HIV-1 reverse transcriptase complexes with thiocarbamate non-nucleoside inhibitors

    International Nuclear Information System (INIS)

    O-Phthalimidoethyl-N-arylthiocarbamates (TCs) have been recently identified as a new class of potent HIV-1 reverse transcriptase (RT) non-nucleoside inhibitors (NNRTIs), by means of computer-aided drug design techniques [Ranise A. Spallarossa, S. Cesarini, F. Bondavalli, S. Schenone, O. Bruno, G. Menozzi, P. Fossa, L. Mosti, M. La Colla, et al., Structure-based design, parallel synthesis, structure-activity relationship, and molecular modeling studies of thiocarbamates, new potent non-nucleoside HIV-1 reverse transcriptase inhibitor isosteres of phenethylthiazolylthiourea derivatives, J. Med. Chem. 48 (2005) 3858-3873]. To elucidate the atomic details of RT/TC interaction and validate an earlier TC docking model, the structures of three RT/TC complexes were determined at 2.8-3.0 A resolution by X-ray crystallography. The conformations adopted by the enzyme-bound TCs were analyzed and compared with those of bioisosterically related NNRTIs

  20. Effect of B-Mo-W Complex Inhibitor on Corrosion of Mild Steel in 55% LiBr Solution

    Science.gov (United States)

    Li, Jielan; Liang, Chenghao; Huang, Naibao

    2015-11-01

    The inhibition effects of B-Mo-W complex inhibitor on corrosion of mild steel in 55% LiBr solution were investigated using weight-loss method, electrochemistry tests, SEM, EDX, and XRD. The ingredients of B-Mo-W complex inhibitor included organic phosphonic acid B, Na2MoO4, and Na2WO4. The results revealed that B-Mo-W complex inhibitor was capable of inhibiting the corrosion of mild steel in 55% LiBr solution, exhibiting high inhibition efficiencies around 97.7%. B-Mo-W complex inhibitor promoted the formation of a protective passive film composed of Fe, Mo, W, and O elements. The passive film decreased the corrosion rate, improved the electrochemistry performance, and enhanced anti-corrosion ability of mild steel.

  1. Structural and biochemical characterization of the inhibitor complexes of xenotropic murine leukemia virus-related virus protease

    Energy Technology Data Exchange (ETDEWEB)

    Li, Mi; Gustchina, Alla; Matúz, Krisztina; Tözsér, Jozsef; Namwong, Sirilak; Goldfarb, Nathan E.; Dunn, Ben M.; Wlodawer, Alexander (Debrecen); (NCI); (Florida); (Suan Sunandha)

    2012-10-23

    Interactions between the protease (PR) encoded by the xenotropic murine leukemia virus-related virus and a number of potential inhibitors have been investigated by biochemical and structural techniques. It was observed that several inhibitors used clinically against HIV PR exhibit nanomolar or even subnanomolar values of K{sub i}, depending on the exact experimental conditions. Both TL-3, a universal inhibitor of retroviral PRs, and some inhibitors originally shown to inhibit plasmepsins were also quite potent, whereas inhibition by pepstatin A was considerably weaker. Crystal structures of the complexes of xenotropic murine leukemia virus-related virus PR with TL-3, amprenavir and pepstatin A were solved at high resolution and compared with the structures of complexes of these inhibitors with other retropepsins. Whereas TL-3 and amprenavir bound in a predictable manner, spanning the substrate-binding site of the enzyme, two molecules of pepstatin A bound simultaneously in an unprecedented manner, leaving the catalytic water molecule in place.

  2. Ringhalexin from Hemachatus haemachatus: A novel inhibitor of extrinsic tenase complex

    Science.gov (United States)

    Barnwal, Bhaskar; Jobichen, Chacko; Girish, Vallerinteavide Mavelli; Foo, Chun Shin; Sivaraman, J.; Kini, R. Manjunatha

    2016-01-01

    Anticoagulant therapy is used for the prevention and treatment of thromboembolic disorders. Blood coagulation is initiated by the interaction of factor VIIa (FVIIa) with membrane-bound tissue factor (TF) to form the extrinsic tenase complex which activates FX to FXa. Thus, it is an important target for the development of novel anticoagulants. Here, we report the isolation and characterization of a novel anticoagulant ringhalexin from the venom of Hemachatus haemachatus (African Ringhals Cobra). Amino acid sequence of the protein indicates that it belongs to the three-finger toxin family and exhibits 94% identity to an uncharacterized Neurotoxin-like protein NTL2 from Naja atra. Ringhalexin inhibited FX activation by extrinsic tenase complex with an IC50 of 123.8 ± 9.54 nM. It is a mixed-type inhibitor with the kinetic constants, Ki and Ki’ of 84.25 ± 3.53 nM and 152.5 ± 11.32 nM, respectively. Ringhalexin also exhibits a weak, irreversible neurotoxicity on chick biventer cervicis muscle preparations. Subsequently, the three-dimensional structure of ringhalexin was determined at 2.95 Å resolution. This study for the first time reports the structure of an anticoagulant three-finger toxin. Thus, ringhalexin is a potent inhibitor of the FX activation by extrinsic tenase complex and a weak, irreversible neurotoxin. PMID:27173146

  3. Ringhalexin from Hemachatus haemachatus: A novel inhibitor of extrinsic tenase complex.

    Science.gov (United States)

    Barnwal, Bhaskar; Jobichen, Chacko; Girish, Vallerinteavide Mavelli; Foo, Chun Shin; Sivaraman, J; Kini, R Manjunatha

    2016-01-01

    Anticoagulant therapy is used for the prevention and treatment of thromboembolic disorders. Blood coagulation is initiated by the interaction of factor VIIa (FVIIa) with membrane-bound tissue factor (TF) to form the extrinsic tenase complex which activates FX to FXa. Thus, it is an important target for the development of novel anticoagulants. Here, we report the isolation and characterization of a novel anticoagulant ringhalexin from the venom of Hemachatus haemachatus (African Ringhals Cobra). Amino acid sequence of the protein indicates that it belongs to the three-finger toxin family and exhibits 94% identity to an uncharacterized Neurotoxin-like protein NTL2 from Naja atra. Ringhalexin inhibited FX activation by extrinsic tenase complex with an IC50 of 123.8 ± 9.54 nM. It is a mixed-type inhibitor with the kinetic constants, Ki and Ki' of 84.25 ± 3.53 nM and 152.5 ± 11.32 nM, respectively. Ringhalexin also exhibits a weak, irreversible neurotoxicity on chick biventer cervicis muscle preparations. Subsequently, the three-dimensional structure of ringhalexin was determined at 2.95 Å resolution. This study for the first time reports the structure of an anticoagulant three-finger toxin. Thus, ringhalexin is a potent inhibitor of the FX activation by extrinsic tenase complex and a weak, irreversible neurotoxin. PMID:27173146

  4. Performance of attack strategies on modular networks

    CERN Document Server

    da Cunha, Bruno Requião

    2016-01-01

    Vulnerabilities of complex networks have became a trend topic in complex systems recently due to its real world applications. Most real networks tend to be very fragile to high betweenness adaptive attacks. However, recent contributions have shown the importance of interconnected nodes in the integrity of networks and module-based attacks have appeared promising when compared to traditional malicious non-adaptive attacks. In the present work we deeply explore the trade-off associated with attack procedures, introducing a generalized robustness measure and presenting an attack performance index that takes into account both robustness of the network against the attack and the run-time needed to obtained the list of targeted nodes for the attack. Besides, we introduce the concept of deactivation point aimed to mark the point at which the network stops to function properly. We then show empirically that non-adaptive module-based attacks perform better than high degree and betweenness adaptive attacks in networks ...

  5. An in cellulo-derived structure of PAK4 in complex with its inhibitor Inka1.

    Science.gov (United States)

    Baskaran, Yohendran; Ang, Khay C; Anekal, Praju V; Chan, Wee L; Grimes, Jonathan M; Manser, Ed; Robinson, Robert C

    2015-01-01

    PAK4 is a metazoan-specific kinase acting downstream of Cdc42. Here we describe the structure of human PAK4 in complex with Inka1, a potent endogenous kinase inhibitor. Using single mammalian cells containing crystals 50 μm in length, we have determined the in cellulo crystal structure at 2.95 Å resolution, which reveals the details of how the PAK4 catalytic domain binds cellular ATP and the Inka1 inhibitor. The crystal lattice consists only of PAK4-PAK4 contacts, which form a hexagonal array with channels of 80 Å in diameter that run the length of the crystal. The crystal accommodates a variety of other proteins when fused to the kinase inhibitor. Inka1-GFP was used to monitor the process crystal formation in living cells. Similar derivatives of Inka1 will allow us to study the effects of PAK4 inhibition in cells and model organisms, to allow better validation of therapeutic agents targeting PAK4. PMID:26607847

  6. Crystal structure of LpxC from Pseudomonas aeruginosa complexed with the potent BB-78485 inhibitor

    Energy Technology Data Exchange (ETDEWEB)

    Mochalkin, Igor; Knafels, John D.; Lightle, Sandra (Pfizer)

    2008-04-02

    The cell wall in Gram-negative bacteria is surrounded by an outer membrane comprised of charged lipopolysaccharide (LPS) molecules that prevent entry of hydrophobic agents into the cell and protect the bacterium from many antibiotics. The hydrophobic anchor of LPS is lipid A, the biosynthesis of which is essential for bacterial growth and viability. UDP-3-O-(R-3-hydroxymyristoyl)-N-acetylglucosamine deacetylase (LpxC) is an essential zinc-dependant enzyme that catalyzes the conversion of UDP-3-O-(R-3-hydroxymyristoyl)-N-acetylglucosamine to UDP-3-O-(R-3-hydroxymyristoyl)glucosamine and acetate in the biosynthesis of lipid A, and for this reason, LpxC is an attractive target for antibacterial drug discovery. Here we disclose a 1.9 A resolution crystal structure of LpxC from Pseudomonas aeruginosa (paLpxC) in a complex with the potent BB-78485 inhibitor. To our knowledge, this is the first crystal structure of LpxC with a small-molecule inhibitor that shows antibacterial activity against a wide range of Gram-negative pathogens. Accordingly, this structure can provide important information for lead optimization and rational design of the effective small-molecule LpxC inhibitors for successful treatment of Gram-negative infections.

  7. Hepatitis C Virus (HCV) NS5B Nonnucleoside Inhibitors Specifically Block Single-Stranded Viral RNA Synthesis Catalyzed by HCV Replication Complexes In Vitro▿

    OpenAIRE

    Yang, Wengang; Sun, Yongnian; Phadke, Avinash; Deshpande, Milind; Huang, Mingjun

    2006-01-01

    Replication complexes of hepatitis C virus synthesized two major species of viral RNA in vitro, double stranded and single stranded. NS5B nonnucleoside inhibitors inhibited dose dependently the synthesis of single-stranded RNA but not double-stranded RNA. Moreover, replication complexes carrying a mutation resistant to a nonnucleoside inhibitor lost their susceptibilities to the inhibitor.

  8. Heart Attack Risk Assessment

    Science.gov (United States)

    ... Pressure Tools & Resources Stroke More Heart Attack Risk Assessment Updated:May 31,2016 We're sorry, but ... Can You Recognize a Heart Attack? Quiz Risk Assessment Patient Information Sheets: Heart Attack Heart Attack Personal ...

  9. Production of new amilorides as potent inhibitors of mitochondrial respiratory complex I.

    Science.gov (United States)

    Murai, Masatoshi; Habu, Sayako; Murakami, Sonomi; Ito, Takeshi; Miyoshi, Hideto

    2015-01-01

    Amilorides, well-known inhibitors of Na(+)/H(+) antiporters, have also shown to inhibit bacterial and mitochondrial NADH-quinone oxidoreductase (complex I). Since the membrane subunits ND2, ND4, and ND5 of bovine mitochondrial complex I are homologous to Na(+)/H(+) antiporters, amilorides have been thought to bind to any or all of the antiporter-like subunits; however, there is no direct experimental evidence in support of this notion. Photoaffinity labeling is a powerful technique to identify the binding site of amilorides in bovine complex I. Commercially available amilorides such as 5-(N-ethyl-N-isopropyl)amiloride are not suitable as design templates to synthesize photoreactive amilorides because of their low binding affinities to bovine complex I. Thereby, we attempted to modify the structures of commercially available amilorides in order to obtain more potent derivatives. We successfully produced two photoreactive amilorides (PRA1 and PRA2) with a photolabile azido group at opposite ends of the molecule. PMID:25731956

  10. X-ray structures of checkpoint kinase 2 in complex with inhibitors that target its gatekeeper-dependent hydrophobic pocket

    Energy Technology Data Exchange (ETDEWEB)

    Lountos, George T.; Jobson, Andrew G.; Tropea, Joseph E.; Self, Christopher R.; Zhang, Guangtao; Pommier, Yves; Shoemaker, Robert H.; Waugh, David S. (Provid); (NIH); (SAIC); (NCI)

    2012-09-17

    The serine/threonine checkpoint kinase 2 (Chk2) is an attractive molecular target for the development of small molecule inhibitors to treat cancer. Here, we report the rational design of Chk2 inhibitors that target the gatekeeper-dependent hydrophobic pocket located behind the adenine-binding region of the ATP-binding site. These compounds exhibit IC{sub 50} values in the low nanomolar range and are highly selective for Chk2 over Chk1. X-ray crystallography was used to determine the structures of the inhibitors in complex with the catalytic kinase domain of Chk2 to verify their modes of binding.

  11. Attack warning

    Energy Technology Data Exchange (ETDEWEB)

    1988-12-01

    The North American Aerospace Defense Command, located at Cheyenne Mountain Air Force Station, is responsible for warning the United States and Canadian leaders that North America is under air, missile, or space attack. The Air Force has been developing a replacement for NORAD's communications computer system, and it expects to spend about $281 million on this program-about $72 million for block I and $209 million for block II. Block I of the replacement system has experienced significant schedule and performance problems, such as the inability to meet the requirement for the unit to restore full mission capability within 267 minutes after a total loss of power, and the incompatibility of the unit with other computer equipment due to the wiring standard. These problems have pushed the planned installation data from 1986 to 1999. The Air Force intends to have the contractor correct the deficiencies during block II development. This report discusses how the replacement program should be reassessed.

  12. Mammalian Target of Rapamycin Inhibitors and Life-Threatening Conditions in Tuberous Sclerosis Complex.

    Science.gov (United States)

    Moavero, Romina; Romagnoli, Gloria; Graziola, Federica; Curatolo, Paolo

    2015-12-01

    Tuberous sclerosis complex (TSC) is a multisystem disease associated with an overall reduction in life expectancy due to the possible occurrence of different life-threatening conditions. Subjects affected by TSC are, in fact, at risk of hydrocephalus secondary to the growth of subependymal giant cell astrocytomas, or of sudden unexpected death in epilepsy. Other nonneurological life-threatening conditions include abdominal bleeding owing to renal angiomyolipomas rupture, renal insufficiency due to progressive parenchymal destruction by multiple cysts, pulmonary complications due to lymphangioleiomyomatosis, and cardiac failure or arrhythmias secondary to rhabdomyomas. In the last decades, there has been a great progress in understanding the pathophysiology of TSC-related manifestations, which are mainly linked to the hyperactivation of the so-called mammalian target of rapamycin (mTOR) pathway, as a consequence of the mutation in 1 of the 2 genes TSC1 or TSC2. This led to the development of new treatment strategies for this disease. In fact, it is now available as a biologically targeted therapy with everolimus, a selective mTOR inhibitor, which has been licensed in Europe and USA for the treatment of subependymal giant cell astrocytomas and angiomyolipomas in subjects with TSC. This drug also proved to benefit other TSC-related manifestations, including pulmonary lymphangioleiomyomatosis, cardiac rhabdomyomas, and presumably epileptic seizures. mTOR inhibitors are thus proving to be a systemic therapy able to simultaneously address different and potentially life-threatening complications, giving the hope of improving life expectation in individuals with TSC. PMID:26706015

  13. Platelet degranulation and monocyte-platelet complex formation are increased in the acute and convalescent phases after ischaemic stroke or transient ischaemic attack.

    LENUS (Irish Health Repository)

    McCabe, Dominick J H

    2004-06-01

    Flow cytometric studies suggest that platelets are activated in ischaemic stroke or transient ischaemic attack (TIA). However, few studies have measured circulating leucocyte-platelet complexes in this patient population. Whole blood flow cytometry was used to quantify the expression of CD62P-, CD63-, and PAC1-binding, and the percentages of leucocyte-platelet complexes in acute (1-27 d, n = 79) and convalescent (79-725 d, n = 70) ischaemic cerebrovascular disease (CVD) patients compared with controls without CVD (n = 27). We performed a full blood count, and measured plasma levels of soluble P-selectin, soluble E-selectin, and von Willebrand factor antigen (VWF:Ag) as additional markers of platelet and\\/or endothelial cell activation. The median percentage CD62P expression and the median percentage monocyte-platelet complexes were higher in both acute and convalescent CVD patients than controls (P <\\/= 0.02). The mean white cell count and mean VWF:Ag levels were significantly elevated in the acute and convalescent phases after ischaemic stroke or TIA (P <\\/= 0.02). Otherwise, there was no significant increase in any other marker of platelet or endothelial activation in CVD patients. There was a positive correlation between the percentage expression of CD62P and the percentages of both neutrophil-platelet and monocyte-platelet complexes in the acute phase, and the percentages of all leucocyte-platelet complexes in the convalescent phase after ischaemic CVD. This study provides evidence for ongoing excessive platelet and\\/or endothelial activation in ischaemic CVD patients despite treatment with antithrombotic therapy.

  14. Probing the structure-activity relationship of endogenous histone deacetylase complexes with immobilized peptide-inhibitors.

    Science.gov (United States)

    Sindlinger, Julia; Bierlmeier, Jan; Geiger, Lydia-Christina; Kramer, Katharina; Finkemeier, Iris; Schwarzer, Dirk

    2016-05-01

    Histone deacetylases (HDACs) are key regulators of numerous cellular proteins by removing acetylation marks from modified lysine residues. Peptide-based HDAC probes containing α-aminosuberic acid ω-hydroxamate have been established as useful tools for investigating substrate selectivity and composition of endogenous HDAC complexes in cellular lysates. Here we report a structure-activity study of potential HDAC-probes containing derivatives of the hydroxamate moieties. While most of these probes did not recruit significant amounts of endogenous HDACs from cellular lysates, peptides containing Nε-acetyl-Nε-hydroxy-L-lysine served as HDAC probe. The recruitment efficiency varied between HDACs and was generally lower than that of α-aminosuberic acid ω-hydroxamate probes, but showed a similar global interaction profile. These findings indicate that Nε-acetyl-Nε-hydroxy-L-lysine might be a useful tool for investigations on HDAC complexes and the development of HDAC inhibitors. Copyright © 2016 European Peptide Society and John Wiley & Sons, Ltd. PMID:27071932

  15. Crystal structure of Zika virus NS2B-NS3 protease in complex with a boronate inhibitor.

    Science.gov (United States)

    Lei, Jian; Hansen, Guido; Nitsche, Christoph; Klein, Christian D; Zhang, Linlin; Hilgenfeld, Rolf

    2016-07-29

    The ongoing Zika virus (ZIKV) outbreak is linked to severe neurological disorders. ZIKV relies on its NS2B/NS3 protease for polyprotein processing; hence, this enzyme is an attractive drug target. The 2.7 angstrom; crystal structure of ZIKV protease in complex with a peptidomimetic boronic acid inhibitor reveals a cyclic diester between the boronic acid and glycerol. The P2 4-aminomethylphenylalanine moiety of the inhibitor forms a salt-bridge with the nonconserved Asp(83) of NS2B; ion-pairing between Asp(83) and the P2 residue of the substrate likely accounts for the enzyme's high catalytic efficiency. The unusual dimer of the ZIKV protease:inhibitor complex seen in the crystal may provide a model for assemblies formed at high local concentrations of protease at the endoplasmatic reticulum membrane, the site of polyprotein processing. PMID:27386922

  16. Extended intermolecular interactions in a serine protease-canonical inhibitor complex account for strong and highly specific inhibition.

    Science.gov (United States)

    Fodor, Krisztián; Harmat, Veronika; Hetényi, Csaba; Kardos, József; Antal, József; Perczel, András; Patthy, András; Katona, Gergely; Gráf, László

    2005-07-01

    We have previously shown that a trypsin inhibitor from desert locust Schistocerca gregaria (SGTI) is a taxon-specific inhibitor that inhibits arthropod trypsins, such as crayfish trypsin, five orders of magnitude more effectively than mammalian trypsins. Thermal denaturation experiments, presented here, confirm the inhibition kinetics studies; upon addition of SGTI the melting temperatures of crayfish and bovine trypsins increased 27 degrees C and 4.5 degrees C, respectively. To explore the structural features responsible for this taxon specificity we crystallized natural crayfish trypsin in complex with chemically synthesized SGTI. This is the first X-ray structure of an arthropod trypsin and also the highest resolution (1.2A) structure of a trypsin-protein inhibitor complex reported so far. Structural data show that in addition to the primary binding loop, residues P3-P3' of SGTI, the interactions between SGTI and the crayfish enzyme are also extended over the P12-P4 and P4'-P5' regions. This is partly due to a structural change of region P10-P4 in the SGTI structure induced by binding of the inhibitor to crayfish trypsin. The comparison of SGTI-crayfish trypsin and SGTI-bovine trypsin complexes by structure-based calculations revealed a significant interaction energy surplus for the SGTI-crayfish trypsin complex distributed over the entire binding region. The new regions that account for stronger and more specific binding of SGTI to crayfish than to bovine trypsin offer new inhibitor sites to engineer in order to develop efficient and specific protease inhibitors for practical use. PMID:15922357

  17. Heart Attack Recovery FAQs

    Science.gov (United States)

    ... Pressure High Blood Pressure Tools & Resources Stroke More Heart Attack Recovery FAQs Updated:Aug 24,2016 Most people ... recovery. View an animation of a heart attack . Heart Attack Recovery Questions and Answers What treatments will I ...

  18. Assembly and Regulation of the Membrane Attack Complex Based on Structures of C5b6 and sC5b9

    Directory of Open Access Journals (Sweden)

    Michael A. Hadders

    2012-03-01

    Full Text Available Activation of the complement system results in formation of membrane attack complexes (MACs, pores that disrupt lipid bilayers and lyse bacteria and other pathogens. Here, we present the crystal structure of the first assembly intermediate, C5b6, together with a cryo-electron microscopy reconstruction of a soluble, regulated form of the pore, sC5b9. Cleavage of C5 to C5b results in marked conformational changes, distinct from those observed in the homologous C3-to-C3b transition. C6 captures this conformation, which is preserved in the larger sC5b9 assembly. Together with antibody labeling, these structures reveal that complement components associate through sideways alignment of the central MAC-perforin (MACPF domains, resulting in a C5b6-C7-C8β-C8α-C9 arc. Soluble regulatory proteins below the arc indicate a potential dual mechanism in protection from pore formation. These results provide a structural framework for understanding MAC pore formation and regulation, processes important for fighting infections and preventing complement-mediated tissue damage.

  19. Genetic attack on neural cryptography

    Science.gov (United States)

    Ruttor, Andreas; Kinzel, Wolfgang; Naeh, Rivka; Kanter, Ido

    2006-03-01

    Different scaling properties for the complexity of bidirectional synchronization and unidirectional learning are essential for the security of neural cryptography. Incrementing the synaptic depth of the networks increases the synchronization time only polynomially, but the success of the geometric attack is reduced exponentially and it clearly fails in the limit of infinite synaptic depth. This method is improved by adding a genetic algorithm, which selects the fittest neural networks. The probability of a successful genetic attack is calculated for different model parameters using numerical simulations. The results show that scaling laws observed in the case of other attacks hold for the improved algorithm, too. The number of networks needed for an effective attack grows exponentially with increasing synaptic depth. In addition, finite-size effects caused by Hebbian and anti-Hebbian learning are analyzed. These learning rules converge to the random walk rule if the synaptic depth is small compared to the square root of the system size.

  20. Genetic attack on neural cryptography

    International Nuclear Information System (INIS)

    Different scaling properties for the complexity of bidirectional synchronization and unidirectional learning are essential for the security of neural cryptography. Incrementing the synaptic depth of the networks increases the synchronization time only polynomially, but the success of the geometric attack is reduced exponentially and it clearly fails in the limit of infinite synaptic depth. This method is improved by adding a genetic algorithm, which selects the fittest neural networks. The probability of a successful genetic attack is calculated for different model parameters using numerical simulations. The results show that scaling laws observed in the case of other attacks hold for the improved algorithm, too. The number of networks needed for an effective attack grows exponentially with increasing synaptic depth. In addition, finite-size effects caused by Hebbian and anti-Hebbian learning are analyzed. These learning rules converge to the random walk rule if the synaptic depth is small compared to the square root of the system size

  1. The attack navigator

    DEFF Research Database (Denmark)

    Probst, Christian W.; Willemson, Jan; Pieters, Wolter

    2016-01-01

    The need to assess security and take protection decisions is at least as old as our civilisation. However, the complexity and development speed of our interconnected technical systems have surpassed our capacity to imagine and evaluate risk scenarios. This holds in particular for risks that are...... caused by the strategic behaviour of adversaries. Therefore, technology-supported methods are needed to help us identify and manage these risks. In this paper, we describe the attack navigator: a graph-based approach to security risk assessment inspired by navigation systems. Based on maps of a socio...

  2. Novel Inhibitors Complexed with Glutamate Dehydrogenase: ALLOSTERIC REGULATION BY CONTROL OF PROTEIN DYNAMICS

    Energy Technology Data Exchange (ETDEWEB)

    Li, Ming; Smith, Christopher J.; Walker, Matthew T.; Smith, Thomas J.; (Danforth)

    2009-12-01

    Mammalian glutamate dehydrogenase (GDH) is a homohexameric enzyme that catalyzes the reversible oxidative deamination of L-glutamate to 2-oxoglutarate using NAD(P){sup +} as coenzyme. Unlike its counterparts from other animal kingdoms, mammalian GDH is regulated by a host of ligands. The recently discovered hyperinsulinism/hyperammonemia disorder showed that the loss of allosteric inhibition of GDH by GTP causes excessive secretion of insulin. Subsequent studies demonstrated that wild-type and hyperinsulinemia/hyperammonemia forms of GDH are inhibited by the green tea polyphenols, epigallocatechin gallate and epicatechin gallate. This was followed by high throughput studies that identified more stable inhibitors, including hexachlorophene, GW5074, and bithionol. Shown here are the structures of GDH complexed with these three compounds. Hexachlorophene forms a ring around the internal cavity in GDH through aromatic stacking interactions between the drug and GDH as well as between the drug molecules themselves. In contrast, GW5074 and bithionol both bind as pairs of stacked compounds at hexameric 2-fold axes between the dimers of subunits. The internal core of GDH contracts when the catalytic cleft closes during enzymatic turnover. None of the drugs cause conformational changes in the contact residues, but all bind to key interfaces involved in this contraction process. Therefore, it seems likely that the drugs inhibit enzymatic turnover by inhibiting this transition. Indeed, this expansion/contraction process may play a major role in the inter-subunit communication and allosteric regulation observed in GDH.

  3. Nitrogen-15 NMR spectroscopy of the catalytic-triad histidine of a serine protease in peptide boronic acid inhibitor complexes

    International Nuclear Information System (INIS)

    15N NMR spectroscopy was used to examine the active-site histidyl residue of α-lytic protease in peptide boronic acid inhibitor complexes. Two distinct types of complexes were observed: (1) Boronic acids that are analogues of substrates form complexes in which the active-site imidazole ring is protonated and both imidazole N-H protons are strongly hydrogen bonded. (2) Boronic acids that are not substrate analogues form complexes in which Nε2 of the active-site histidine is covalently bonded to the boron atom of the inhibitor. The proton bound to Nδ1 of the histidine in these histidine-boronate adducts remains strongly hydrogen bonded, presumably to the active-site aspartate. In both types of complexes the N-H protons of His-57 exchange unusually slowly as evidenced by the room temperature visibility of the low-field 1H resonances and the 15N-H spin couplings. These results indicate that occupancy of the specificity subsites may be required to fully form the transition-state binding site. The significance of these findings for understanding inhibitor binding and the catalytic mechanism of serine proteases is discussed

  4. Inferring selection in the Anopheles gambiae species complex: an example from immune-related serine protease inhibitors

    Directory of Open Access Journals (Sweden)

    Little Tom J

    2009-06-01

    Full Text Available Abstract Background Mosquitoes of the Anopheles gambiae species complex are the primary vectors of human malaria in sub-Saharan Africa. Many host genes have been shown to affect Plasmodium development in the mosquito, and so are expected to engage in an evolutionary arms race with the pathogen. However, there is little conclusive evidence that any of these mosquito genes evolve rapidly, or show other signatures of adaptive evolution. Methods Three serine protease inhibitors have previously been identified as candidate immune system genes mediating mosquito-Plasmodium interaction, and serine protease inhibitors have been identified as hot-spots of adaptive evolution in other taxa. Population-genetic tests for selection, including a recent multi-gene extension of the McDonald-Kreitman test, were applied to 16 serine protease inhibitors and 16 other genes sampled from the An. gambiae species complex in both East and West Africa. Results Serine protease inhibitors were found to show a marginally significant trend towards higher levels of amino acid diversity than other genes, and display extensive genetic structuring associated with the 2La chromosomal inversion. However, although serpins are candidate targets for strong parasite-mediated selection, no evidence was found for rapid adaptive evolution in these genes. Conclusion It is well known that phylogenetic and population history in the An. gambiae complex can present special problems for the application of standard population-genetic tests for selection, and this may explain the failure of this study to detect selection acting on serine protease inhibitors. The pitfalls of uncritically applying these tests in this species complex are highlighted, and the future prospects for detecting selection acting on the An. gambiae genome are discussed.

  5. Crystallization and preliminary X-ray diffraction analysis of the protease from Southampton norovirus complexed with a Michael acceptor inhibitor

    International Nuclear Information System (INIS)

    The crystallization of the recombinant protease from Southampton norovirus is described. Whilst the native crystals were found to diffract only to medium resolution (2.9 Å), cocrystals with a designed covalently bound inhibitor diffracted X-rays to 1.7 Å resolution. Noroviruses are the predominant cause of human epidemic nonbacterial gastroenteritis. Viral replication requires a cysteine protease that cleaves a 200 kDa viral polyprotein into its constituent functional parts. Here, the crystallization of the recombinant protease from the Southampton norovirus is described. Whilst the native crystals were found to diffract only to medium resolution (2.9 Å), cocrystals of an inhibitor complex diffracted X-rays to 1.7 Å resolution. The polypeptide inhibitor (Ac-EFQLQ-propenyl ethyl ester) possesses an amino-acid sequence designed to match the substrate specificity of the enzyme, but was synthesized with a reactive Michael acceptor group at the C-terminal end

  6. Complexes of Imidazole with Poly(ethylene glycol) as a Corrosion Inhibitor for Carbon Steel in Sulphuric Acid

    Science.gov (United States)

    Salimi, Saeed; Nasr-Esfahani, Mojtaba; Umoren, Saviour A.; Saebnoori, Ehsan

    2015-12-01

    The inhibiting action of polyethylene glycol and imidazole (PEG/IMZ)) complexes prepared by a simple deprotonation procedure on carbon steel corrosion in 0.5 mol/L sulphuric acid was evaluated using the weight loss, potentiodynamic polarization, and electrochemical impedance spectroscopy techniques complemented by surface analysis using scanning electron microscopy. The inhibiting effect of the PEG/IMZ complexes on carbon steel corrosion was compared with the non-complex forms. Results obtained show that PEG/IMZ complex is a very effective corrosion inhibitor of carbon steel in the acid environment. The inhibition efficiency increased with the increase in the temperature and also with increasing percentage of imidazole in the complex. Corrosion inhibition occurs by virtue of adsorption of PEG/IMZ complexes on the steel surface which was found to follow the Temkin adsorption isotherm model. The PEG/IMZ complexes function as a mixed-type inhibitor. Results from all the methods employed are in a reasonably good agreement.

  7. Active Linkability Attacks

    OpenAIRE

    Schnoor, Henning; Woizekowski, Oliver

    2013-01-01

    We study linking attacks on communication protocols. We show that an active attacker is strictly more powerful in this setting than previously-considered passive attackers. We introduce a formal model to reason about active linkability attacks, formally define security against these attacks and give very general conditions for both security and insecurity of protocols. In addition, we introduce a composition-like technique that allows to obtain security proofs by only studying small component...

  8. Spatially localized attacks on interdependent networks: the existence of a finite critical attack size

    CERN Document Server

    Berezin, Yehiel; Danziger, Michael M; Li, Daqing; Havlin, Shlomo

    2013-01-01

    Many real world complex systems such as infrastructure, communication and transportation networks are embedded in space, where entities of one system may depend on entities of other systems. These systems are subject to geographically localized failures due to malicious attacks or natural disasters. Here we study the resilience of a system composed of two interdependent spatially embedded networks to localized geographical attacks. We find that if an attack is larger than a finite (zero fraction of the system) critical size, it will spread through the entire system and lead to its complete collapse. If the attack is below the critical size, it will remain localized. In contrast, under random attack a finite fraction of the system needs to be removed to initiate system collapse. We present both numerical simulations and a theoretical approach to analyze and predict the effect of local attacks and the critical attack size. Our results demonstrate the high risk of local attacks on interdependent spatially embedd...

  9. Electrochemical Study on the Inhibition Effect of Phenanthroline and Its Cobalt Complex as Corrosion Inhibitors for Mild Steel

    Science.gov (United States)

    Liu, Xia; Okafor, Peter C.; Jiang, Bin; Hu, Hongxiang; Zheng, Yugui

    2015-09-01

    The corrosion inhibition effect of phenanthroline (Phen) and its cobalt complex (CoPhen) on the corrosion of carbon steel in sulphuric acid solutions was studied using potentiodynamic polarization and electrochemical impedance spectroscopy techniques at 20, 30, and 40 °C. Scanning electron microscopy techniques were used to characterize the mild steel surface. The results indicate that the compounds inhibit the corrosion of mild steel in H2SO4 solutions through a predominant physical adsorption following the Langmuir adsorption isotherm. Polarization curves suggest that the complex and ligand are mixed-type inhibitors. The efficiency of the inhibitors is concentration- and temperature-dependent and follows the trend CoPhen > Phen.

  10. Congenital segmental lymphedema in tuberous sclerosis complex with associated subependymal giant cell astrocytomas treated with Mammalian target of rapamycin inhibitors.

    Science.gov (United States)

    Prato, Giulia; Mancardi, Maria Margherita; Baglietto, Maria Giuseppina; Janis, Sara; Vercellino, Nadia; Rossi, Andrea; Consales, Alessandro; Raso, Alessandro; Garrè, Maria Luisa

    2014-09-01

    Tuberous sclerosis complex is a genetic, multisystemic disorder characterized by circumscribed benign lesions (hamartomas) in several organs, including brain. This is the result of defects in the TSC1 and/or TSC2 tumor suppressor genes, encoding the hamartin-tuberin complex that inhibits the mammalian target of rapamycin pathway. Specific inhibitors of this pathway have been shown to reduce the volume of subependymal giant cell astrocytomas associated with tuberous sclerosis. Congenital lymphedema is rarely seen in association with tuberous sclerosis, with only a few reported cases. Although this association can be coincidental, the dysgenetic lymphatic system can represent a hamartia as a consequence of gene mutation. We describe a child with congenital lymphedema in tuberous sclerosis and associated subependymal giant cell astrocytoma who experienced lymphangitis under treatment with mammalian target of rapamycin inhibitors. Because our patient did not show worsening of lymphedema, congenital lymphedema does not seem to be a contraindication for this therapy. PMID:24056156

  11. Structure of Human G Protein-Coupled Receptor Kinase 2 in Complex with the Kinase Inhibitor Balanol

    Energy Technology Data Exchange (ETDEWEB)

    Tesmer, John J.G.; Tesmer, Valerie M.; Lodowski, David T.; Steinhagen, Henning; Huber, Jochen (Sanofi); (Michigan); (Texas)

    2010-07-19

    G protein-coupled receptor kinase 2 (GRK2) is a pharmaceutical target for the treatment of cardiovascular diseases such as congestive heart failure, myocardial infarction, and hypertension. To better understand how nanomolar inhibition and selectivity for GRK2 might be achieved, we have determined crystal structures of human GRK2 in complex with G{beta}{gamma} in the presence and absence of the AGC kinase inhibitor balanol. The selectivity of balanol among human GRKs is assessed.

  12. Repositioning of Verrucosidin, a purported inhibitor of chaperone protein GRP78, as an inhibitor of mitochondrial electron transport chain complex I.

    Science.gov (United States)

    Thomas, Simmy; Sharma, Natasha; Gonzalez, Reyna; Pao, Peng-Wen; Hofman, Florence M; Chen, Thomas C; Louie, Stan G; Pirrung, Michael C; Schönthal, Axel H

    2013-01-01

    Verrucosidin (VCD) belongs to a group of fungal metabolites that were identified in screening programs to detect molecules that preferentially kill cancer cells under glucose-deprived conditions. Its mode of action was proposed to involve inhibition of increased GRP78 (glucose regulated protein 78) expression during hypoglycemia. Because GRP78 plays an important role in tumorigenesis, inhibitors such as VCD might harbor cancer therapeutic potential. We therefore sought to characterize VCD's anticancer activity in vitro. Triple-negative breast cancer cell lines MDA-MB-231 and MDA-MB-468 were treated with VCD under different conditions known to trigger increased expression of GRP78, and a variety of cellular processes were analyzed. We show that VCD was highly cytotoxic only under hypoglycemic conditions, but not in the presence of normal glucose levels, and VCD blocked GRP78 expression only when glycolysis was impaired (due to hypoglycemia or the presence of the glycolysis inhibitor 2-deoxyglucose), but not when GRP78 was induced by other means (hypoxia, thapsigargin, tunicamycin). However, VCD's strictly hypoglycemia-specific toxicity was not due to the inhibition of GRP78. Rather, VCD blocked mitochondrial energy production via inhibition of complex I of the electron transport chain. As a result, cellular ATP levels were quickly depleted under hypoglycemic conditions, and common cellular functions, including general protein synthesis, deteriorated and resulted in cell death. Altogether, our study identifies mitochondria as the primary target of VCD. The possibility that other purported GRP78 inhibitors (arctigenin, biguanides, deoxyverrucosidin, efrapeptin, JBIR, piericidin, prunustatin, pyrvinium, rottlerin, valinomycin, versipelostatin) might act in a similar GRP78-independent fashion will be discussed. PMID:23755268

  13. Repositioning of Verrucosidin, a purported inhibitor of chaperone protein GRP78, as an inhibitor of mitochondrial electron transport chain complex I.

    Directory of Open Access Journals (Sweden)

    Simmy Thomas

    Full Text Available Verrucosidin (VCD belongs to a group of fungal metabolites that were identified in screening programs to detect molecules that preferentially kill cancer cells under glucose-deprived conditions. Its mode of action was proposed to involve inhibition of increased GRP78 (glucose regulated protein 78 expression during hypoglycemia. Because GRP78 plays an important role in tumorigenesis, inhibitors such as VCD might harbor cancer therapeutic potential. We therefore sought to characterize VCD's anticancer activity in vitro. Triple-negative breast cancer cell lines MDA-MB-231 and MDA-MB-468 were treated with VCD under different conditions known to trigger increased expression of GRP78, and a variety of cellular processes were analyzed. We show that VCD was highly cytotoxic only under hypoglycemic conditions, but not in the presence of normal glucose levels, and VCD blocked GRP78 expression only when glycolysis was impaired (due to hypoglycemia or the presence of the glycolysis inhibitor 2-deoxyglucose, but not when GRP78 was induced by other means (hypoxia, thapsigargin, tunicamycin. However, VCD's strictly hypoglycemia-specific toxicity was not due to the inhibition of GRP78. Rather, VCD blocked mitochondrial energy production via inhibition of complex I of the electron transport chain. As a result, cellular ATP levels were quickly depleted under hypoglycemic conditions, and common cellular functions, including general protein synthesis, deteriorated and resulted in cell death. Altogether, our study identifies mitochondria as the primary target of VCD. The possibility that other purported GRP78 inhibitors (arctigenin, biguanides, deoxyverrucosidin, efrapeptin, JBIR, piericidin, prunustatin, pyrvinium, rottlerin, valinomycin, versipelostatin might act in a similar GRP78-independent fashion will be discussed.

  14. Insights into affinity and specificity in the complexes of α-lytic protease and its inhibitor proteins: binding free energy from molecular dynamics simulation†

    OpenAIRE

    Deng, Nan-Jie; Cieplak, Piotr

    2009-01-01

    We report the binding free energy calculation and its decomposition for the complexes of α-lytic protease and its protein inhibitors using molecular dynamics simulation. Standard mechanism serine protease inhibitors eglin C and OMTKY3 are known to have strong binding affinity for many serine proteases. Their binding loops have significant similarities, including a common P1 Leu as the main anchor in the binding interface. However, recent experiments demonstrate that the two inhibitors have va...

  15. A Novel Dimeric Inhibitor Targeting Beta2GPI in Beta2GPI/Antibody Complexes Implicated in Antiphospholipid Syndrome

    Energy Technology Data Exchange (ETDEWEB)

    A Kolyada; C Lee; A De Biasio; N Beglova

    2011-12-31

    {beta}2GPI is a major antigen for autoantibodies associated with antiphospholipid syndrome (APS), an autoimmune disease characterized by thrombosis and recurrent pregnancy loss. Only the dimeric form of {beta}2GPI generated by anti-{beta}2GPI antibodies is pathologically important, in contrast to monomeric {beta}2GPI which is abundant in plasma. We created a dimeric inhibitor, A1-A1, to selectively target {beta}2GPI in {beta}2GPI/antibody complexes. To make this inhibitor, we isolated the first ligand-binding module from ApoER2 (A1) and connected two A1 modules with a flexible linker. A1-A1 interferes with two pathologically important interactions in APS, the binding of {beta}2GPI/antibody complexes with anionic phospholipids and ApoER2. We compared the efficiency of A1-A1 to monomeric A1 for inhibition of the binding of {beta}2GPI/antibody complexes to anionic phospholipids. We tested the inhibition of {beta}2GPI present in human serum, {beta}2GPI purified from human plasma and the individual domain V of {beta}2GPI. We demonstrated that when {beta}2GPI/antibody complexes are formed, A1-A1 is much more effective than A1 in inhibition of the binding of {beta}2GPI to cardiolipin, regardless of the source of {beta}2GPI. Similarly, A1-A1 strongly inhibits the binding of dimerized domain V of {beta}2GPI to cardiolipin compared to the monomeric A1 inhibitor. In the absence of anti-{beta}2GPI antibodies, both A1-A1 and A1 only weakly inhibit the binding of pathologically inactive monomeric {beta}2GPI to cardiolipin. Our results suggest that the approach of using a dimeric inhibitor to block {beta}2GPI in the pathological multivalent {beta}2GPI/antibody complexes holds significant promise. The novel inhibitor A1-A1 may be a starting point in the development of an effective therapeutic for antiphospholipid syndrome.

  16. Generating IDS Attack Pattern Automatically Based on Attack Tree

    Institute of Scientific and Technical Information of China (English)

    向尕; 曹元大

    2003-01-01

    Generating attack pattern automatically based on attack tree is studied. The extending definition of attack tree is proposed. And the algorithm of generating attack tree is presented. The method of generating attack pattern automatically based on attack tree is shown, which is tested by concrete attack instances. The results show that the algorithm is effective and efficient. In doing so, the efficiency of generating attack pattern is improved and the attack trees can be reused.

  17. The complex between urokinase (uPA) and its type-1 inhibitor (PAI-1) in pulmonary adenocarcinoma

    DEFF Research Database (Denmark)

    Pappot, Helle; Pedersen, Anders N.; Brünner, Nils;

    2006-01-01

    In a lung cancer population comprising tumor tissue from 99 pulmonary adenocarcinoma patients, the relationship between tumor tissue level of the complex formed of urokinase (uPA) and its type-1 inhibitor (PAI-1) and survival was studied. The study included patient material previously investigated...... patients with low PAI-1 and high uPA-PAI-1 complex (HR = 3.06, p = 0.01). This is the first investigation of the prognostic impact of uPA-PAI-1 complex in a tumor type other than breast cancer, showing low levels of uPA-PAI-1 complex in combination with high levels of PAI-1 to be associated with poor...

  18. Integrating cyber attacks within fault trees

    International Nuclear Information System (INIS)

    In this paper, a new method for quantitative security risk assessment of complex systems is presented, combining fault-tree analysis, traditionally used in reliability analysis, with the recently introduced Attack-tree analysis, proposed for the study of malicious attack patterns. The combined use of fault trees and attack trees helps the analyst to effectively face the security challenges posed by the introduction of modern ICT technologies in the control systems of critical infrastructures. The proposed approach allows considering the interaction of malicious deliberate acts with random failures. Formal definitions of fault tree and attack tree are provided and a mathematical model for the calculation of system fault probabilities is presented.

  19. Heart attack first aid

    Science.gov (United States)

    First aid - heart attack; First aid - cardiopulmonary arrest; First aid - cardiac arrest ... A heart attack occurs when the blood flow that carries oxygen to the heart is blocked. The heart muscle becomes ...

  20. Pericarditis - after heart attack

    Science.gov (United States)

    ... medlineplus.gov/ency/article/000166.htm Pericarditis - after heart attack To use the sharing features on this page, ... occur in the days or weeks following a heart attack. Causes Two types of pericarditis can occur after ...

  1. Heart attack first aid

    Science.gov (United States)

    First aid - heart attack; First aid - cardiopulmonary arrest; First aid - cardiac arrest ... A heart attack occurs when the blood flow that carries oxygen to the heart is blocked. The heart muscle ...

  2. Terrorist attacks escalate in frequency and fatalities preceding highly lethal attacks.

    Directory of Open Access Journals (Sweden)

    Andy Martens

    Full Text Available Highly lethal terrorist attacks, which we define as those killing 21 or more people, account for 50% of the total number of people killed in all terrorist attacks combined, yet comprise only 3.5% of terrorist attacks. Given the disproportionate influence of these incidents, uncovering systematic patterns in attacks that precede and anticipate these highly lethal attacks may be of value for understanding attacks that exact a heavy toll on life. Here we examined whether the activity of terrorist groups escalates--both in the number of people killed per attack and in the frequency of attacks--leading up to highly lethal attacks. Analyses of terrorist attacks drawn from a state-of-the-art international terrorism database (The Global Terrorism Database showed evidence for both types of escalation leading up to highly lethal attacks, though complexities to the patterns emerged as well. These patterns of escalation do not emerge among terrorist groups that never commit a highly lethal attack.

  3. Crystallization and preliminary X-ray diffraction studies of a catechol-O-methyltransferase/inhibitor complex

    International Nuclear Information System (INIS)

    Catechol-O-methyltransferase has been co-crystallized with a novel inhibitor, which has potential therapeutic application in the Parkinson’s disease therapy. Inhibitors of the enzyme catechol-O-methyltransferase (COMT) are used as co-adjuvants in the therapy of Parkinson’s disease. A recombinant form of the soluble cytosolic COMT from rat has been co-crystallized with a new potent inhibitor, BIA 8-176 [(3,4-dihydroxy-2-nitrophenyl)phenylmethanone], by the vapour-diffusion method using PEG 6K as precipitant. Crystals diffract to 1.6 Å resolution on a synchrotron-radiation source and belong to the monoclinic space group P21, with unit-cell parameters a = 52.77, b = 79.63, c = 61.54 Å, β = 91.14°

  4. Crystallization and preliminary X-ray diffraction studies of a catechol-O-methyltransferase/inhibitor complex

    Energy Technology Data Exchange (ETDEWEB)

    Rodrigues, M. L. [Instituto de Tecnologia Química e Biológica (ITQB), Universidade Nova de Lisboa, Av. República, Apt. 127, 2781-901 Oeiras (Portugal); Bonifácio, M. J.; Soares-da-Silva, P. [Department of Research and Development, BIAL, 4785 S. Mamede do Coronado (Portugal); Carrondo, M. A.; Archer, M., E-mail: archer@itqb.unl.pt [Instituto de Tecnologia Química e Biológica (ITQB), Universidade Nova de Lisboa, Av. República, Apt. 127, 2781-901 Oeiras (Portugal)

    2005-01-01

    Catechol-O-methyltransferase has been co-crystallized with a novel inhibitor, which has potential therapeutic application in the Parkinson’s disease therapy. Inhibitors of the enzyme catechol-O-methyltransferase (COMT) are used as co-adjuvants in the therapy of Parkinson’s disease. A recombinant form of the soluble cytosolic COMT from rat has been co-crystallized with a new potent inhibitor, BIA 8-176 [(3,4-dihydroxy-2-nitrophenyl)phenylmethanone], by the vapour-diffusion method using PEG 6K as precipitant. Crystals diffract to 1.6 Å resolution on a synchrotron-radiation source and belong to the monoclinic space group P2{sub 1}, with unit-cell parameters a = 52.77, b = 79.63, c = 61.54 Å, β = 91.14°.

  5. Bimolecular Complementation to Visualize Filovirus VP40-Host Complexes in Live Mammalian Cells: Toward the Identification of Budding Inhibitors

    Directory of Open Access Journals (Sweden)

    Yuliang Liu

    2011-01-01

    Full Text Available Virus-host interactions play key roles in promoting efficient egress of many RNA viruses, including Ebola virus (EBOV or “e” and Marburg virus (MARV or “m”. Late- (L- domains conserved in viral matrix proteins recruit specific host proteins, such as Tsg101 and Nedd4, to facilitate the budding process. These interactions serve as attractive targets for the development of broad-spectrum budding inhibitors. A major gap still exists in our understanding of the mechanism of filovirus budding due to the difficulty in detecting virus-host complexes and mapping their trafficking patterns in the natural environment of the cell. To address this gap, we used a bimolecular complementation (BiMC approach to detect, localize, and follow the trafficking patterns of eVP40-Tsg101 complexes in live mammalian cells. In addition, we used the BiMC approach along with a VLP budding assay to test small molecule inhibitors identified by in silico screening for their ability to block eVP40 PTAP-mediated interactions with Tsg101 and subsequent budding of eVP40 VLPs. We demonstrated the potential broad spectrum activity of a lead candidate inhibitor by demonstrating its ability to block PTAP-dependent binding of HIV-1 Gag to Tsg101 and subsequent egress of HIV-1 Gag VLPs.

  6. ATP-site binding inhibitor effectively targets mTORC1 and mTORC2 complexes in glioblastoma.

    Science.gov (United States)

    Neil, Jayson; Shannon, Craig; Mohan, Avinash; Laurent, Dimitri; Murali, Raj; Jhanwar-Uniyal, Meena

    2016-03-01

    The PI3K-AKT-mTOR signaling axis is central to the transformed phenotype of glioblastoma (GBM) cells, due to frequent loss of tumor suppressor PTEN (phosphatase and tensin homolog deleted on chromosome 10). The mechanistic target of rapamycin (mTOR) kinase is present in two cellular multi-protein complexes, mTORC1 and mTORC2, which have distinct subunit composition, substrates and mechanisms of action. Targeting the mTOR protein is a promising strategy for GBM therapy. However, neither of these complexes is fully inhibited by the allosteric inhibitor of mTOR, rapamycin or its analogs. Herein, we provide evidence that the combined inhibition of mTORC1/2, using the ATP-competitive binding inhibitor PP242, would effectively suppress GBM growth and dissemination as compared to an allosteric binding inhibitor of mTOR. GBM cells treated with PP242 demonstrated significantly decreased activation of mTORC1 and mTORC2, as shown by reduced phosphorylation of their substrate levels, p70 S6KThr389 and AKTSer473, respectively, in a dose-dependent manner. Furthermore, insulin induced activation of these kinases was abrogated by pretreatment with PP242 as compared with rapamycin. Unlike rapamycin, PP242 modestly activates extracellular regulated kinase (ERK1/2), as shown by expression of pERKThr202/Tyr204. Cell proliferation and S-phase entry of GBM cells was significantly suppressed by PP242, which was more pronounced compared to rapamycin treatment. Lastly, PP242 significantly suppressed the migration of GBM cells, which was associated with a change in cellular behavior rather than cytoskeleton loss. In conclusion, these results underscore the potential therapeutic use of the PP242, a novel ATP-competitive binding inhibitor of mTORC1/2 kinase, in suppression of GBM growth and dissemination. PMID:26719046

  7. Seven Deadliest Network Attacks

    Energy Technology Data Exchange (ETDEWEB)

    Prowell, Stacy J [ORNL; Borkin, Michael [None; Kraus, Robert [Solutionary, Inc.

    2010-05-01

    Do you need to keep up with the latest hacks, attacks, and exploits effecting networks? Then you need "Seven Deadliest Network Attacks". This book pinpoints the most dangerous hacks and exploits specific to networks, laying out the anatomy of these attacks including how to make your system more secure. You will discover the best ways to defend against these vicious hacks with step-by-step instruction and learn techniques to make your computer and network impenetrable. Attacks detailed in this book include: Denial of Service; War Dialing; Penetration 'Testing'; Protocol Tunneling; Spanning Tree Attacks; Man-in-the-Middle; and, Password Replay. Knowledge is power, find out about the most dominant attacks currently waging war on computers and networks globally. Discover the best ways to defend against these vicious attacks; step-by-step instruction shows you how. Institute countermeasures, don't be caught defenseless again, learn techniques to make your computer and network impenetrable.

  8. FAST CORRELATION ATTACKS ON BLUETOOTH COMBINER

    Institute of Scientific and Technical Information of China (English)

    Ma Weiju; Feng Dengguo

    2006-01-01

    A simple fast correlation attack is used to analysis the security of Bluetooth combiner in this paper.This attack solves the tradeoff between the length of the keystream and the computing complexity needed to recover the secret key. We give the computing complexities of the attack algorithm according to different lengths of the known keystream. The result is less time-consuming than before. It is also shown that the security of the modified Bluetooth combiner by Hermelin and Nyberg is not significantly enhanced.

  9. What Is a Heart Attack?

    Science.gov (United States)

    ... from the NHLBI on Twitter. What Is a Heart Attack? Español A heart attack happens when the flow ... This Content: NEXT >> Featured Video What is a heart attack? 05/22/2014 Describes how a heart attack ...

  10. What Causes a Heart Attack?

    Science.gov (United States)

    ... from the NHLBI on Twitter. What Causes a Heart Attack? Coronary Heart Disease A heart attack happens if ... This Content: NEXT >> Featured Video What is a heart attack? 05/22/2014 Describes how a heart attack ...

  11. Life After a Heart Attack

    Science.gov (United States)

    ... from the NHLBI on Twitter. Life After a Heart Attack Many people survive heart attacks and live active, ... a few weeks. Anxiety and Depression After a Heart Attack After a heart attack, many people worry about ...

  12. Bovine pancreatic trypsin inhibitor-trypsin complex as a detection system for recombinant proteins.

    OpenAIRE

    Borjigin, J; Nathans, J

    1993-01-01

    Bovine pancreatic trypsin inhibitor (BPTI) binds to trypsin and anhydrotrypsin (an enzymatically inactive derivative of trypsin) with affinities of 6 x 10(-14) and 1.1 x 10(-13) M, respectively. We have taken advantage of the high affinity and specificity of this binding reaction to develop a protein tagging system in which biotinylated trypsin or biotinylated anhydrotrypsin is used as the reagent to detect recombinant fusion proteins into which BPTI has been inserted. Two proteins, opsin and...

  13. Extensions of the Cube Attack Based on Low Degree Annihilators

    Science.gov (United States)

    Zhang, Aileen; Lim, Chu-Wee; Khoo, Khoongming; Wei, Lei; Pieprzyk, Josef

    At Crypto 2008, Shamir introduced a new algebraic attack called the cube attack, which allows us to solve black-box polynomials if we are able to tweak the inputs by varying an initialization vector. In a stream cipher setting where the filter function is known, we can extend it to the cube attack with annihilators: By applying the cube attack to Boolean functions for which we can find low-degree multiples (equivalently annihilators), the attack complexity can be improved. When the size of the filter function is smaller than the LFSR, we can improve the attack complexity further by considering a sliding window version of the cube attack with annihilators. Finally, we extend the cube attack to vectorial Boolean functions by finding implicit relations with low-degree polynomials.

  14. Pyrithione-based ruthenium complexes as inhibitors of aldo-keto reductase 1C enzymes and anticancer agents.

    Science.gov (United States)

    Kljun, Jakob; Anko, Maja; Traven, Katja; Sinreih, Maša; Pavlič, Renata; Peršič, Špela; Ude, Žiga; Codina, Elisa Esteve; Stojan, Jure; Lanišnik Rižner, Tea; Turel, Iztok

    2016-08-01

    Four ruthenium complexes of clinically used zinc ionophore pyrithione and its oxygen analog 2-hydroxypyridine N-oxide were prepared and evaluated as inhibitors of enzymes of the aldo-keto reductase subfamily 1C (AKR1C). A kinetic study assisted with docking simulations showed a mixed type of inhibition consisting of a fast reversible and a slow irreversible step in the case of both organometallic compounds 1A and 1B. Both compounds also showed a remarkable selectivity towards AKR1C1 and AKR1C3 which are targets for breast cancer drug design. The organoruthenium complex of ligand pyrithione as well as pyrithione itself also displayed toxicity on the hormone-dependent MCF-7 breast cancer cell line with EC50 values in the low micromolar range. PMID:27357845

  15. Structural studies of β-carbonic anhydrase from the green alga Coccomyxa: inhibitor complexes with anions and acetazolamide.

    Directory of Open Access Journals (Sweden)

    Shenghua Huang

    Full Text Available The β-class carbonic anhydrases (β-CAs are widely distributed among lower eukaryotes, prokaryotes, archaea, and plants. Like all CAs, the β-enzymes catalyze an important physiological reaction, namely the interconversion between carbon dioxide and bicarbonate. In plants the enzyme plays an important role in carbon fixation and metabolism. To further explore the structure-function relationship of β-CA, we have determined the crystal structures of the photoautotroph unicellular green alga Coccomyxa β-CA in complex with five different inhibitors: acetazolamide, thiocyanate, azide, iodide, and phosphate ions. The tetrameric Coccomyxa β-CA structure is similar to other β-CAs but it has a 15 amino acid extension in the C-terminal end, which stabilizes the tetramer by strengthening the interface. Four of the five inhibitors bind in a manner similar to what is found in complexes with α-type CAs. Iodide ions, however, make contact to the zinc ion via a zinc-bound water molecule or hydroxide ion--a type of binding mode not previously observed in any CA. Binding of inhibitors to Coccomyxa β-CA is mediated by side-chain movements of the conserved residue Tyr-88, extending the width of the active site cavity with 1.5-1.8 Å. Structural analysis and comparisons with other α- and β-class members suggest a catalytic mechanism in which the movements of Tyr-88 are important for the CO(2-HCO(3(- interconversion, whereas a structurally conserved water molecule that bridges residues Tyr-88 and Gln-38, seems important for proton transfer, linking water molecules from the zinc-bound water to His-92 and buffer molecules.

  16. Structural studies of β-carbonic anhydrase from the green alga Coccomyxa: inhibitor complexes with anions and acetazolamide.

    Science.gov (United States)

    Huang, Shenghua; Hainzl, Tobias; Grundström, Christin; Forsman, Cecilia; Samuelsson, Göran; Sauer-Eriksson, A Elisabeth

    2011-01-01

    The β-class carbonic anhydrases (β-CAs) are widely distributed among lower eukaryotes, prokaryotes, archaea, and plants. Like all CAs, the β-enzymes catalyze an important physiological reaction, namely the interconversion between carbon dioxide and bicarbonate. In plants the enzyme plays an important role in carbon fixation and metabolism. To further explore the structure-function relationship of β-CA, we have determined the crystal structures of the photoautotroph unicellular green alga Coccomyxa β-CA in complex with five different inhibitors: acetazolamide, thiocyanate, azide, iodide, and phosphate ions. The tetrameric Coccomyxa β-CA structure is similar to other β-CAs but it has a 15 amino acid extension in the C-terminal end, which stabilizes the tetramer by strengthening the interface. Four of the five inhibitors bind in a manner similar to what is found in complexes with α-type CAs. Iodide ions, however, make contact to the zinc ion via a zinc-bound water molecule or hydroxide ion--a type of binding mode not previously observed in any CA. Binding of inhibitors to Coccomyxa β-CA is mediated by side-chain movements of the conserved residue Tyr-88, extending the width of the active site cavity with 1.5-1.8 Å. Structural analysis and comparisons with other α- and β-class members suggest a catalytic mechanism in which the movements of Tyr-88 are important for the CO(2)-HCO(3)(-) interconversion, whereas a structurally conserved water molecule that bridges residues Tyr-88 and Gln-38, seems important for proton transfer, linking water molecules from the zinc-bound water to His-92 and buffer molecules. PMID:22162771

  17. Ruthenium(II) polypyridyl complexes with hydrophobic ancillary ligand as Aβ aggregation inhibitors.

    Science.gov (United States)

    Vyas, Nilima A; Ramteke, Shefali N; Kumbhar, Avinash S; Kulkarni, Prasad P; Jani, Vinod; Sonawane, Uddhavesh B; Joshi, Rajendra R; Joshi, Bimba; Erxleben, Andrea

    2016-10-01

    The synthesis, spectral and electrochemical characterization of the complexes of the type [Ru(NN)2(txbg)](2+) where NN is 2,2'-bipyridine (bpy) (1), 1,10-phenanthroline (phen) (2), dipyrido [3,2-d:2',3f] quinoxaline (dpq) (3), and dipyrido[3,2-a:2',3'-c]phenazine (dppz) (4) which incorporate the tetra-xylene bipyridine glycoluril (txbg) as the ancillary ligand are described in detail. Crystal structures of ligand txbg and complex 2 were solved by single crystal X-ray diffraction. Thioflavin T (ThT) fluorescence and Transmission Electron Microscopy (TEM) results indicated that at micromolar concentration all complexes exhibit significant potential of Aβ aggregation inhibition, while the ligand txbg displayed weak activity towards Aβ aggregation. Complex 1 showed relatively low inhibition (70%) while complexes 2-4 inhibited nearly 100% Aβ aggregation after 240 h of incubation. The similar potential of complexes 2-4 and absence of any trend in their activity with the planarity of polypyridyl ligands suggests there is no marked effect of planarity of coligands on their inhibitory potential. Further studies on acetylcholinesterase (AChE) inhibition indicated very weak activity of these complexes against AChE. Detailed interactions of Aβ with both ligand and complex 2 have been studied by molecular modeling. Complex 2 showed interactions involving all three polypyridyl ligands with hydrophobic region of Aβ. Furthermore, the toxicity of these complexes towards human neuroblastoma cells was evaluated by MTT assay and except complex 4, the complexes displayed very low toxicity. PMID:27406812

  18. Heteroskorpionate Ligands In Coordination Chemistry – Complexes Relevant To Hydrogenation Catalysis, Olefine Epoxidation, And Inhibitor Studies

    OpenAIRE

    Tampier, Stefan

    2012-01-01

    This work focuses on (i) the syntheses and characterisations of various ruthenium(II) complexes bearing the bdmpza ligand, (ii) complexes based on the new bis(3,5-di-tert-butylpyrazol-1-yl)dithioacetato ligand, (iii) complexes based on bispyrazolylacetate esters, and (iv) the syntheses and characteristics of ferrocenyl-substituted ligands derived from bispyrazolylacetic acid and related chelating ligands. Chapter 3.1.2 outlines principle substitution reactions of [Ru(bdmpza)Cl(PPh3)2] (1) [bd...

  19. Nocturnal panic attacks

    OpenAIRE

    Lopes Fabiana L; Nardi Antonio E; Nascimento Isabella; Valença Alexandre M.; Zin Walter A.

    2002-01-01

    The panic-respiration connection has been presented with increasing evidences in the literature. We report three panic disorder patients with nocturnal panic attacks with prominent respiratory symptoms, the overlapping of the symptoms with the sleep apnea syndrome and a change of the diurnal panic attacks, from spontaneous to situational pattern. The implication of these findings and awareness to the distinct core of the nocturnal panic attacks symptoms may help to differentiate them from sle...

  20. The complex between urokinase (uPA) and its type-1 inhibitor (PAI-1) in pulmonary adenocarcinoma: Relation to prognosis

    DEFF Research Database (Denmark)

    Pappot, Helle; Pedersen, Anders N; Brünner, Nils; Christensen, Ib Jarle

    2006-01-01

    In a lung cancer population comprising tumor tissue from 99 pulmonary adenocarcinoma patients, the relationship between tumor tissue level of the complex formed of urokinase (uPA) and its type-1 inhibitor (PAI-1) and survival was studied. The study included patient material previously investigated...... patients with low PAI-1 and high uPA-PAI-1 complex (HR = 3.06, p = 0.01). This is the first investigation of the prognostic impact of uPA-PAI-1 complex in a tumor type other than breast cancer, showing low levels of uPA-PAI-1 complex in combination with high levels of PAI-1 to be associated with poor...... for the prognostic impact of PAI-1 on survival. Standard clinical parameters were available and the patients had a median survival time of 25 months. An ELISA established to measure preformed uPA-PAI-1 complexes was applied to the tumor extracts and previously measured data on uPA and PAI-1 levels...

  1. Crystallization and preliminary crystallographic analysis of 2-aminophenol 1,6-dioxygenase complexed with substrate and with an inhibitor

    International Nuclear Information System (INIS)

    The crystallization of 2-aminophenol 1,6-dioxygenase in complexes with its substrate and with an inhibitor is reported. Dioxygen activation implemented by nonhaem FeII enzymes containing the 2-His-1-carboxylate facial triad has been extensively studied in recent years. Extradiol dioxygenase is the archetypal member of this superfamily and catalyzes the oxygenolytic ring opening of catechol analogues. Here, the crystallization and preliminary X-ray analysis of 2-aminophenol 1,6-dioxygenase, an enzyme representing a minor subset of extradiol dioxygenases that catalyze the fission of 2-aminophenol rather than catecholic compounds, is reported. Crystals of the holoenzyme with FeII and of complexes with the substrate 2-aminophenol and the suicide inhibitor 4-nitrocatechol were grown using the cocrystallization method under the same conditions as used for the crystallization of the apoenzyme. The crystals belonged to space group C2 and diffracted to 2.3–2.7 Å resolution; the crystal that diffracted to the highest resolution had unit-cell parameters a = 270.24, b = 48.39, c = 108.55 Å, β = 109.57°. All X-ray data sets collected from diffraction-quality crystals were suitable for structure determination

  2. Crystallization and preliminary crystallographic data for a ternary complex between tissue factor, factor VIIa and a BPTI-derived inhibitor

    Science.gov (United States)

    Stura, Enrico A.; Ruf, Wolfram; Wilson, Ian A.

    1996-10-01

    The binding of tissue factor (TF) with the serine protease coagulation factor VIIa (VIIa) is the initial trigger for activation of the coagulation protease cascades. In complex with TF, VIIa has profoundly enhanced function in the limited proteolytic activation of the natural substrate factors X and IX. Here we report the screening and identification of crystallization conditions to produce diffraction quality crystals of the complex between TF · VIIa and a potent inhibitor (5L 15) derived from mutagenesis of the bovine pancreatic trypsin inhibitor (BPTI) sequence. The complex crystals were obtained from the soluble extracellular domain of tissue factor, expressed in Escherichia coli as a fusion protein, VIIa expressed in mammalian cells and recombinant 5L15. Because only 1.5 mg of complex were available for this work, a reverse screening based strategy was used in the search and optimization of the crystallization conditions. Two different crystal forms were obtained from polyethylene glycol 4000 and monomethyl polyethylene glycol 2000 with cacodylate buffer at pH 6.5 in the presence of sodium and calcium ions. The addition of magnesium and zinc have profound effects on the crystallization. Both crystal forms are trigonal with cell parameters a = b = 129.3 Å, c = 110.8 Å and a = b = 67.2 Å, c = 314.8 Å diffracting to 7 and 3.2 Å resolution, respectively, each with one molecule in the asymmetric unit. Complete data sets have been collected from each of these forms to the resolution to which the crystals diffract. A structural understanding of the interaction of VIIa with its cofactor TF to form a binary enzyme, and its inhibition by 5L15 will provide a basis for the development of antithrombotic strategies.

  3. Slow conformational dynamics of an endonuclease persist in its complex with its natural protein inhibitor.

    OpenAIRE

    Whittaker, S. B.; Czisch, M.; Wechselberger, R.; Kaptein, R; Hemmings, A. M.; James, R.; Kleanthous, C; Moore, G. R.

    2000-01-01

    The bacterial toxin colicin E9 is secreted by producing Escherichia coli cells with its 9.5 kDa inhibitor protein Im9 bound tightly to its 14.5 kDa C-terminal DNase domain. Double- and triple-resonance NMR spectra of the isolated DNase domain uniformly labeled with 13C/15N bound to unlabeled Im9 contain more signals than expected for a single DNase conformer, consistent with the bound DNase being present in more than one form. The presence of chemical exchange cross peaks in 750 MHz 15N-1H-15...

  4. Discovery of Novel Small-Molecule HIV-1 Replication Inhibitors That Stabilize Capsid Complexes

    OpenAIRE

    Lamorte, Louie; Titolo, Steve; Lemke, Christopher T.; Goudreau, Nathalie; Mercier, Jean-François; Wardrop, Elizabeth; Shah, Vaibhav B.; von Schwedler, Uta K.; Langelier, Charles; Banik, Soma S. R.; Aiken, Christopher; Sundquist, Wesley I.; Mason, Stephen W.

    2013-01-01

    The identification of novel antiretroviral agents is required to provide alternative treatment options for HIV-1-infected patients. The screening of a phenotypic cell-based viral replication assay led to the identification of a novel class of 4,5-dihydro-1H-pyrrolo[3,4-c]pyrazol-6-one (pyrrolopyrazolone) HIV-1 inhibitors, exemplified by two compounds: BI-1 and BI-2. These compounds inhibited early postentry stages of viral replication at a step(s) following reverse transcription but prior to ...

  5. Identify Inhibitors on DAPK2 and ELMO1-DOCK2 Complex via Virtual Screening

    OpenAIRE

    Wu, Meixin

    2016-01-01

    Death associated protein kinase 2 (DAPK2) is a serine threonine kinase with 370 amino acid residues, whose structure is highly conserved with the other members in the death associated protein kinase (DAPK) family. To find out the inhibitors with high specificity to DAPK2, structural based virtual screening was carried out. According to the results of docking, ligand clustering, MM/GBSA analysis and position of ligands in the DAPK2 binding pocket, it can be concluded that DA7, whose binding af...

  6. Seven deadliest USB attacks

    CERN Document Server

    Anderson, Brian

    2010-01-01

    Do you need to keep up with the latest hacks, attacks, and exploits effecting USB technology? Then you need Seven Deadliest USB Attacks. This book pinpoints the most dangerous hacks and exploits specific to USB, laying out the anatomy of these attacks including how to make your system more secure. You will discover the best ways to defend against these vicious hacks with step-by-step instruction and learn techniques to make your computer and network impenetrable. Attacks detailed in this book include: USB Hacksaw USB Switchblade USB Based Virus/Malicous Code Launch USB Device Overflow RAMdum

  7. Seven Deadliest Microsoft Attacks

    CERN Document Server

    Kraus, Rob; Borkin, Mike; Alpern, Naomi

    2010-01-01

    Do you need to keep up with the latest hacks, attacks, and exploits effecting Microsoft products? Then you need Seven Deadliest Microsoft Attacks. This book pinpoints the most dangerous hacks and exploits specific to Microsoft applications, laying out the anatomy of these attacks including how to make your system more secure. You will discover the best ways to defend against these vicious hacks with step-by-step instruction and learn techniques to make your computer and network impenetrable. Windows Operating System-Password AttacksActive Directory-Escalat

  8. Seven Deadliest Network Attacks

    CERN Document Server

    Prowell, Stacy; Borkin, Mike

    2010-01-01

    Do you need to keep up with the latest hacks, attacks, and exploits effecting networks? Then you need Seven Deadliest Network Attacks. This book pinpoints the most dangerous hacks and exploits specific to networks, laying out the anatomy of these attacks including how to make your system more secure. You will discover the best ways to defend against these vicious hacks with step-by-step instruction and learn techniques to make your computer and network impenetrable. Attacks detailed in this book include: Denial of Service War Dialing Penetration "Testing" Protocol Tunneling Spanning Tree At

  9. Stability of the Human Hsp90-p50Cdc37 Chaperone Complex against Nucleotides and Hsp90 Inhibitors, and the Influence of Phosphorylation by Casein Kinase 2

    Directory of Open Access Journals (Sweden)

    Sanne H. Olesen

    2015-01-01

    Full Text Available The molecular chaperone Hsp90 is regulated by co-chaperones such as p50Cdc37, which recruits a wide selection of client protein kinases. Targeted disruption of the Hsp90-p50Cdc37 complex by protein–protein interaction (PPI inhibitors has emerged as an alternative strategy to treat diseases characterized by aberrant Hsp90 activity. Using isothermal microcalorimetry, ELISA and GST-pull down assays we evaluated reported Hsp90 inhibitors and nucleotides for their ability to inhibit formation of the human Hsp90β-p50Cdc37 complex, reconstituted in vitro from full-length proteins. Hsp90 inhibitors, including the proposed PPI inhibitors gedunin and H2-gamendazole, did not affect the interaction of Hsp90 with p50Cdc37 in vitro. Phosphorylation of Hsp90 and p50Cdc37 by casein kinase 2 (CK2 did not alter the thermodynamic signature of complex formation. However, the phosphorylated complex was vulnerable to disruption by ADP (IC50 = 32 µM, while ATP, AMPPNP and Hsp90 inhibitors remained largely ineffective. The differential inhibitory activity of ADP suggests that phosphorylation by CK2 primes the complex for dissociation in response to a drop in ATP/ADP levels. The approach applied herein provides robust assays for a comprehensive biochemical evaluation of potential effectors of the Hsp90-p50Cdc37 complex, such as phosphorylation by a kinase or the interaction with small molecule ligands.

  10. Efficacy and safety of TNF-α inhibitors in refractory primary complex aphthosis

    DEFF Research Database (Denmark)

    Sand, Freja Lærke; Thomsen, Simon Francis

    2013-01-01

    Otherwise healthy patients with severe recurrent mucocutaneous aphthous ulcerations (complex aphthosis) may require systemic immunomodulatory therapy. However, a subset of patients remain resistant or intolerant to recommended therapeutic agents. Recently, case reports have described that tumor...

  11. Study of Vanadium Complexes as Novel Inhibitors of Bacillus Pasteurii and Canavalia Ensiformis Urease Enzyme

    International Nuclear Information System (INIS)

    Oxovanadium(IV) complexes with aroylhydrazine ligands have been synthesized. Structural elucidation of synthesized complexes is carried out with the help of various physical, chemical and spectral analysis. Dimeric nature of synthesized complexes further characterized by effective magnetic moments, spectral, conductance, CHN and metal analysis. In the current study we examined 1c to 10c vanadium (IV)-aroylhydrazine complexes for their mechanism of inhibition with the nickel containing active sites of Canavalia ensiformis (Jack bean) and Bacillus pasteurii ureases. Inhibition of both urease enzymes by compounds 1c-10c are depends on concentration. Lineweaver-Burk as well as Dixon plots and their secondary replots indicated that the mechanisms of inhibition exhibited by vanadium complexes 1c-10c are very diverse. The Ki values ranging from 15.1-79.3 micro M for Canavalia ensiformis urease while for Bacillus pasteurii urease 25.2-123.7 micro M. The model presented here is evidenced by biochemical enzyme kinetics data. Efforts are made to obtain significant approach into the pharmacophore needs of urease. The high affinity of these vanadium complexes along with their safe profile against plants could make them promising lead candidates and provides fertile ground for future research. (author)

  12. Differential efficacy of inhibition of mitochondrial and bacterial cytochrome bc1 complexes by center N inhibitors antimycin, ilicicolin H and funiculosin

    OpenAIRE

    Rotsaert, Frederik A. J.; Ding, Martina G.; Trumpower, Bernard L.

    2007-01-01

    We have compared the efficacy of inhibition of the cytochrome bc1 complexes from yeast and bovine heart mitochondria and Paracoccus denitrificans by antimycin, ilicicolin H, and funiculosin, three inhibitors that act at the quinone reduction site at center N of the enzyme. Although the three inhibitors have some structural features in common, they differ significantly in their patterns of inhibition. Also, while the overall folding pattern of cytochrome b around center N is similar in the enz...

  13. Mammalian Target of Rapamycin Inhibitor Induced Complete Remission of a Recurrent Subependymal Giant Cell Astrocytoma in a Patient Without Features of Tuberous Sclerosis Complex.

    Science.gov (United States)

    Appalla, Deepika; Depalma, Andres; Calderwood, Stanley

    2016-07-01

    The majority of patients with subependymal giant cell astrocytoma (SEGA) have tuberous sclerosis complex (TSC). In such patients, the mammalian target of rapamycin (mTOR) inhibitor everolimus has been shown to induce responses. Isolated SEGA have been reported in patients without clinical or genetic features of TSC. The treatment of these patients with everolimus has not previously been reported. We treated a patient with a recurrent isolated SEGA with an mTOR inhibitor. The patient tolerated therapy well and had a sustained complete remission. MTOR inhibitors may be useful for the treatment of isolated SEGA. Further study is warranted. PMID:26929034

  14. Situational awareness of a coordinated cyber attack

    Science.gov (United States)

    Sudit, Moises; Stotz, Adam; Holender, Michael

    2005-03-01

    As technology continues to advance, services and capabilities become computerized, and an ever increasing amount of business is conducted electronically the threat of cyber attacks gets compounded by the complexity of such attacks and the criticality of the information which must be secured. A new age of virtual warfare has dawned in which seconds can differentiate between the protection of vital information and/or services and a malicious attacker attaining their goal. In this paper we present a novel approach in the real-time detection of multistage coordinated cyber attacks and the promising initial testing results we have obtained. We introduce INFERD (INformation Fusion Engine for Real-time Decision-making), an adaptable information fusion engine which performs fusion at levels zero, one, and two to provide real-time situational assessment and its application to the cyber domain in the ECCARS (Event Correlation for Cyber Attack Recognition System) system. The advantages to our approach are fourfold: (1) The complexity of the attacks which we consider, (2) the level of abstraction in which the analyst interacts with the attack scenarios, (3) the speed at which the information fusion is presented and performed, and (4) our disregard for ad-hoc rules or a priori parameters.

  15. Current therapy for chronic cerebrovascular attack

    Directory of Open Access Journals (Sweden)

    A. A. Shmonin

    2015-03-01

    Full Text Available Chronic cerebrovascular attack (CCVA is a brain lesion caused by vascular factors. CCVA appears as cognitive impairments (CIs, affective (emotional disorders and focal syndromes. Treatment for CCVA requires a comprehensive approach. Effective combination therapy for CCVA involves secondary prevention of stroke and CIs; treatment of CIs; treatment of depression and other affective disorders; and neuroprotective therapy. Basic therapy for CCVA includes modification of risk factors, antihypertensive, hypolipidemic, and antithrombotic therapies. Central acetylcholinesterase inhibitors (galantamine, rivastigmine, donepezil and a reversible NMDA receptor blocker (memantine are symptomatically used at a stage of vascular and mixed dementia. There are no unique guidelines for the therapy of mild and moderate vascular nondementia-related CIs. Drug use, based on the neurochemical mechanisms underlying the development of vascular CIs, is substantiated. When choosing psychotropic agents, it is necessary to take into account the causes and clinical manifestations of neuromediator deficiency. Antidepressants are used as essential drugs. Neuroleptics and tranquilizers are additionally administered in complex-pattern syndromes, such as depression with marked anxiety. Prescription of neuroprotectors may be effective in treating both stroke and CCVA. These medicaments are most effective when a damaging factor acts, i.e. neuroprotectors should be given in a risk situation and to reduce damage. Citicoline is one of the most test drugs in a group of neuroprotectors. 

  16. A NEW METHOD FOR RESYNCHRONIZATION ATTACK

    Institute of Scientific and Technical Information of China (English)

    2006-01-01

    This paper presents a new method for resynchronization attack, which is the combination of the differential cryptanalysis and algebraic attack. By using the new method one gets a system of linear equations or low-degree equations about initial keys, and the solution of the system of equations results in the recovery of the initial keys. This method has a lower computational complexity and better performance of attack in contrast to the known methods. Accordingly, the design of the resynchronization stream generators should be reconsidered to make them strong enough to avoid our attacks. When implemented to the Toyocrypt, our method gains the computational complexity of O(217), and that of O(267) for LILI-128.

  17. An electroblotting, two-step procedure for the detection of proteinases and the study of proteinase/inhibitor complexes in gelatin-containing polyacrylamide gels.

    Science.gov (United States)

    Visal-Shah, S; Vrain, T C; Yelle, T C; Nguyen-Quoc, B; Michaud, D

    2001-08-01

    A two-step gelatin/polyacrylamide gel electrophoresis (gelatin/PAGE) procedure was devised for the detection of proteinases and the study of proteinase/inhibitor interactions in complex biological extracts. The proteins are first resolved by sodium dodecyl sulfate (SDS)-PAGE under reducing or nonreducing conditions, and electrotransferred into a 0.75 mm-thick accompanying polyacrylamide slab gel containing 0.1% w/v porcine gelatin. The active proteinase bands are developed by a gelatin proteolysis step in the accompanying gel in the presence or absence of diagnostic proteinase inhibitors, allowing the assessment of proteinase classes and the visual discrimination of inhibitor-'sensitive' and -'insensitive' proteinases in complex extracts. Alternatively, protein extracts are preincubated with specific reversible inhibitors before electrophoresis, allowing a rapid discrimination of strong and weak interactions implicating proteinases and reversible inhibitors. In comparison with the standard gelatin/PAGE procedure, that involves copolymerization of gelatin with acrylamide in the resolving gel, this new procedure simplifies proteinase patterns, avoids overestimation of proteinase numbers in complex extracts, and allows in certain conditions the estimation of proteinase molecular weights. Stem bromelain (EC 3.4.22.32), bovine trypsin (EC 3.4.21.4), papain (EC 3.4.22.2), and the extracellular (digestive) cysteine proteinases of five herbivorous pests are used as model enzymes to illustrate the usefulness of this approach in detecting proteinases and in studying their interactions with specific proteinaceous inhibitors potentially useful in biotechnology. PMID:11545387

  18. Continuous flow immobilized enzyme reactor-tandem mass spectrometry for screening of AChE inhibitors in complex mixtures.

    Science.gov (United States)

    Forsberg, Erica M; Green, James R A; Brennan, John D

    2011-07-01

    A method is described for identifying bioactive compounds in complex mixtures based on the use of capillary-scale monolithic enzyme-reactor columns for rapid screening of enzyme activity. A two-channel nanoLC system was used to continuously infuse substrate coupled with automated injections of substrate/small molecule mixtures, optionally containing the chromogenic Ellman reagent, through sol-gel derived acetylcholinesterase (AChE) doped monolithic columns. This is the first report of AChE encapsulated in monolithic silica for use as an immobilized enzyme reactor (IMER), and the first use of such IMERs for mixture screening. AChE IMER columns were optimized to allow rapid functional screening of compound mixtures based on changes in the product absorbance or the ratio of mass spectrometric peaks for product and substrate ions in the eluent. The assay had robust performance and produced a Z' factor of 0.77 in the presence of 2% (v/v) DMSO. A series of 52 mixtures consisting of 1040 compounds from the Canadian Compound Collection of bioactives was screened and two known inhibitors, physostigmine and 9-aminoacridine, were identified from active mixtures by manual deconvolution. The activity of the compounds was confirmed using the enzyme reactor format, which allowed determination of both IC(50) and K(I) values. Screening results were found to correlate well with a recently published fluorescence-based microarray screening assay for AChE inhibitors. PMID:21591743

  19. Modelling Social-Technical Attacks with Timed Automata

    DEFF Research Database (Denmark)

    David, Nicolas; David, Alexandre; Hansen, Rene Rydhof;

    2015-01-01

    Attacks on a system often exploit vulnerabilities that arise from human behaviour or other human activity. Attacks of this type, so-called socio-technical attacks, cover everything from social engineering to insider attacks, and they can have a devastating impact on an unprepared organisation. In...... this paper we develop an approach towards modelling socio-technical systems in general and socio-technical attacks in particular, using timed automata and illustrate its application by a complex case study. Thanks to automated model checking and automata theory, we can automatically generate possible...... attacks in our model and perform analysis and simulation of both model and attack, revealing details about the specific interaction between attacker and victim. Using timed automata also allows for intuitive modelling of systems, in which quantities like time and cost can be easily added and analysed....

  20. Use of the mTOR inhibitor everolimus in a patient with multiple manifestations of tuberous sclerosis complex including epilepsy

    Directory of Open Access Journals (Sweden)

    James W. Wheless

    2015-01-01

    Full Text Available Tuberous sclerosis complex (TSC is a genetic disease in which overactivation of mechanistic target of rapamycin (mTOR signaling leads to the growth of benign hamartomas in multiple organs, including the brain, and is associated with a high rate of epilepsy and neurological deficits. The mTOR inhibitor everolimus has been used in the treatment of subependymal giant cell astrocytomas and renal angiomyolipomas in patients with TSC. This article describes the case of a 13-year-old girl with TSC-associated epilepsy with refractory generalized seizures who initiated treatment with everolimus and experienced subsequent improvement in several TSC manifestations, including a reduction in seizure frequency from clusters of two or three daily to one every 2 to 4 weeks after 1.5 years of treatment.

  1. Natural Resistance to Inhibitors of the Ubiquinol Cytochrome c Oxidoreductase of Rubrivivax gelatinosus: Sequence and Functional Analysis of the Cytochrome bc1 Complex

    Science.gov (United States)

    Ouchane, Soufian; Agalidis, Ileana; Astier, Chantal

    2002-01-01

    Biochemical analyses of Rubrivivax gelatinosus membranes have revealed that the cytochrome bc1 complex is highly resistant to classical inhibitors including myxothiazol, stigmatellin, and antimycin. This is the first report of a strain exhibiting resistance to inhibitors of both catalytic Q0 and Qi sites. Because the resistance to cytochrome bc1 inhibitors is primarily related to the cytochrome b primary structure, the petABC operon encoding the subunits of the cytochrome bc1 complex of Rubrivivax gelatinosus was sequenced. In addition to homologies to the corresponding proteins from other organisms, the deduced amino acid sequence of the cytochrome b polypeptide shows (i) an E303V substitution in the highly conserved PEWY loop involved in quinol/stigmatellin binding, (ii) other substitutions that could be involved in resistance to cytochrome bc1 inhibitors, and (iii) 14 residues instead of 13 between the histidines in helix IV that likely serve as the second axial ligand to the bH and bL hemes, respectively. These characteristics imply different functional properties of the cytochrome bc1 complex of this bacterium. The consequences of these structural features for the resistance to inhibitors and for the properties of R. gelatinosus cytochrome bc1 are discussed with reference to the structure and function of the cytochrome bc1 complexes from other organisms. PMID:12081951

  2. Complex molecular mechanisms cooperate to mediate histone deacetylase inhibitors anti-tumour activity in neuroblastoma cells

    Directory of Open Access Journals (Sweden)

    Nardou Katya

    2008-06-01

    Full Text Available Abstract Background Histone deacetylase inhibitors (HDACi are a new class of promising anti-tumour agent inhibiting cell proliferation and survival in tumour cells with very low toxicity toward normal cells. Neuroblastoma (NB is the second most common solid tumour in children still associated with poor outcome in higher stages and, thus NB strongly requires novel treatment modalities. Results We show here that the HDACi Sodium Butyrate (NaB, suberoylanilide hydroxamic acid (SAHA and Trichostatin A (TSA strongly reduce NB cells viability. The anti-tumour activity of these HDACi involved the induction of cell cycle arrest in the G2/M phase, followed by the activation of the intrinsic apoptotic pathway, via the activation of the caspases cascade. Moreover, HDACi mediated the activation of the pro-apoptotic proteins Bid and BimEL and the inactivation of the anti-apoptotic proteins XIAP, Bcl-xL, RIP and survivin, that further enhanced the apoptotic signal. Interestingly, the activity of these apoptosis regulators was modulated by several different mechanisms, either by caspases dependent proteolytic cleavage or by degradation via the proteasome pathway. In addition, HDACi strongly impaired the hypoxia-induced secretion of VEGF by NB cells. Conclusion HDACi are therefore interesting new anti-tumour agents for targeting highly malignant tumours such as NB, as these agents display a strong toxicity toward aggressive NB cells and they may possibly reduce angiogenesis by decreasing VEGF production by NB cells.

  3. Mitochondrial Genome-Knockout Cells Demonstrate a Dual Mechanism of Action for the Electron Transport Complex I Inhibitor Mycothiazole

    Directory of Open Access Journals (Sweden)

    Michael V. Berridge

    2012-04-01

    Full Text Available Mycothiazole, a polyketide metabolite isolated from the marine sponge Cacospongia mycofijiensis, is a potent inhibitor of metabolic activity and mitochondrial electron transport chain complex I in sensitive cells, but other cells are relatively insensitive to the drug. Sensitive cell lines (IC50 0.36–13.8 nM include HeLa, P815, RAW 264.7, MDCK, HeLa S3, 143B, 4T1, B16, and CD4/CD8 T cells. Insensitive cell lines (IC50 12.2–26.5 μM include HL-60, LN18, and Jurkat. Thus, there is a 34,000-fold difference in sensitivity between HeLa and HL-60 cells. Some sensitive cell lines show a biphasic response, suggesting more than one mechanism of action. Mitochondrial genome-knockout ρ0 cell lines are insensitive to mycothiazole, supporting a conditional mitochondrial site of action. Mycothiazole is cytostatic rather than cytotoxic in sensitive cells, has a long lag period of about 12 h, and unlike the complex I inhibitor, rotenone, does not cause G2/M cell cycle arrest. Mycothiazole decreases, rather than increases the levels of reactive oxygen species after 24 h. It is concluded that the cytostatic inhibitory effects of mycothiazole on mitochondrial electron transport function in sensitive cell lines may depend on a pre-activation step that is absent in insensitive cell lines with intact mitochondria, and that a second lower-affinity cytotoxic target may also be involved in the metabolic and growth inhibition of cells.

  4. Nocturnal panic attacks

    Directory of Open Access Journals (Sweden)

    Lopes Fabiana L.

    2002-01-01

    Full Text Available The panic-respiration connection has been presented with increasing evidences in the literature. We report three panic disorder patients with nocturnal panic attacks with prominent respiratory symptoms, the overlapping of the symptoms with the sleep apnea syndrome and a change of the diurnal panic attacks, from spontaneous to situational pattern. The implication of these findings and awareness to the distinct core of the nocturnal panic attacks symptoms may help to differentiate them from sleep disorders and the search for specific treatment.

  5. Structure of Trypanosoma cruzi glycosomal glyceraldehyde-3-phosphate dehydrogenase complexed with chalepin, a natural product inhibitor, at 1.95 A resolution.

    Science.gov (United States)

    Pavão, F; Castilho, M S; Pupo, M T; Dias, R L A; Correa, A G; Fernandes, J B; da Silva, M F G F; Mafezoli, J; Vieira, P C; Oliva, G

    2002-06-01

    The structure of the glycosomal glyceraldehyde-3-phosphate dehydrogenase (gGAPDH) from Trypanosoma cruzi complexed with chalepin, a natural product from Pilocarpus spicatus, has been determined by X-ray crystallography to 1.95 A resolution. The structure is in the apo form without cofactors in the subunits of the tetrameric gGAPDH in the asymmetric unit. Unequivocal density corresponding to the inhibitor was clearly identified in one monomer. The final refined model of the complex shows extensive conformational changes when compared with the native structure. The mode of binding of chalepin to gGAPDH and its implications for inhibitor design are discussed. PMID:12044862

  6. Photoredox Catalysis in a Complex Pharmaceutical Setting: Toward the Preparation of JAK2 Inhibitor LY2784544

    OpenAIRE

    Douglas, James J.; Cole, Kevin P.; Stephenson, Corey R J

    2014-01-01

    We report a detailed investigation into the application of visible light-mediated photocatalysis to a challenging bond construction in a complex pharmaceutical target. The optimized reaction allowed the direct coupling of N-methylmorpholine with an unfunctionalized pyridazine in good yield and selectivity, and with high purity of the product isolated via crystallization. The reaction also facilitated the expedient synthesis of a range of analogues via the use of other commercially available N...

  7. Protease inhibitors as possible pitfalls in proteomic analyses of complex biological samples

    OpenAIRE

    Clifton, James; Huang, Feilei; Rucevic, Marijana; Cao, Lulu; Hixson, Douglas; Josic, Djuro

    2011-01-01

    Sample preparation, especially protein and peptide fractionation prior to identification by mass spectrometry (MS) are typically applied to reduce sample complexity. The second key element in this process is proteolytic digestion that is performed mostly by trypsin. Optimization of this step is an important factor in order to achieve both speed and better performance of proteomic analysis, and tryptic digestion prior to the MS analysis is topic of many studies. To date, only few studies pay a...

  8. Signs of a Heart Attack

    Science.gov (United States)

    ... attack Heart Health and Stroke Signs of a heart attack Related information Make the Call. Don't Miss ... to top More information on Signs of a heart attack Read more from womenshealth.gov Make the Call, ...

  9. Slow conformational dynamics of an endonuclease persist in its complex with its natural protein inhibitor.

    Science.gov (United States)

    Whittaker, S B; Czisch, M; Wechselberger, R; Kaptein, R; Hemmings, A M; James, R; Kleanthous, C; Moore, G R

    2000-04-01

    The bacterial toxin colicin E9 is secreted by producing Escherichia coli cells with its 9.5 kDa inhibitor protein Im9 bound tightly to its 14.5 kDa C-terminal DNase domain. Double- and triple-resonance NMR spectra of the isolated DNase domain uniformly labeled with 13C/15N bound to unlabeled Im9 contain more signals than expected for a single DNase conformer, consistent with the bound DNase being present in more than one form. The presence of chemical exchange cross peaks in 750 MHz 15N-1H-15N HSQC-NOESY-HSQC spectra for backbone NH groups of Asp20, Lys21, Trp22, Leu23, Lys69, and Asn70 showed that the bound DNase was in dynamic exchange. The rate of exchange from the major to the minor form was determined to be 1.1 +/- 0.2 s(-1) at 298 K. Previous NMR studies have shown that the free DNase interchanges between two conformers with a forward rate constant of 1.61 +/- 0.11 s(-1) at 288 K, and that the bound Im9 is fixed in one conformation. The NMR studies of the bound DNase show that Im9 binds similarly to both conformers of the DNase and that the buried Trp22 is involved in the dynamic process. For the free DNase, all NH groups within a 9 A radius of any point of the Trp22 ring exhibit heterogeneity suggesting that a rearrangement of the position of this side chain is connected with the conformational interchange. The possible functional significance of this feature of the DNase is discussed. PMID:10794413

  10. Transient Ischemic Attack

    Medline Plus

    Full Text Available ... TIA , or transient ischemic attack, is a "mini stroke" that occurs when a blood clot blocks an ... a short time. The only difference between a stroke and TIA is that with TIA the blockage ...

  11. Heart Attack Payment - State

    Data.gov (United States)

    U.S. Department of Health & Human Services — Payment for heart attack patients measure – state data. This data set includes state-level data for payments associated with a 30-day episode of care for heart...

  12. Heart Attack Payment - National

    Data.gov (United States)

    U.S. Department of Health & Human Services — Payment for heart attack patients measure – national data. This data set includes national-level data for payments associated with a 30-day episode of care for...

  13. Heart Attack Payment - Hospital

    Data.gov (United States)

    U.S. Department of Health & Human Services — Payment for heart attack patients measure – provider data. This data set includes provider data for payments associated with a 30-day episode of care for heart...

  14. Insight to structural subsite recognition in plant thiol protease-inhibitor complexes : Understanding the basis of differential inhibition and the role of water

    Directory of Open Access Journals (Sweden)

    Mukhopadhayay Bishnu P

    2001-09-01

    Full Text Available Abstract Background This work represents an extensive MD simulation / water-dynamics studies on a series of complexes of inhibitors (leupeptin, E-64, E-64-C, ZPACK and plant cysteine proteases (actinidin, caricain, chymopapain, calotropin DI of papain family to understand the various interactions, water binding mode, factors influencing it and the structural basis of differential inhibition. Results The tertiary structure of the enzyme-inhibitor complexes were built by visual interactive modeling and energy minimization followed by dynamic simulation of 120 ps in water environment. DASA study with and without the inhibitor revealed the potential subsite residues involved in inhibition. Though the interaction involving main chain atoms are similar, critical inspection of the complexes reveal significant differences in the side chain interactions in S2-P2 and S3-P3 pairs due to sequence differences in the equivalent positions of respective subsites leading to differential inhibition. Conclusion The key finding of the study is a conserved site of a water molecule near oxyanion hole of the enzyme active site, which is found in all the modeled complexes and in most crystal structures of papain family either native or complexed. Conserved water molecules at the ligand binding sites of these homologous proteins suggest the structural importance of the water, which changes the conventional definition of chemical geometry of inhibitor binding domain, its shape and complimentarity. The water mediated recognition of inhibitor to enzyme subsites (Pn...H2O....Sn of leupeptin acetyl oxygen to caricain, chymopapain and calotropinDI is an additional information and offer valuable insight to potent inhibitor design.

  15. Practical Attacks on AES-like Cryptographic Hash Functions

    DEFF Research Database (Denmark)

    Kölbl, Stefan; Rechberger, Christian

    drastically reduce the complexity of attacks to very practical values for reduced-round versions. Furthermore, we describe new and practical attacks on Whirlpool and the recently proposed GOST R hash function with one or more of the following properties: more rounds, less time/memory complexity, and more...

  16. The LOCAL attack: Cryptanalysis of the authenticated encryption scheme ALE

    DEFF Research Database (Denmark)

    Khovratovich, Dmitry; Rechberger, Christian

    2014-01-01

    state bytes to the adversary. Our approach allows for a time-data complexity tradeoff, with an extreme case of a forgery produced after 2119 attempts and based on a single authenticated message. Our attack is further turned into a state recovery and a universal forgery attack with a time complexity...

  17. Crystallization and Preliminary Diffraction Analysis of the CAL PDZ Domain in Complex with a Selective Peptide Inhibitor

    Energy Technology Data Exchange (ETDEWEB)

    J Amacher; P Cushing; J Weiner; D Madden

    2011-12-31

    Cystic fibrosis (CF) is associated with loss-of-function mutations in the CF transmembrane conductance regulator (CFTR), which regulates epithelial fluid and ion homeostasis. The CFTR cytoplasmic C-terminus interacts with a number of PDZ (PSD-95/Dlg/ZO-1) proteins that modulate its intracellular trafficking and chloride-channel activity. Among these, the CFTR-associated ligand (CAL) has a negative effect on apical-membrane expression levels of the most common disease-associated mutant {Delta}F508-CFTR, making CAL a candidate target for the treatment of CF. A selective peptide inhibitor of the CAL PDZ domain (iCAL36) has recently been developed and shown to stabilize apical expression of {Delta}F508-CFTR, enhancing net chloride-channel activity, both alone and in combination with the folding corrector corr-4a. As a basis for structural studies of the CAL-iCAL36 interaction, a purification protocol has been developed that increases the oligomeric homogeneity of the protein. Here, the cocrystallization of the complex in space group P2{sub 1}2{sub 1}2{sub 1}, with unit-cell parameters a = 35.9, b = 47.7, c = 97.3 {angstrom}, is reported. The crystals diffracted to 1.4 {angstrom} resolution. Based on the calculated Matthews coefficient (1.96 {angstrom}{sup 3} Da{sup -1}), it appears that the asymmetric unit contains two complexes.

  18. Photoredox catalysis in a complex pharmaceutical setting: toward the preparation of JAK2 inhibitor LY2784544.

    Science.gov (United States)

    Douglas, James J; Cole, Kevin P; Stephenson, Corey R J

    2014-12-01

    We report a detailed investigation into the application of visible light-mediated photocatalysis to a challenging bond construction in a complex pharmaceutical target. The optimized reaction allowed the direct coupling of N-methylmorpholine with an unfunctionalized pyridazine in good yield and selectivity, and with high purity of the product isolated via crystallization. The reaction also facilitated the expedient synthesis of a range of analogues via the use of other commercially available N-methyl substituted tertiary amines, and therefore it represents an attractive tool for medicinal chemistry. Furthermore, a number of other interesting photoredox reactions were discovered during the course of this investigation, such as a formal methylation reaction via C-N bond cleavage, functionalization of C-H bonds alpha to amides, and a visible light-mediated iminium ion reduction. PMID:25356724

  19. Next-generation mTOR inhibitors in clinical oncology: how pathway complexity informs therapeutic strategy.

    LENUS (Irish Health Repository)

    Wander, Seth A

    2011-04-01

    Mammalian target of rapamycin (mTOR) is a PI3K-related kinase that regulates cell growth, proliferation, and survival via mTOR complex 1 (mTORC1) and mTORC2. The mTOR pathway is often aberrantly activated in cancers. While hypoxia, nutrient deprivation, and DNA damage restrain mTORC1 activity, multiple genetic events constitutively activate mTOR in cancers. Here we provide a brief overview of the signaling pathways up- and downstream of mTORC1 and -2, and discuss the insights into therapeutic anticancer targets - both those that have been tried in the clinic with limited success and those currently under clinical development - that knowledge of these pathways gives us.

  20. High resolution crystal structure of rat long chain hydroxy acid oxidase in complex with the inhibitor 4-carboxy-5-[(4-chlorophenyl)sulfanyl]-1, 2, 3-thiadiazole. Implications for inhibitor specificity and drug design

    Energy Technology Data Exchange (ETDEWEB)

    Chen, Zhi-wei; Vignaud, Caroline; Jaafar, Adil; Lévy, Bernard; Guéritte, Françoise; Guénard, Daniel; Lederer, Florence; Mathews, F. Scott (CNRS-UMR); (WU-MED)

    2012-05-24

    Long chain hydroxy acid oxidase (LCHAO) is responsible for the formation of methylguanidine, a toxic compound with elevated serum levels in patients with chronic renal failure. Its isozyme glycolate oxidase (GOX), has a role in the formation of oxalate, which can lead to pathological deposits of calcium oxalate, in particular in the disease primary hyperoxaluria. Inhibitors of these two enzymes may have therapeutic value. These enzymes are the only human members of the family of FMN-dependent L-2-hydroxy acid-oxidizing enzymes, with yeast flavocytochrome b{sub 2} (Fcb2) among its well studied members. We screened a chemical library for inhibitors, using in parallel rat LCHAO, human GOX and the Fcb2 flavodehydrogenase domain (FDH). Among the hits was an inhibitor, CCPST, with an IC{sub 50} in the micromolar range for all three enzymes. We report here the crystal structure of a complex between this compound and LCHAO at 1.3 {angstrom} resolution. In comparison with a lower resolution structure of this enzyme, binding of the inhibitor induces a conformational change in part of the TIM barrel loop 4, as well as protonation of the active site histidine. The CCPST interactions are compared with those it forms with human GOX and those formed by two other inhibitors with human GOX and spinach GOX. These compounds differ from CCPST in having the sulfur replaced with a nitrogen in the five-membered ring as well as different hydrophobic substituents. The possible reason for the {approx}100-fold difference in affinity between these two series of inhibitors is discussed. The present results indicate that specificity is an issue in the quest for therapeutic inhibitors of either LCHAO or GOX, but they may give leads for this quest.

  1. Crystallization and preliminary X-ray diffraction analysis of the complex of Kunitz-type tamarind trypsin inhibitor and porcine pancreatic trypsin

    International Nuclear Information System (INIS)

    A complex of tamarind trypsin inhibitor with porcine trypsin was crystallized and analyzed by X-ray diffraction. The complex of Tamarindus indica Kunitz-type trypsin inhibitor and porcine trypsin has been crystallized by the sitting-drop vapour-diffusion method using ammonium acetate as precipitant and sodium acetate as buffer. The homogeneity of complex formation was checked by size-exclusion chromatography and further confirmed by reducing SDS–PAGE. The crystals diffracted to 2.0 Å resolution and belonged to the tetragonal space group P41, with unit-cell parameters a = b = 57.1, c = 120.1 Å. Preliminary X-ray diffraction analysis indicated the presence of one unit of inhibitor–trypsin complex per asymmetric unit, with a solvent content of 45%

  2. Designing inhibitors of cytochrome c/cardiolipin peroxidase complexes: mitochondria-targeted imidazole-substituted fatty acids.

    Science.gov (United States)

    Jiang, Jianfei; Bakan, Ahmet; Kapralov, Alexandr A; Silva, K Ishara; Huang, Zhentai; Amoscato, Andrew A; Peterson, James; Garapati, Venkata Krishna; Saxena, Sunil; Bayir, Hülya; Atkinson, Jeffrey; Bahar, Ivet; Kagan, Valerian E

    2014-06-01

    Mitochondria have emerged as the major regulatory platform responsible for the coordination of numerous metabolic reactions as well as cell death processes, whereby the execution of intrinsic apoptosis includes the production of reactive oxygen species fueling oxidation of cardiolipin (CL) catalyzed by cytochrome (Cyt) c. As this oxidation occurs within the peroxidase complex of Cyt c with CL, the latter represents a promising target for the discovery and design of drugs with antiapoptotic mechanisms of action. In this work, we designed and synthesized a new group of mitochondria-targeted imidazole-substituted analogs of stearic acid TPP-n-ISAs with various positions of the attached imidazole group on the fatty acid (n = 6, 8, 10, 13, and 14). By using a combination of absorption spectroscopy and EPR protocols (continuous wave electron paramagnetic resonance and electron spin echo envelope modulation) we demonstrated that TPP-n-ISAs indeed were able to potently suppress CL-induced structural rearrangements in Cyt c, paving the way to its peroxidase competence. TPP-n-ISA analogs preserved the low-spin hexa-coordinated heme-iron state in Cyt c/CL complexes whereby TPP-6-ISA displayed a significantly more effective preservation pattern than TPP-14-ISA. Elucidation of these intermolecular stabilization mechanisms of Cyt c identified TPP-6-ISA as an effective inhibitor of the peroxidase function of Cyt c/CL complexes with a significant antiapoptotic potential realized in mouse embryonic cells exposed to ionizing irradiation. These experimental findings were detailed and supported by all-atom molecular dynamics simulations. Based on the experimental data and computation predictions, we identified TPP-6-ISA as a candidate drug with optimized antiapoptotic potency. PMID:24631490

  3. The role of complement receptors type 1 (CR1, CD35) and 2 (CR2, CD21) in promoting C3 fragment deposition and membrane attack complex formation on normal peripheral human B cells

    DEFF Research Database (Denmark)

    Nielsen, Claus Henrik; Pedersen, Morten Løbner; Marquart, Hanne Vibeke;

    2002-01-01

    Normal human B lymphocytes are known to activate the alternative pathway (AP) of complement, leading to C3-fragment deposition and membrane attack complex (MAC) formation. The process is mediated via complement receptor type 2 (CR2, CD21), with complement receptor type 1 (CR1, CD35) playing a...... subsidiary role. In this study, we examine the relative contributions of CR1 and CR2 to the deposition of C3 fragments and MAC on B lymphocytes under circumstances where all complement pathways are operational. C3-fragment deposition and MAC formation were assessed on human peripheral B lymphocytes in the......) bearing CR1, however, markedly reduced both C3-fragment deposition and MAC formation. Our data suggest that C3-fragment deposition and MAC formation on B lymphocytes in vivo may involve both AP and classical pathway activation, with CR1 contributing significantly to the latter. On the other hand, the...

  4. The role of complement receptors type 1 (CR1, CD35) and 2 (CR2, CD21) in promoting C3 fragment deposition and membrane attack complex formation on normal peripheral human B cells

    DEFF Research Database (Denmark)

    Nielsen, Claus Henrik; Pedersen, Morten Løbner; Marquart, Hanne Vibeke Hansen;

    2002-01-01

    Normal human B lymphocytes are known to activate the alternative pathway (AP) of complement, leading to C3-fragment deposition and membrane attack complex (MAC) formation. The process is mediated via complement receptor type 2 (CR2, CD21), with complement receptor type 1 (CR1, CD35) playing a...... subsidiary role. In this study, we examine the relative contributions of CR1 and CR2 to the deposition of C3 fragments and MAC on B lymphocytes under circumstances where all complement pathways are operational. C3-fragment deposition and MAC formation were assessed on human peripheral B lymphocytes in the...... presence of 30% autologous serum. Blocking the CR2 ligand-binding site with monoclonal antibody (mAb) FE8 resulted in significant reduction (37.9+/-11.9%) in C3-fragment deposition, whereas MAC formation was only marginally affected (12.1+/-22.2% reduction). Blocking the CR1 binding-site resulted in...

  5. Structural Learning of Attack Vectors for Generating Mutated XSS Attacks

    OpenAIRE

    Yi-Hsun Wang; Ching-Hao Mao; Hahn-Ming Lee

    2010-01-01

    Web applications suffer from cross-site scripting (XSS) attacks that resulting from incomplete or incorrect input sanitization. Learning the structure of attack vectors could enrich the variety of manifestations in generated XSS attacks. In this study, we focus on generating more threatening XSS attacks for the state-of-the-art detection approaches that can find potential XSS vulnerabilities in Web applications, and propose a mechanism for structural learning of attack vectors with the aim of...

  6. XQuery Injection Attack and Countermeasures

    Institute of Scientific and Technical Information of China (English)

    谭玉森

    2014-01-01

    As a database that allows data to be stored in XML format, XML database suffers from some similar attacks as traditional relational database does. These attacks include injection attack by XQuey function in application software. These include BaseX, eXist and MarkLogic. In order to defeat these attacks, countermeasures are proposed.

  7. Enzyme-Coupled Nanoparticles-Assisted Laser Desorption Ionization Mass Spectrometry for Searching for Low-Mass Inhibitors of Enzymes in Complex Mixtures

    Science.gov (United States)

    Salwiński, Aleksander; Da Silva, David; Delépée, Raphaël; Maunit, Benoît

    2014-04-01

    In this report, enzyme-coupled magnetic nanoparticles (EMPs) were shown to be an effective affinity-based tool for finding specific interactions between enzymatic targets and the low-mass molecules in complex mixtures using classic MALDI-TOF apparatus. EMPs used in this work act as nonorganic matrix enabling ionization of small molecules without any interference in the low-mass range (enzyme-coupled nanoparticles-assisted laser desorption ionization MS, ENALDI MS) and simultaneously carry the superficial specific binding sites to capture inhibitors present in a studied mixture. We evaluated ENALDI approach in two complementary variations: `ion fading' (IF-ENALDI), based on superficial adsorption of inhibitors and `ion hunting' (IH-ENALDI), based on selective pre-concentration of inhibitors. IF-ENALDI was applied for two sets of enzyme-inhibitor pairs: tyrosinase-glabridin and trypsin-leupeptin and for the real plant sample: Sparrmannia discolor leaf and stem methanol extract. The efficacy of IH-ENALDI was shown for the pair of trypsin-leupeptin. Both ENALDI approaches pose an alternative for bioassay-guided fractionation, the common method for finding inhibitors in the complex mixtures.

  8. Seven Deadliest Wireless Technologies Attacks

    CERN Document Server

    Haines, Brad

    2010-01-01

    How can an information security professional keep up with all of the hacks, attacks, and exploits? One way to find out what the worst of the worst are is to read the seven books in our Seven Deadliest Attacks Series. Not only do we let you in on the anatomy of these attacks but we also tell you how to get rid of them and how to defend against them in the future. Countermeasures are detailed so that you can fight against similar attacks as they evolve. Attacks featured in this book include:Bluetooth AttacksCredit Card, Access Card, and Passport AttacksBad Encryption

  9. Crystallisation and preliminary X-ray diffraction analysis of the protease from Southampton norovirus complexed with a Michael-acceptor inhibitor

    Energy Technology Data Exchange (ETDEWEB)

    Coates, Leighton [ORNL; Cooper, Jon [University of Southampton, England; Hussey, Robert [University of Southampton, England

    2008-01-01

    Noroviruses are the predominant cause of human epidemic nonbacterial gastroenteritis. Viral replication requires a cysteine protease that cleaves a 200 kDa viral polyprotein into its constituent functional parts. Here, the crystallization of the recombinant protease from the Southampton norovirus is described. While the native crystals were found to diffract only to medium resolution (2.9 {angstrom}), cocrystals of an inhibitor complex diffracted X-rays to 1.7 {angstrom} resolution. The polypeptide inhibitor (Ac-EFQLQ-propenyl ethyl ester) possesses an amino-acid sequence designed to match the substrate specificity of the enzyme, but was synthesized with a reactive Michael acceptor group at the C-terminal end.

  10. Overexpression, purification, crystallization and preliminary X-ray analysis of uracil N-glycosylase from Mycobacterium tuberculosis in complex with a proteinaceous inhibitor

    International Nuclear Information System (INIS)

    Uracil N-glycosylase from M. tuberculosis has been crystallized in complex with a proteinaceous inhibitor (Ugi) and X-ray diffraction data have been collected. Uracil N-glycosylase is an enzyme which initiates the pathway of uracil-excision repair of DNA. The enzyme from Mycobacterium tuberculosis was co-expressed with a proteinaceous inhibitor from Bacillus subtilis phage and was crystallized in monoclinic space group C2, with unit-cell parameters a = 201.14, b = 64.27, c = 203.68 Å, β = 109.7°. X-ray data from the crystal have been collected for structure analysis

  11. Biospecific haemosorbents based on proteinase inhibitor. II. Efficiency of biospecific antiproteinase haemosorbent 'Ovosorb' in complex treatment of experimental generalized purulent peritonitis and acute destructive pancreatitis in dogs.

    Science.gov (United States)

    Platé, N A; Kirkovsky, V V; Antiperovich, O F; Nicolaichik, V V; Valueva, T A; Sinilo, S B; Moin, V M; Lobacheva, G A

    1994-03-01

    The biospecific antiproteinase haemosorbent (BAH) 'Ovosorb' containing, in the bulk of polyacryamide gel, the ovomucoid from whites of duck eggs, was used for a complex treatment of the experimental generalized purulent peritonitis and acute destructive pancreatitis in dogs. The efficiency of BAH was manifested in the significant reduction of lethality of the experimental animals, a more rapid liquidation of proteinasaemia, normalization in plasma of alpha 1-proteinase inhibitor and protein metabolism. Thus, by eliminating proteinases from circulation, Ovosorb contributes to the cessation of imbalance in the proteinase-inhibitor system and is efficient in the therapy of pathological states related to this imbalance. PMID:8031989

  12. Inhibitors of ROS production by the ubiquinone-binding site of mitochondrial complex I identified by chemical screening.

    Science.gov (United States)

    Orr, Adam L; Ashok, Deepthi; Sarantos, Melissa R; Shi, Tong; Hughes, Robert E; Brand, Martin D

    2013-12-01

    Mitochondrial production of reactive oxygen species is often considered an unavoidable consequence of aerobic metabolism and currently cannot be manipulated without perturbing oxidative phosphorylation. Antioxidants are widely used to suppress effects of reactive oxygen species after formation, but they can never fully prevent immediate effects at the sites of production. To identify site-selective inhibitors of mitochondrial superoxide/H2O2 production that do not interfere with mitochondrial energy metabolism, we developed a robust small-molecule screen and secondary profiling strategy. We describe the discovery and characterization of a compound (N-cyclohexyl-4-(4-nitrophenoxy)benzenesulfonamide; CN-POBS) that selectively inhibits superoxide/H2O2 production from the ubiquinone-binding site of complex I (site I(Q)) with no effects on superoxide/H2O2 production from other sites or on oxidative phosphorylation. Structure/activity studies identified a core structure that is important for potency and selectivity for site I(Q). By employing CN-POBS in mitochondria respiring on NADH-generating substrates, we show that site I(Q) does not produce significant amounts of superoxide/H2O2 during forward electron transport on glutamate plus malate. Our screening platform promises to facilitate further discovery of direct modulators of mitochondrially derived oxidative damage and advance our ability to understand and manipulate mitochondrial reactive oxygen species production under both normal and pathological conditions. PMID:23994103

  13. Structural comparison of chromosomal and exogenous dihydrofolate reductase from Staphylococcus aureus in complex with the potent inhibitor trimethoprim

    Energy Technology Data Exchange (ETDEWEB)

    Heaslet, Holly; Harris, Melissa; Fahnoe, Kelly; Sarver, Ronald; Putz, Henry; Chang, Jeanne; Subramanyam, Chakrapani; Barreiro, Gabriela; Miller, J. Richard; Pfizer

    2010-09-02

    Dihydrofolate reductase (DHFR) is the enzyme responsible for the NADPH-dependent reduction of 5,6-dihydrofolate to 5,6,7,8-tetrahydrofolate, an essential cofactor in the synthesis of purines, thymidylate, methionine, and other key metabolites. Because of its importance in multiple cellular functions, DHFR has been the subject of much research targeting the enzyme with anticancer, antibacterial, and antimicrobial agents. Clinically used compounds targeting DHFR include methotrexate for the treatment of cancer and diaminopyrimidines (DAPs) such as trimethoprim (TMP) for the treatment of bacterial infections. DAP inhibitors of DHFR have been used clinically for >30 years and resistance to these agents has become widespread. Methicillin-resistant Staphylococcus aureus (MRSA), the causative agent of many serious nosocomial and community acquired infections, and other gram-positive organisms can show resistance to DAPs through mutation of the chromosomal gene or acquisition of an alternative DHFR termed 'S1 DHFR.' To develop new therapies for health threats such as MRSA, it is important to understand the molecular basis of DAP resistance. Here, we report the crystal structure of the wild-type chromosomal DHFR from S. aureus in complex with NADPH and TMP. We have also solved the structure of the exogenous, TMP resistant S1 DHFR, apo and in complex with TMP. The structural and thermodynamic data point to important molecular differences between the two enzymes that lead to dramatically reduced affinity of DAPs to S1 DHFR. These differences in enzyme binding affinity translate into reduced antibacterial activity against strains of S. aureus that express S1 DHFR.

  14. Structure of a Dihydroxycoumarin Active-Site Inhibitor in Complex with the RNase H Domain of HIV-1 Reverse Transcriptase and Structure-Activity Analysis of Inhibitor Analogs

    OpenAIRE

    Himmel, Daniel M.; Myshakina, Nataliya S.; Ilina, Tatiana; Van Ry, Alexander; Ho, William C.; Parniak, Michael A.; Arnold, Eddy

    2014-01-01

    HIV encodes four essential enzymes: protease, integrase, reverse transcriptase (RT) associated DNA polymerase, and RT-associated ribonuclease H (RNase H). Current clinically approved anti-AIDS drugs target all HIV enzymatic activities except RNase H, which has proven to be a very difficult target for HIV drug discovery. Our high-throughput screening activities identified the dihydroxycoumarin compound F3284-8495 as a specific inhibitor of RT RNase H, with low micromolar potency in vitro. Opti...

  15. Repositioning of Verrucosidin, a Purported Inhibitor of Chaperone Protein GRP78, as an Inhibitor of Mitochondrial Electron Transport Chain Complex I

    OpenAIRE

    Simmy Thomas; Natasha Sharma; Reyna Gonzalez; Peng-Wen Pao; Hofman, Florence M; Thomas C. Chen; Louie, Stan G.; Pirrung, Michael C.; Schönthal, Axel H

    2013-01-01

    Verrucosidin (VCD) belongs to a group of fungal metabolites that were identified in screening programs to detect molecules that preferentially kill cancer cells under glucose-deprived conditions. Its mode of action was proposed to involve inhibition of increased GRP78 (glucose regulated protein 78) expression during hypoglycemia. Because GRP78 plays an important role in tumorigenesis, inhibitors such as VCD might harbor cancer therapeutic potential. We therefore sought to characterize VCD's a...

  16. Repositioning of Verrucosidin, a Purported Inhibitor of Chaperone Protein GRP78, as an Inhibitor of Mitochondrial Electron Transport Chain Complex I

    OpenAIRE

    Thomas, Simmy; Sharma, Natasha; Gonzalez, Reyna; Pao, Peng-Wen; Hofman, Florence M.; Chen, Thomas C.; Louie, Stan G.; Pirrung, Michael C.; Schönthal, Axel H.

    2013-01-01

    Verrucosidin (VCD) belongs to a group of fungal metabolites that were identified in screening programs to detect molecules that preferentially kill cancer cells under glucose-deprived conditions. Its mode of action was proposed to involve inhibition of increased GRP78 (glucose regulated protein 78) expression during hypoglycemia. Because GRP78 plays an important role in tumorigenesis, inhibitors such as VCD might harbor cancer therapeutic potential. We therefore sought to characterize VCD’s a...

  17. Structure of a dihydroxycoumarin active-site inhibitor in complex with the RNase H domain of HIV-1 reverse transcriptase and structure-activity analysis of inhibitor analogs.

    Science.gov (United States)

    Himmel, Daniel M; Myshakina, Nataliya S; Ilina, Tatiana; Van Ry, Alexander; Ho, William C; Parniak, Michael A; Arnold, Eddy

    2014-07-15

    Human immunodeficiency virus (HIV) encodes four essential enzymes: protease, integrase, reverse transcriptase (RT)-associated DNA polymerase, and RT-associated ribonuclease H (RNase H). Current clinically approved anti-AIDS drugs target all HIV enzymatic activities except RNase H, which has proven to be a very difficult target for HIV drug discovery. Our high-throughput screening activities identified the dihydroxycoumarin compound F3284-8495 as a specific inhibitor of RT RNase H, with low micromolar potency in vitro. Optimization of inhibitory potency can be facilitated by structural information about inhibitor-target binding. Here, we report the crystal structure of F3284-8495 bound to the active site of an isolated RNase H domain of HIV-1 RT at a resolution limit of 1.71Å. From predictions based on this structure, compounds were obtained that showed improved inhibitory activity. Computational analysis suggested structural alterations that could provide additional interactions with RT and thus improve inhibitory potency. These studies established proof of concept that F3284-8495 could be used as a favorable chemical scaffold for development of HIV RNase H inhibitors. PMID:24840303

  18. Hybrid Approach to Detect SQLi Attacks and Evasion Techniques

    OpenAIRE

    Makiou, Abdelhamid; Begriche, Youcef; Serhrouchni, Ahmed

    2014-01-01

    —Injections flaws which include SQL injection are the most prevalent security threats affecting Web applications[1]. To mitigate these attacks, Web Application Firewalls (WAFs) apply security rules in order to both inspect HTTP data streams and detect malicious HTTP transactions. Nevertheless, attackers can bypass WAF's rules by using sophisticated SQL injection techniques. In this paper, we introduce a novel approach to dissect the HTTP traffic and inspect complex SQL injection attacks. Our ...

  19. Improving Web Application Firewalls to detect advanced SQL injection attacks

    OpenAIRE

    Makiou, Abdelhamid; Begriche, Youcef; Serhrouchni, Ahmed

    2014-01-01

    Injections flaws which include SQL injection are the most prevalent security threats affecting Web applications[1]. To mitigate these attacks, Web Application Firewalls (WAFs) apply security rules in order to both inspect HTTP data streams and detect malicious HTTP transactions. Nevertheless, attackers can bypass WAF's rules by using sophisticated SQL injection techniques. In this paper, we introduce a novel approach to dissect the HTTP traffic and inspect complex SQL injection attacks. Our m...

  20. Fatal crocodile attack.

    Science.gov (United States)

    Chattopadhyay, Saurabh; Shee, Biplab; Sukul, Biswajit

    2013-11-01

    Attacks on human beings by various animals leading to varied types of injuries and even death in some cases are not uncommon. Crocodile attacks on humans have been reported from a number of countries across the globe. Deaths in such attacks are mostly due to mechanical injuries or drowning. Bites by the crocodiles often cause the limbs to be separated from the body. The present case refers to an incident of a fatal attack by a crocodile on a 35 years old female where only the mutilated head of the female was recovered. Multiple lacerated wounds over the face and scalp along with fracture of the cranial bones was detected on autopsy. Two distinct bite marks in the form of punched in holes were noted over the parietal and frontal bones. Injuries on the head with its traumatic amputation from the body were sufficient to cause death. However, the presence of other fatal injuries on the unrecovered body parts could not be ruled out. PMID:24237838

  1. Bluetooth security attacks comparative analysis, attacks, and countermeasures

    CERN Document Server

    Haataja, Keijo; Pasanen, Sanna; Toivanen, Pekka

    2013-01-01

    This overview of Bluetooth security examines network vulnerabilities and offers a comparative analysis of recent security attacks. It also examines related countermeasures and proposes a novel attack that works against all existing Bluetooth versions.

  2. Cell Counting Attack and Browser Attack against TOR Network

    OpenAIRE

    Swati

    2014-01-01

    The onion router (TOR) allows to hide your identity various software under this categories are available that allows online anonymity network, supporting TCP applications over the Internet. It doesn't allow network surveillance or traffic analysis to get tracked but most of these software used equal size of cells (512B). In this paper we are comparing cell-counting attacks and browser attacks against TOR. Different from cell-counting attacks, these attacks can confirm anonymou...

  3. The kinase inhibitor SFV785 dislocates dengue virus envelope protein from the replication complex and blocks virus assembly.

    Directory of Open Access Journals (Sweden)

    Azlinda Anwar

    Full Text Available Dengue virus (DENV is the etiologic agent for dengue fever, for which there is no approved vaccine or specific anti-viral drug. As a remedy for this, we explored the use of compounds that interfere with the action of required host factors and describe here the characterization of a kinase inhibitor (SFV785, which has selective effects on NTRK1 and MAPKAPK5 kinase activity, and anti-viral activity on Hepatitis C, DENV and yellow fever viruses. SFV785 inhibited DENV propagation without inhibiting DENV RNA synthesis or translation. The compound did not cause any changes in the cellular distribution of non-structural 3, a protein critical for DENV RNA synthesis, but altered the distribution of the structural envelope protein from a reticulate network to enlarged discrete vesicles, which altered the co-localization with the DENV replication complex. Ultrastructural electron microscopy analyses of DENV-infected SFV785-treated cells showed the presence of viral particles that were distinctly different from viable enveloped virions within enlarged ER cisternae. These viral particles were devoid of the dense nucleocapsid. The secretion of the viral particles was not inhibited by SFV785, however a reduction in the amount of secreted infectious virions, DENV RNA and capsid were observed. Collectively, these observations suggest that SFV785 inhibited the recruitment and assembly of the nucleocapsid in specific ER compartments during the DENV assembly process and hence the production of infectious DENV. SFV785 and derivative compounds could be useful biochemical probes to explore the DENV lifecycle and could also represent a new class of anti-virals.

  4. Is There Anybody There? A Psychodynamic View of Panic Attack.

    Science.gov (United States)

    Rizq, Rosemary

    2002-01-01

    Presents a process analysis of a psychodynamic intervention for a client with panic attacks. Discusses how a psychodynamic understanding of the complex etiology of the client's panic attacks that ultimately produced improved coping skills and a subjective sense of improvement for her. Process analysis is used to illustrate the theoretical base,…

  5. ATTACK PATTERNS FOR DETECTING AND PREVENTING DDOS AND REPLAY ATTACKS

    Directory of Open Access Journals (Sweden)

    A.MADHURI,

    2010-09-01

    Full Text Available In this paper, we discuss the methods for detecting and preventing the DDoS Attacks and Replay Attacks, which have been posing the problems for the Internet. We explained a scheme AMFDR (AttackPatterns for Marking Filtering DoS and Replay attacks that identifies the attack packets from the packets that are sent by legitimate users and filters the attack packets. A Denial of service attack is generally launched to make a service unavailable even to an unauthorized user. If this attack uses many computers across the world, it is called Distributed Denial of service attack. Replay attack is retransmission of a data transmission which used to gain authentication in a fraudulent manner. These replayed packets or attack packets are identified. This scheme is less expensive and the implementation of this scheme needs minimal interaction with routers. The scheme is like firewall system, so that the occurrence of an attack is recognized quickly and a punitive action is taken without any loss genuine packets.

  6. Efficient Complex Surfactants from the Type of Fatty Acids as Corrosion Inhibitors for Mild Steel C1018 in CO{sub 2}-Environments

    Energy Technology Data Exchange (ETDEWEB)

    Abbasov, Vagif M.; Abd Ellatee, Hany M.; Aliyeva, Leylufer I.; Ismayilov, Ismayil T.; Qasimov, Elmar E.; Narmin, Mamedova M. [National Academy of Sciences of Azerbaijan, Baku (Azerbaijan)

    2013-02-15

    The efficiency of three complex surfactants based on sunflower oil and nitrogen containing compounds as corrosion inhibitors for mild steel in CO{sub 2}-saturated 1% NaCl solution, has been determined by weight loss and LPR corrosion rate measurements. These compounds inhibit corrosion even at very low concentrations. The inhibition process was attributed to the formation of an adsorbed film on the metal surface that protects the metal against corrosive media. The inhibition efficiency increases with increasing the concentration of the studied inhibitors. Maximum inhibition efficiency of the surfactants is observed at concentrations around its critical micellar concentration (CMC). Adsorption of complex surfactants on the mild steel surface is in agreement with the Langmuir adsorption isotherm model, and the calculated Gibbs free energy values confirm the chemical nature of the adsorption. Energy dispersive X-ray fluorescence microscopy (EDRF) observations of the electrode surface confirmed the existence of such an adsorbed film.

  7. Hereditary Angioedema Attacks: Local Swelling at Multiple Sites.

    Science.gov (United States)

    Hofman, Zonne L M; Relan, Anurag; Hack, C Erik

    2016-02-01

    Hereditary angioedema (HAE) patients experience recurrent local swelling in various parts of the body including painful swelling of the intestine and life-threatening laryngeal oedema. Most HAE literature is about attacks located in one anatomical site, though it is mentioned that HAE attacks may also involve multiple anatomical sites simultaneously. A detailed description of such multi-location attacks is currently lacking. This study investigated the occurrence, severity and clinical course of HAE attacks with multiple anatomical locations. HAE patients included in a clinical database of recombinant human C1-inhibitor (rhC1INH) studies were evaluated. Visual analog scale scores filled out by the patients for various symptoms at various locations and investigator symptoms scores during the attack were analysed. Data of 219 eligible attacks in 119 patients was analysed. Thirty-three patients (28%) had symptoms at multiple locations in anatomically unrelated regions at the same time during their first attack. Up to five simultaneously affected locations were reported. The observation that severe HAE attacks often affect multiple sites in the body suggests that HAE symptoms result from a systemic rather than from a local process as is currently believed. PMID:25527240

  8. Simultaneous Attacks by Terrorist Organisations

    Directory of Open Access Journals (Sweden)

    Kathleen Deloughery

    2013-12-01

    Full Text Available While terror attacks that are a part of a coordinated effort receive attention in the popular media, they have not received much attention in the academic literature. The decision to carry out simultaneous attacks should be examined as one of the choices a terrorist organisation makes about the method of attack. Determining the impact of simultaneous attacks vis-à-vis a single attack can explain why groups would use this method. Up to one quarter of all attacks coded in two major databases, GTD and ITERATE, may be part of a simultaneous campaign. Empirical analysis shows simultaneous attacks are more likely to be successful and cause more fatalities, though not in a one-to-one fashion. These results underline the importance of considering simultaneous attacks in empirical analysis.

  9. Inferring selection in the Anopheles gambiae species complex: an example from immune-related serine protease inhibitors

    OpenAIRE

    Little Tom J; Welch John J; Obbard Darren J

    2009-01-01

    Abstract Background Mosquitoes of the Anopheles gambiae species complex are the primary vectors of human malaria in sub-Saharan Africa. Many host genes have been shown to affect Plasmodium development in the mosquito, and so are expected to engage in an evolutionary arms race with the pathogen. However, there is little conclusive evidence that any of these mosquito genes evolve rapidly, or show other signatures of adaptive evolution. Methods Three serine protease inhibitors have previously be...

  10. When women attack.

    Science.gov (United States)

    McLaughlin, Bryan; Davis, Catasha; Coppini, David; Kim, Young Mie; Knisely, Sandra; McLeod, Douglas

    2015-01-01

    The common assumption that female candidates on the campaign trail should not go on the attack, because such tactics contradict gender stereotypes, has not received consistent support. We argue that in some circumstances gender stereotypes will favor female politicians going negative. To test this proposition, this study examines how gender cues affect voter reactions to negative ads in the context of a political sex scandal, a context that should prime gender stereotypes that favor females. Using an online experiment involving a national sample of U.S. adults (N = 599), we manipulate the gender and partisan affiliation of a politician who attacks a male opponent caught in a sex scandal involving sexually suggestive texting to a female intern. Results show that in the context of a sex scandal, a female candidate going on the attack is evaluated more positively than a male. Moreover, while female participants viewed the female sponsor more favorably, sponsor gender had no effect on male participants. Partisanship also influenced candidate evaluations: the Democratic female candidate was evaluated more favorably than her Republican female counterpart. PMID:26399945

  11. Network resilience against intelligent attacks constrained by the degree-dependent node removal cost

    International Nuclear Information System (INIS)

    We study the resilience of complex networks against attacks in which nodes are targeted intelligently, but where disabling a node has a cost to the attacker which depends on its degree. Attackers have to meet these costs with limited resources, which constrains their actions. A network's integrity is quantified in terms of the efficacy of the process that it supports. We calculate how the optimal attack strategy and the most attack-resistant network degree statistics depend on the node removal cost function and the attack resources. The resilience of networks against intelligent attacks is found to depend strongly on the node removal cost function faced by the attacker. In particular, if node removal costs increase sufficiently fast with the node degree, power law networks are found to be more resilient than Poissonian ones, even against optimized intelligent attacks. For cost functions increasing quadratically in the node degrees, intelligent attackers cannot damage the network more than random damages would.

  12. Simulating Cyber-Attacks for Fun and Profit

    CERN Document Server

    Futoransky, Ariel; Orlicki, Jose; Sarraute, Carlos

    2010-01-01

    We introduce a new simulation platform called Insight, created to design and simulate cyber-attacks against large arbitrary target scenarios. Insight has surprisingly low hardware and configuration requirements, while making the simulation a realistic experience from the attacker's standpoint. The scenarios include a crowd of simulated actors: network devices, hardware devices, software applications, protocols, users, etc. A novel characteristic of this tool is to simulate vulnerabilities (including 0-days) and exploits, allowing an attacker to compromise machines and use them as pivoting stones to continue the attack. A user can test and modify complex scenarios, with several interconnected networks, where the attacker has no initial connectivity with the objective of the attack. We give a concise description of this new technology, and its possible uses in the security research field, such as pentesting training, study of the impact of 0-days vulnerabilities, evaluation of security countermeasures, and risk...

  13. LITERATURE SURVEY ON WORMHOLE ATTACK

    OpenAIRE

    Avinash S. Bundela

    2015-01-01

    Security plays an important role in Mobile Ad Hoc Network when data transmission is performed within un - trusted wireless scenario. Various attacks like Black hole, Wormhole, Gray hole and many more have been identified & corresponding solutions have been proposed. These attacks are caused by the malicious node hence ad hoc wireless network is unprotected from the attacks of the malicious node. Between all these attacks the wormhole att ...

  14. Metal complexes of salicylhydroxamic acid (H2Sha), anthranilic hydroxamic acid and benzohydroxamic acid. Crystal and molecular structure of [Cu(phen)2(Cl)]Cl x H2Sha, a model for a peroxidase-inhibitor complex.

    Science.gov (United States)

    O'Brien, E C; Farkas, E; Gil, M J; Fitzgerald, D; Castineras, A; Nolan, K B

    2000-04-01

    Stability constants of iron(III), copper(II), nickel(II) and zinc(II) complexes of salicylhydroxamic acid (H2Sha), anthranilic hydroxamic acid (HAha) and benzohydroxamic acid (HBha) have been determined at 25.0 degrees C, I=0.2 mol dm(-3) KCl in aqueous solution. The complex stability order, iron(III) > copper(II) > nickel(II) approximately = zinc(II) was observed whilst complexes of H2Sha were found to be more stable than those of the other two ligands. In the preparation of ternary metal ion complexes of these ligands and 1,10-phenanthroline (phen) the crystalline complex [Cu(phen)2(Cl)]Cl x H2Sha was obtained and its crystal structure determined. This complex is a model for hydroxamate-peroxidase inhibitor interactions. PMID:10830846

  15. A Fluorescence Polarization Assay for Binding to Macrophage Migration Inhibitory Factor and Crystal Structures for Complexes of Two Potent Inhibitors

    Science.gov (United States)

    2016-01-01

    Human macrophage migration inhibitory factor (MIF) is both a keto–enol tautomerase and a cytokine associated with numerous inflammatory diseases and cancer. Consistent with observed correlations between inhibition of the enzymatic and biological activities, discovery of MIF inhibitors has focused on monitoring the tautomerase activity using l-dopachrome methyl ester or 4-hydroxyphenyl pyruvic acid as substrates. The accuracy of these assays is compromised by several issues including substrate instability, spectral interference, and short linear periods for product formation. In this work, we report the syntheses of fluorescently labeled MIF inhibitors and their use in the first fluorescence polarization-based assay to measure the direct binding of inhibitors to the active site. The assay allows the accurate and efficient identification of competitive, noncompetitive, and covalent inhibitors of MIF in a manner that can be scaled for high-throughput screening. The results for 22 compounds show that the most potent MIF inhibitors bind with Kd values of ca. 50 nM; two are from our laboratory, and the other is a compound from the patent literature. X-ray crystal structures for two of the most potent compounds bound to MIF are also reported here. Striking combinations of protein–ligand hydrogen bonding, aryl–aryl, and cation−π interactions are responsible for the high affinities. A new chemical series was then designed using this knowledge to yield two more strong MIF inhibitors/binders. PMID:27299179

  16. Synergistic Effects between mTOR Complex 1/2 and Glycolysis Inhibitors in Non-Small-Cell Lung Carcinoma Cells.

    Directory of Open Access Journals (Sweden)

    Suhua Jiang

    Full Text Available Cancer metabolism has greatly interested researchers. Mammalian target of rapamycin (mTOR is dysregulated in a variety of cancers and considered to be an appealing therapeutic target. It has been proven that growth factor signal, mediated by mTOR complex 1 (mTORC1, drives cancer metabolism by regulating key enzymes in metabolic pathways. However, the role of mTORC2 in cancer metabolism has not been thoroughly investigated. In this study, by employing automated spectrophotometry, we found the level of glucose uptake was decreased in non-small-cell lung carcinoma (NSCLC A549, PC-9 and SK-MES-1 cells treated with rapamycin or siRNA against Raptor, indicating that the inhibition of mTORC1 attenuated glycolytic metabolism in NSCLC cells. Moreover, the inhibition of AKT reduced glucose uptake in the cells as well, suggesting the involvement of AKT pathway in mTORC1 mediated glycolytic metabolism. Furthermore, our results showed a significant decrease in glucose uptake in rictor down-regulated NSCLC cells, implying a critical role of mTORC2 in NSCLC cell glycolysis. In addition, the experiments for MTT, ATP, and clonogenic assays demonstrated a reduction in cell proliferation, cell viability, and colony forming ability in mTOR inhibiting NSCLC cells. Interestingly, the combined application of mTORC1/2 inhibitors and glycolysis inhibitor not only suppressed the cell proliferation and colony formation, but also induced cell apoptosis, and such an effect of the combined application was stronger than that caused by mTORC1/2 inhibitors alone. In conclusion, this study reports a novel effect of mTORC2 on NSCLC cell metabolism, and reveals the synergistic effects between mTOR complex 1/2 and glycolysis inhibitors, suggesting that the combined application of mTORC1/2 and glycolysis inhibitors may be a new promising approach to treat NSCLC.

  17. Structural Learning of Attack Vectors for Generating Mutated XSS Attacks

    Directory of Open Access Journals (Sweden)

    Yi-Hsun Wang

    2010-09-01

    Full Text Available Web applications suffer from cross-site scripting (XSS attacks that resulting from incomplete or incorrect input sanitization. Learning the structure of attack vectors could enrich the variety of manifestations in generated XSS attacks. In this study, we focus on generating more threatening XSS attacks for the state-of-the-art detection approaches that can find potential XSS vulnerabilities in Web applications, and propose a mechanism for structural learning of attack vectors with the aim of generating mutated XSS attacks in a fully automatic way. Mutated XSS attack generation depends on the analysis of attack vectors and the structural learning mechanism. For the kernel of the learning mechanism, we use a Hidden Markov model (HMM as the structure of the attack vector model to capture the implicit manner of the attack vector, and this manner is benefited from the syntax meanings that are labeled by the proposed tokenizing mechanism. Bayes theorem is used to determine the number of hidden states in the model for generalizing the structure model. The paper has the contributions as following: (1 automatically learn the structure of attack vectors from practical data analysis to modeling a structure model of attack vectors, (2 mimic the manners and the elements of attack vectors to extend the ability of testing tool for identifying XSS vulnerabilities, (3 be helpful to verify the flaws of blacklist sanitization procedures of Web applications. We evaluated the proposed mechanism by Burp Intruder with a dataset collected from public XSS archives. The results show that mutated XSS attack generation can identify potential vulnerabilities.

  18. Insights into affinity and specificity in the complexes of α-lytic protease and its inhibitor proteins: binding free energy from molecular dynamics simulation†

    Science.gov (United States)

    Cieplak, Piotr

    2014-01-01

    We report the binding free energy calculation and its decomposition for the complexes of α-lytic protease and its protein inhibitors using molecular dynamics simulation. Standard mechanism serine protease inhibitors eglin C and OMTKY3 are known to have strong binding affinity for many serine proteases. Their binding loops have significant similarities, including a common P1 Leu as the main anchor in the binding interface. However, recent experiments demonstrate that the two inhibitors have vastly different affinity towards α-lytic protease (ALP), a bacterial serine protease. OMTKY3 inhibits the enzyme much more weakly (by ~106 times) than eglin C. Moreover, a variant of OMTKY3 with five mutations, OMTKY3M, has been shown to inhibit 104 times more strongly than the wild-type inhibitor. The underlying mechanisms for the unusually large difference in binding affinities and the effect of mutation are not well understood. Here we use molecular dynamics simulation with molecular mechanics–Poisson Boltzmann/surface area method (MM-PB/SA) to investigate quantitatively the binding specificity. The calculated absolute binding free energies correctly differentiate the thermodynamic stabilities of these protein complexes, but the magnitudes of the binding affinities are systematically overestimated. Analysis of the binding free energy components provides insights into the molecular mechanism of binding specificity. The large ΔΔGbind between eglin C and wild type OMTKY3 towards ALP is mainly attributable to the stronger nonpolar interactions in the ALP-eglin C complex, arising from a higher degree of structural complementarity. Here the electrostatic interaction contributes to a lesser extent. The enhanced inhibition in the penta-mutant OMTKY3M over its wild type is entirely due to an overall improvement in the solvent-mediated electrostatic interactions in the ALP-OMTKY3M complex. The results suggest that for these protein-complexes and similar enzyme-inhibitor systems

  19. Insights into affinity and specificity in the complexes of alpha-lytic protease and its inhibitor proteins: binding free energy from molecular dynamics simulation.

    Science.gov (United States)

    Deng, Nan-Jie; Cieplak, Piotr

    2009-07-01

    We report the binding free energy calculation and its decomposition for the complexes of alpha-lytic protease and its protein inhibitors using molecular dynamics simulation. Standard mechanism serine protease inhibitors eglin C and OMTKY3 are known to have strong binding affinity for many serine proteases. Their binding loops have significant similarities, including a common P1 Leu as the main anchor in the binding interface. However, recent experiments demonstrate that the two inhibitors have vastly different affinity towards alpha-lytic protease (ALP), a bacterial serine protease. OMTKY3 inhibits the enzyme much more weakly (by approximately 10(6) times) than eglin C. Moreover, a variant of OMTKY3 with five mutations, OMTKY3M, has been shown to inhibit 10(4) times more strongly than the wild-type inhibitor. The underlying mechanisms for the unusually large difference in binding affinities and the effect of mutation are not well understood. Here we use molecular dynamics simulation with molecular mechanics-Poisson Boltzmann/surface area method (MM-PB/SA) to investigate quantitatively the binding specificity. The calculated absolute binding free energies correctly differentiate the thermodynamic stabilities of these protein complexes, but the magnitudes of the binding affinities are systematically overestimated. Analysis of the binding free energy components provides insights into the molecular mechanism of binding specificity. The large DeltaDeltaG(bind) between eglin C and wild type OMTKY3 towards ALP is mainly attributable to the stronger nonpolar interactions in the ALP-eglin C complex, arising from a higher degree of structural complementarity. Here the electrostatic interaction contributes to a lesser extent. The enhanced inhibition in the penta-mutant OMTKY3M over its wild type is entirely due to an overall improvement in the solvent-mediated electrostatic interactions in the ALP-OMTKY3M complex. The results suggest that for these protein-complexes and

  20. Enzyme inhibitor studies reveal complex control of methyl-D-erythritol 4-phosphate (MEP pathway enzyme expression in Catharanthus roseus.

    Directory of Open Access Journals (Sweden)

    Mei Han

    Full Text Available In Catharanthus roseus, the monoterpene moiety exerts a strong flux control for monoterpene indole alkaloid (MIA formation. Monoterpene synthesis depends on the methyl-D-erythritol 4-phosphate (MEP pathway. Here, we have explored the regulation of this pathway in response to developmental and environmental cues and in response to specific enzyme inhibitors. For the MEP pathway entry enzyme 1-deoxy-D-xylulose 5-phosphate synthase (DXS, a new (type I DXS isoform, CrDXS1, has been cloned, which, in contrast to previous reports on type II CrDXS, was not transcriptionally activated by the transcription factor ORCA3. Regulation of the MEP pathway in response to metabolic perturbations has been explored using the enzyme inhibitors clomazone (precursor of 5-ketochlomazone, inhibitor of DXS and fosmidomycin (inhibitor of deoxyxylulose 5-phosphate reductoisomerase (DXR, respectively. Young leaves of non-flowering plants were exposed to both inhibitors, adopting a non-invasive in vivo technique. Transcripts and proteins of DXS (3 isoforms, DXR, and hydroxymethylbutenyl diphosphate synthase (HDS were monitored, and protein stability was followed in isolated chloroplasts. Transcripts for DXS1 were repressed by both inhibitors, whereas transcripts for DXS2A&B, DXR and HDS increased after clomazone treatment but were barely affected by fosmidomycin treatment. DXS protein accumulated in response to both inhibitors, whereas DXR and HDS proteins were less affected. Fosmidomycin-induced accumulation of DXS protein indicated substantial posttranscriptional regulation. Furthermore, fosmidomycin effectively protected DXR against degradation in planta and in isolated chloroplasts. Thus our results suggest that DXR protein stability may be affected by substrate binding. In summary, the present results provide novel insight into the regulation of DXS expression in C. roseus in response to MEP-pathway perturbation.

  1. Enzyme Inhibitor Studies Reveal Complex Control of Methyl-D-Erythritol 4-Phosphate (MEP) Pathway Enzyme Expression in Catharanthus roseus

    Science.gov (United States)

    Han, Mei; Heppel, Simon C.; Su, Tao; Bogs, Jochen; Zu, Yuangang; An, Zhigang; Rausch, Thomas

    2013-01-01

    In Catharanthus roseus, the monoterpene moiety exerts a strong flux control for monoterpene indole alkaloid (MIA) formation. Monoterpene synthesis depends on the methyl-D-erythritol 4-phosphate (MEP) pathway. Here, we have explored the regulation of this pathway in response to developmental and environmental cues and in response to specific enzyme inhibitors. For the MEP pathway entry enzyme 1-deoxy-D-xylulose 5-phosphate synthase (DXS), a new (type I) DXS isoform, CrDXS1, has been cloned, which, in contrast to previous reports on type II CrDXS, was not transcriptionally activated by the transcription factor ORCA3. Regulation of the MEP pathway in response to metabolic perturbations has been explored using the enzyme inhibitors clomazone (precursor of 5-ketochlomazone, inhibitor of DXS) and fosmidomycin (inhibitor of deoxyxylulose 5-phosphate reductoisomerase (DXR)), respectively. Young leaves of non-flowering plants were exposed to both inhibitors, adopting a non-invasive in vivo technique. Transcripts and proteins of DXS (3 isoforms), DXR, and hydroxymethylbutenyl diphosphate synthase (HDS) were monitored, and protein stability was followed in isolated chloroplasts. Transcripts for DXS1 were repressed by both inhibitors, whereas transcripts for DXS2A&B, DXR and HDS increased after clomazone treatment but were barely affected by fosmidomycin treatment. DXS protein accumulated in response to both inhibitors, whereas DXR and HDS proteins were less affected. Fosmidomycin-induced accumulation of DXS protein indicated substantial posttranscriptional regulation. Furthermore, fosmidomycin effectively protected DXR against degradation in planta and in isolated chloroplasts. Thus our results suggest that DXR protein stability may be affected by substrate binding. In summary, the present results provide novel insight into the regulation of DXS expression in C. roseus in response to MEP-pathway perturbation. PMID:23650515

  2. Seven Deadliest Unified Communications Attacks

    CERN Document Server

    York, Dan

    2010-01-01

    Do you need to keep up with the latest hacks, attacks, and exploits effecting Unified Communications technology? Then you need Seven Deadliest Unified Communication Attacks. This book pinpoints the most dangerous hacks and exploits specific to Unified Communications, laying out the anatomy of these attacks including how to make your system more secure. You will discover the best ways to defend against these vicious hacks with step-by-step instruction and learn techniques to make your computer and network impenetrable. Attacks featured in this book include: UC Ecosystem Attacks Insecure Endpo

  3. The Role of mTOR Inhibitors in the Treatment of Patients with Tuberous Sclerosis Complex: Evidence-based and Expert Opinions.

    Science.gov (United States)

    Curatolo, Paolo; Bjørnvold, Marit; Dill, Patricia E; Ferreira, José Carlos; Feucht, Martha; Hertzberg, Christoph; Jansen, Anna; Jóźwiak, Sergiusz; Kingswood, J Christopher; Kotulska, Katarzyna; Macaya, Alfons; Moavero, Romina; Nabbout, Rima; Zonnenberg, Bernard A

    2016-04-01

    Tuberous sclerosis complex (TSC) is a genetic disorder arising from mutations in the TSC1 or TSC2 genes. The resulting over-activation of the mammalian target of rapamycin (mTOR) signalling pathway leaves patients with TSC susceptible to the growth of non-malignant tumours in multiple organs. Previously, surgery was the main therapeutic option for TSC. However, pharmacological therapy with mTOR inhibitors such as everolimus and sirolimus is now emerging as an alternate approach. Everolimus and sirolimus have already been shown to be effective in treating subependymal giant cell astrocytoma (SEGA) and renal angiomyolipoma (AML), and everolimus is currently being evaluated in treating TSC-related epilepsy. In November 2013 a group of European experts convened to discuss the current options and practical considerations for treating various manifestations of TSC. This article provides evidence-based recommendations for the treatment of SEGA, TSC-related epilepsy and renal AML, with a focus on where mTOR inhibitor therapy may be considered alongside other treatment options. Safety considerations regarding mTOR inhibitor therapy are also reviewed. With evidence of beneficial effects in neurological and non-neurological TSC manifestations, mTOR inhibitors may represent a systemic treatment for TSC. PMID:26927950

  4. Structural Learning of Attack Vectors for Generating Mutated XSS Attacks

    CERN Document Server

    Wang, Yi-Hsun; Lee, Hahn-Ming; 10.4204/EPTCS.35.2

    2010-01-01

    Web applications suffer from cross-site scripting (XSS) attacks that resulting from incomplete or incorrect input sanitization. Learning the structure of attack vectors could enrich the variety of manifestations in generated XSS attacks. In this study, we focus on generating more threatening XSS attacks for the state-of-the-art detection approaches that can find potential XSS vulnerabilities in Web applications, and propose a mechanism for structural learning of attack vectors with the aim of generating mutated XSS attacks in a fully automatic way. Mutated XSS attack generation depends on the analysis of attack vectors and the structural learning mechanism. For the kernel of the learning mechanism, we use a Hidden Markov model (HMM) as the structure of the attack vector model to capture the implicit manner of the attack vector, and this manner is benefited from the syntax meanings that are labeled by the proposed tokenizing mechanism. Bayes theorem is used to determine the number of hidden states in the model...

  5. Attacks on computer systems

    Directory of Open Access Journals (Sweden)

    Dejan V. Vuletić

    2012-01-01

    Full Text Available Computer systems are a critical component of the human society in the 21st century. Economic sector, defense, security, energy, telecommunications, industrial production, finance and other vital infrastructure depend on computer systems that operate at local, national or global scales. A particular problem is that, due to the rapid development of ICT and the unstoppable growth of its application in all spheres of the human society, their vulnerability and exposure to very serious potential dangers increase. This paper analyzes some typical attacks on computer systems.

  6. How Is a Heart Attack Treated?

    Science.gov (United States)

    ... from the NHLBI on Twitter. How Is a Heart Attack Treated? Early treatment for a heart attack can ... or years after the procedure. Other Treatments for Heart Attack Other treatments for heart attack include: Medicines Medical ...

  7. How Is a Heart Attack Diagnosed?

    Science.gov (United States)

    ... from the NHLBI on Twitter. How Is a Heart Attack Diagnosed? Your doctor will diagnose a heart attack ... This Content: NEXT >> Featured Video What is a heart attack? 05/22/2014 Describes how a heart attack ...

  8. High-resolution crystal structure of Streptococcus pyogenes β-NAD+ glycohydrolase in complex with its endogenous inhibitor IFS reveals a highly water-rich interface

    International Nuclear Information System (INIS)

    The crystal structure of the complex between the C-terminal domain of Streptococcus pyogenes β-NAD+ glycohydrolase and an endogenous inhibitor for SPN was determined at 1.70 Å. It reveals that the interface between the two proteins is highly rich in water molecules. One of the virulence factors produced by Streptococcus pyogenes is β-NAD+ glycohydrolase (SPN). S. pyogenes injects SPN into the cytosol of an infected host cell using the cytolysin-mediated translocation pathway. As SPN is toxic to bacterial cells themselves, S. pyogenes possesses the ifs gene that encodes an endogenous inhibitor for SPN (IFS). IFS is localized intracellularly and forms a complex with SPN. This intracellular complex must be dissociated during export through the cell envelope. To provide a structural basis for understanding the interactions between SPN and IFS, the complex was overexpressed between the mature SPN (residues 38–451) and the full-length IFS (residues 1–161), but it could not be crystallized. Therefore, limited proteolysis was used to isolate a crystallizable SPNct–IFS complex, which consists of the SPN C-terminal domain (SPNct; residues 193–451) and the full-length IFS. Its crystal structure has been determined by single anomalous diffraction and the model refined at 1.70 Å resolution. Interestingly, our high-resolution structure of the complex reveals that the interface between SPNct and IFS is highly rich in water molecules and many of the interactions are water-mediated. The wet interface may facilitate the dissociation of the complex for translocation across the cell envelope

  9. High-resolution crystal structure of Streptococcus pyogenes β-NAD{sup +} glycohydrolase in complex with its endogenous inhibitor IFS reveals a highly water-rich interface

    Energy Technology Data Exchange (ETDEWEB)

    Yoon, Ji Young; An, Doo Ri; Yoon, Hye-Jin [Seoul National University, Seoul 151-747 (Korea, Republic of); Kim, Hyoun Sook [Seoul National University, Seoul 151-747 (Korea, Republic of); Seoul National University, Seoul 151-742 (Korea, Republic of); Lee, Sang Jae [Seoul National University, Seoul 151-742 (Korea, Republic of); Im, Ha Na; Jang, Jun Young [Seoul National University, Seoul 151-747 (Korea, Republic of); Suh, Se Won, E-mail: sewonsuh@snu.ac.kr [Seoul National University, Seoul 151-747 (Korea, Republic of); Seoul National University, Seoul 151-747 (Korea, Republic of)

    2013-11-01

    The crystal structure of the complex between the C-terminal domain of Streptococcus pyogenes β-NAD{sup +} glycohydrolase and an endogenous inhibitor for SPN was determined at 1.70 Å. It reveals that the interface between the two proteins is highly rich in water molecules. One of the virulence factors produced by Streptococcus pyogenes is β-NAD{sup +} glycohydrolase (SPN). S. pyogenes injects SPN into the cytosol of an infected host cell using the cytolysin-mediated translocation pathway. As SPN is toxic to bacterial cells themselves, S. pyogenes possesses the ifs gene that encodes an endogenous inhibitor for SPN (IFS). IFS is localized intracellularly and forms a complex with SPN. This intracellular complex must be dissociated during export through the cell envelope. To provide a structural basis for understanding the interactions between SPN and IFS, the complex was overexpressed between the mature SPN (residues 38–451) and the full-length IFS (residues 1–161), but it could not be crystallized. Therefore, limited proteolysis was used to isolate a crystallizable SPN{sub ct}–IFS complex, which consists of the SPN C-terminal domain (SPN{sub ct}; residues 193–451) and the full-length IFS. Its crystal structure has been determined by single anomalous diffraction and the model refined at 1.70 Å resolution. Interestingly, our high-resolution structure of the complex reveals that the interface between SPN{sub ct} and IFS is highly rich in water molecules and many of the interactions are water-mediated. The wet interface may facilitate the dissociation of the complex for translocation across the cell envelope.

  10. Recent "phishing" attacks

    CERN Multimedia

    IT Department

    2009-01-01

    Over the last few weeks there has been a marked increase in the number of attacks on CERN made by cybercriminals. Typical attacks arrive in the form of e-mail messages purporting to come from the CERN Help Desk, Mail Service, or some similarly official-sounding entity and suggest that there is a problem with your account, such as it being over-quota. They then ask you to click on a link or to reply and give your password. Please don’t! Be cautious of any unexpected messages containing web links even if they appear to come from known contacts. If you happen to click on such a link and if your permission is requested to run or install software, always decline it. NEVER provide your password or other details if these are requested. These messages try to trick you into clicking on Web links which will help them to install malicious software on your computer, and anti-virus software cannot be relied on to detect all cases. In case of questions on this topic, you may contact mailto:helpdesk@cern.ch. CERN Comput...

  11. FLOODING ATTACK AWARE SECURE AODV

    OpenAIRE

    Madhavi, S; K. Duraiswamy

    2013-01-01

    Providing security in a Mobile Ad hoc Network (MANET) is a challenging task due to its inherent nature. Flooding is a type of Denial of Service (DoS) attack in MANET. Intentional flooding may lead to disturbances in the networking operation. This kind of attack consumes battery power, storage space and bandwidth. Flooding the excessive number of packets may degrade the performance of the network. This study considers hello flooding attack. As the hello packets are continuously flooded by the ...

  12. Sulfate attack expansion mechanisms

    Energy Technology Data Exchange (ETDEWEB)

    Müllauer, Wolfram, E-mail: wolf_m@gmx.at; Beddoe, Robin E.; Heinz, Detlef

    2013-10-15

    A specially constructed stress cell was used to measure the stress generated in thin-walled Portland cement mortar cylinders caused by external sulfate attack. The effects of sulfate concentration of the storage solution and C{sub 3}A content of the cement were studied. Changes in mineralogical composition and pore size distribution were investigated by X-ray diffraction and mercury intrusion porosimetry, respectively. Damage is due to the formation of ettringite in small pores (10–50 nm) which generates stresses up to 8 MPa exceeding the tensile strength of the binder matrix. Higher sulfate concentrations and C{sub 3}A contents result in higher stresses. The results can be understood in terms of the effect of crystal surface energy and size on supersaturation and crystal growth pressure.

  13. Seven Deadliest Web Application Attacks

    CERN Document Server

    Shema, Mike

    2010-01-01

    Do you need to keep up with the latest hacks, attacks, and exploits effecting web applications? Then you need Seven Deadliest Web Application Attacks. This book pinpoints the most dangerous hacks and exploits specific to web applications, laying out the anatomy of these attacks including how to make your system more secure. You will discover the best ways to defend against these vicious hacks with step-by-step instruction and learn techniques to make your computer and network impenetrable. .. .. Attacks detailed in this book include: ..: ..; Cross-Site Scripting (XSS) ..; Cross-Site Request Fo

  14. Seven Deadliest Social Network Attacks

    CERN Document Server

    Timm, Carl

    2010-01-01

    Do you need to keep up with the latest hacks, attacks, and exploits effecting social networks? Then you need Seven Deadliest Social Network Attacks. This book pinpoints the most dangerous hacks and exploits specific to social networks like Facebook, Twitter, and MySpace, laying out the anatomy of these attacks including how to make your system more secure. You will discover the best ways to defend against these vicious hacks with step-by-step instruction and learn techniques to make your computer and network impenetrable. Attacks detailed in this book include: Social Networking Infrastruct

  15. BINDING OF THE RESPIRATORY CHAIN INHIBITOR ANTIMYCIN TO THE MITOCHONDRIAL bc1 COMPLEX: A NEW CRYSTAL STRUCTURE REVEALS AN ALTERED INTRAMOLECULAR HYDROGEN-BONDING PATTERN.

    OpenAIRE

    Huang, Li-shar; Cobessi, David; Tung, Eric Y.; Berry, Edward A.

    2005-01-01

    Antimycin A (antimycin), one of the first known and most potent inhibitors of the mitochondrial respiratory chain, binds to the quinone reduction site of the cytochrome bc1 complex. Structure-activity-relationship studies have shown that the N-formylamino-salicyl-amide group is responsible for most of the binding specificity, and suggested that a low pKa for the phenolic OH group and an intramolecular H-bond between that OH and the carbonyl O of the salicylamide linkage are important. Tw...

  16. Inhibitors of the mitochondrial cytochrome b-c1 complex inhibit the cyanide-insensitive respiration of Trypanosoma brucei.

    Science.gov (United States)

    Turrens, J F; Bickar, D; Lehninger, A L

    1986-06-01

    The cyanide-insensitive respiration of bloodstream trypomastigote forms of Trypanosoma brucei (75 +/- 8 nmol O2 min-1(mg protein)-1) is completely inhibited by the mitochondrial ubiquinone-like inhibitors 2-hydroxy-3-undecyl-1,4-naphthoquinone (UHNQ) and 5-n-undecyl-6-hydroxy-4,7-dioxobenzothiazole (UHDBT). The Ki values for UHDBT (30 nM) and UHNQ (2 microM) are much lower than the reported Ki for salicylhydroxamic acid (SHAM) (5 microM), a widely used inhibitor of the cyanide-insensitive oxidase. UHNQ also stimulated the glycerol-3-phosphate-dependent reduction of phenazine methosulfate, demonstrating that the site of UHNQ inhibition is on the terminal oxidase of the cyanide-insensitive respiration of T. brucei. These results suggest that a ubiquinone-like compound may act as an electron carrier between the two enzymatic components of the cyanide-insensitive glycerol-3-phosphate oxidase. PMID:3016533

  17. High-resolution complex of papain with remnants of a cysteine protease inhibitor derived from Trypanosoma brucei

    OpenAIRE

    Alphey, Magnus S.; Hunter, William N.

    2006-01-01

    Attempts to cocrystallize the cysteine protease papain derived from the latex of Carica papaya with an inhibitor of cysteine proteases (ICP) from Trypanosoma brucei were unsuccessful. However, crystals of papain that diffracted to higher resolution, 1.5 Å, than other crystals of this archetypal cysteine protease were obtained, so the analysis was continued. Surprisingly, the substrate-binding cleft was occupied by two short peptide fragments which have been assigned as remnants of ICP. Compar...

  18. How to deal with weak interactions in noncovalent complexes analyzed by electrospray mass spectrometry: cyclopeptidic inhibitors of the nuclear receptor coactivator 1-STAT6.

    Science.gov (United States)

    Touboul, David; Maillard, Ludovic; Grässlin, Anja; Moumne, Roba; Seitz, Markus; Robinson, John; Zenobi, Renato

    2009-02-01

    Mass spectrometry, and especially electrospray ionization, is now an efficient tool to study noncovalent interactions between proteins and inhibitors. It is used here to study the interaction of some weak inhibitors with the NCoA-1/STAT6 protein with K(D) values in the microM range. High signal intensities corresponding to some nonspecific electrostatic interactions between NCoA-1 and the oppositely charged inhibitors were observed by nanoelectrospray mass spectrometry, due to the use of high ligand concentrations. Diverse strategies have already been developed to deal with nonspecific interactions, such as controlled dissociation in the gas phase, mathematical modeling, or the use of a reference protein to monitor the appearance of nonspecific complexes. We demonstrate here that this last methodology, validated only in the case of neutral sugar-protein interactions, i.e., where dipole-dipole interactions are crucial, is not relevant in the case of strong electrostatic interactions. Thus, we developed a novel strategy based on half-maximal inhibitory concentration (IC(50)) measurements in a competitive assay with readout by nanoelectrospray mass spectrometry. IC(50) values determined by MS were finally converted into dissociation constants that showed very good agreement with values determined in the liquid phase using a fluorescence polarization assay. PMID:18996720

  19. Prospective, double-blind, placebo-controlled trials of ecallantide for acute attacks of hereditary angioedema.

    Science.gov (United States)

    Stolz, Leslie E; Sheffer, Albert L

    2012-01-01

    Hereditary angioedema (HAE) is a rare genetic disorder characterized by unpredictable, episodic, incapacitating attacks of well-demarcated angioedema in the absence of urticaria and pruritus. HAE is due to deficient or dysfunctional C1-esterase inhibitor activity, which results in unopposed activation of plasma kallikrein, resulting in increased levels of bradykinin. Ecallantide is a potent and specific plasma kallikrein inhibitor approved for the treatment of acute attacks of HAE affecting any anatomic site. In Phase III clinical trials, subcutaneously administered ecallantide demonstrated significant, rapid and durable symptom relief. Ecallantide was effective for all attack types, including potentially life-threatening laryngeal attacks. The main safety concern is potentially serious hypersensitivity reactions, including anaphylaxis. Ecallantide represents an important treatment option for the management of acute attacks of HAE. PMID:22149337

  20. Thrombolytic drugs for heart attack

    Science.gov (United States)

    ... attack URL of this page: //medlineplus.gov/ency/article/007488.htm Thrombolytic drugs for heart attack To use the sharing features on this page, ... the management of patients with non-ST-elevation acute coronary syndromes: a report ... myocardial infarction: a report of the American College of Cardiology ...

  1. Structural insights on the pamoic acid and the 8 kDa domain of DNA polymerase beta complex: Towards the design of higher-affinity inhibitors

    Directory of Open Access Journals (Sweden)

    Ciais Marion

    2008-04-01

    Full Text Available Abstract Background DNA polymerase beta (pol beta, the error-prone DNA polymerase of single-stranded DNA break repair as well as base excision repair pathways, is overexpressed in several tumors and takes part in chemotherapeutic agent resistance, like that of cisplatin, through translesion synthesis. For this reason pol beta has become a therapeutic target. Several inhibitors have been identified, but none of them presents a sufficient affinity and specificity to become a drug. The fragment-based inhibitor design allows an important improvement in affinity of small molecules. The initial and critical step for setting up the fragment-based strategy consists in the identification and structural characterization of the first fragment bound to the target. Results We have performed docking studies of pamoic acid, a 9 micromolar pol beta inhibitor, and found that it binds in a single pocket at the surface of the 8 kDa domain of pol beta. However, docking studies provided five possible conformations for pamoic acid in this site. NMR experiments were performed on the complex to select a single conformation among the five retained. Chemical Shift Mapping data confirmed pamoic acid binding site found by docking while NOESY and saturation transfer experiments provided distances between pairs of protons from the pamoic acid and those of the 8 kDa domain that allowed the identification of the correct conformation. Conclusion Combining NMR experiments on the complex with docking results allowed us to build a three-dimensional structural model. This model serves as the starting point for further structural studies aimed at improving the affinity of pamoic acid for binding to DNA polymerase beta.

  2. Molecular basis for the inhibition of β-hydroxyacyl-ACP dehydratase HadAB complex from Mycobacterium tuberculosis by flavonoid inhibitors.

    Science.gov (United States)

    Dong, Yu; Qiu, Xiaodi; Shaw, Neil; Xu, Yueyang; Sun, Yuna; Li, Xuemei; Li, Jun; Rao, Zihe

    2015-07-01

    Dehydration is one of the key steps in the biosynthesis of mycolic acids and is vital to the growth of Mycobacterium tuberculosis (Mtb). Consequently, stalling dehydration cures tuberculosis (TB). Clinically used anti-TB drugs like thiacetazone (TAC) and isoxyl (ISO) as well as flavonoids inhibit the enzyme activity of the β-hydroxyacyl-ACP dehydratase HadAB complex. How this inhibition is exerted, has remained an enigma for years. Here, we describe the first crystal structures of the MtbHadAB complex bound with flavonoid inhibitor butein, 2',4,4'-trihydroxychalcone or fisetin. Despite sharing no sequence identity from Blast, HadA and HadB adopt a very similar hotdog fold. HadA forms a tight dimer with HadB in which the proteins are sitting side-by-side, but are oriented anti-parallel. While HadB contributes the catalytically critical His-Asp dyad, HadA binds the fatty acid substrate in a long channel. The atypical double hotdog fold with a single active site formed by MtbHadAB gives rise to a long, narrow cavity that vertically traverses the fatty acid binding channel. At the base of this cavity lies Cys61, which upon mutation to Ser confers drug-resistance in TB patients. We show that inhibitors bind in this cavity and protrude into the substrate binding channel. Thus, inhibitors of MtbHadAB exert their effect by occluding substrate from the active site. The unveiling of this mechanism of inhibition paves the way for accelerating development of next generation of anti-TB drugs. PMID:26081470

  3. RES-529: a PI3K/AKT/mTOR pathway inhibitor that dissociates the mTORC1 and mTORC2 complexes.

    Science.gov (United States)

    Weinberg, Mark A

    2016-07-01

    RES-529 (previously named Palomid 529, P529) is a phosphoinositide 3-kinase (PI3K)/AKT/mechanistic target of rapamycin (mTOR) pathway inhibitor that interferes with the pathway through both mTOR complex 1 (mTORC1) and mTOR complex 2 (mTORC2) dissociation. This compound is currently being developed in oncology and ophthalmology. The oncology focus is for the treatment of glioblastoma, where it has received orphan designation by the US Food and Drug Administration, and prostate cancer. We present a review of the PI3K/AKT/mTOR pathway, its role in tumorigenesis, and the potential of RES-529 in cancer treatment. RES-529 inhibits mTORC1/mTORC2 activity in various cancer cell lines, as noted by decreased phosphorylation of substrates including ribosomal protein S6, 4E-BP1, and AKT, leading to cell growth inhibition and death, with activity generally in the range of 5-15 μmol/l. In animal tumor models where the PI3K/AKT/mTOR pathway is abnormally activated (i.e. glioblastoma, prostate cancer, and breast cancer), RES-529 reduces tumor growth by as much as 78%. RES-529 treatment is synergistic with radiation therapy, chemotherapy, and hormonal therapy in reducing tumor growth, potentially by preventing PI3K/AKT/mTOR pathway activation associated with these treatments. Furthermore, this compound has shown antiangiogenic activity in several animal models. mTORC1 and mTORC2 have redundant and distinct activities that contribute toward oncogenesis. Current inhibitors of this pathway have primarily targeted mTORC1, but have shown limited clinical efficacy. Inhibitors of mTORC1 and mTORC2 such as RES-529 may therefore have the potential to overcome the deficiencies found in targeting only mTORC1. PMID:26918392

  4. Superposition Attacks on Cryptographic Protocols

    DEFF Research Database (Denmark)

    Damgård, Ivan Bjerre; Funder, Jakob Løvstad; Nielsen, Jesper Buus;

    2011-01-01

    information. In this paper, we introduce a fundamentally new model of quantum attacks on classical cryptographic protocols, where the adversary is allowed to ask several classical queries in quantum superposition. This is a strictly stronger attack than the standard one, and we consider the security of...... string model. While our protocol is classical, it is sound against a cheating unbounded quantum prover and computational zero-knowledge even if the verifier is allowed a superposition attack. Finally, we consider multiparty computation and show that for the most general type of attack, simulation based...... several primitives in this model. We show that a secret-sharing scheme that is secure with threshold $t$ in the standard model is secure against superposition attacks if and only if the threshold is lowered to $t/2$. We use this result to give zero-knowledge proofs for all of NP in the common reference...

  5. Substance P induces localization of MIF/α1-inhibitor-3 complexes to umbrella cells via paracellular transit through the urothelium in the rat bladder

    Directory of Open Access Journals (Sweden)

    Vera Pedro L

    2006-09-01

    Full Text Available Abstract Background Macrophage migration inhibitory factor (MIF is released into the intraluminal fluid during bladder inflammation in the rat complexed to α1-inhibitor-3 (A1-I3; a rodent proteinase inhibitor in the α-macroglobulin family. The location of A1-I3 in the bladder had not been investigated. Therefore, we examined the location of A1-I3 and MIF/A1-I3 complexes in the bladder and changes due to experimental inflammation. Methods Anesthetized male rats had bladders removed with no treatment (intact or were injected with Substance P (SP; s.c.; saline vehicle. After one hour intraluminal fluid was removed, bladder was excised and MIF and A1-I3 levels were determined using ELISA and/or western-blotting. MIF co-immunoprecipitation determined MIF/A1-I3 complexes in the bladder. Bladder sections were immunostained for A1-I3 and MIF/A1-I3. Results A1-I3 immunostaining was observed in interstitial spaces throughout the bladder (including submucosa but not urothelium in intact and saline-treated rats. RT-PCR showed that the bladder does not synthesize A1-I3, therefore, A1-I3 in the interstitial space of the bladder must be plasma derived. In SP-treated rats, A1-I3 in the bladder increased and A1-I3 was observed traversing through the urothelium. Umbrella cells that do not show MIF and/or A1-I3 immunostaining in intact or saline-treated rats, showed co-localization of MIF and A1-I3 after SP-treatment. Western blotting demonstrated that in the bladder MIF formed non-covalent interactions and also binds covalently to A1-I3 to form high molecular weight MIF/A1-I3 complexes (170, 130 and 75-kDa, respectively, verified by co-immunoprecipitation. SP-induced inflammation selectively reduced 170-kDa MIF/A1-I3 in the bladder while increasing 170 and 130-kDa MIF/A1-I3 in the intraluminal fluid. Conclusion A1-I3 and MIF/A1-I3 complexes are resident in bladder interstitium. During SP-induced inflammation, MIF/A1-I3 complexes are released from the bladder

  6. Aqueous Molecular Dynamics Simulations of the M. tuberculosis Enoyl-ACP Reductase-NADH System and Its Complex with a Substrate Mimic or Diphenyl Ethers Inhibitors

    Directory of Open Access Journals (Sweden)

    Camilo Henrique da Silva Lima

    2015-10-01

    Full Text Available Molecular dynamics (MD simulations of 12 aqueous systems of the NADH-dependent enoyl-ACP reductase from Mycobacterium tuberculosis (InhA were carried out for up to 20–40 ns using the GROMACS 4.5 package. Simulations of the holoenzyme, holoenzyme-substrate, and 10 holoenzyme-inhibitor complexes were conducted in order to gain more insight about the secondary structure motifs of the InhA substrate-binding pocket. We monitored the lifetime of the main intermolecular interactions: hydrogen bonds and hydrophobic contacts. Our MD simulations demonstrate the importance of evaluating the conformational changes that occur close to the active site of the enzyme-cofactor complex before and after binding of the ligand and the influence of the water molecules. Moreover, the protein-inhibitor total steric (ELJ and electrostatic (EC interaction energies, related to Gly96 and Tyr158, are able to explain 80% of the biological response variance according to the best linear equation, pKi = 7.772 − 0.1885 × Gly96 + 0.0517 × Tyr158 (R2 = 0.80; n = 10, where interactions with Gly96, mainly electrostatic, increase the biological response, while those with Tyr158 decrease. These results will help to understand the structure-activity relationships and to design new and more potent anti-TB drugs.

  7. Aqueous Molecular Dynamics Simulations of the M. tuberculosis Enoyl-ACP Reductase-NADH System and Its Complex with a Substrate Mimic or Diphenyl Ethers Inhibitors

    Science.gov (United States)

    da Silva Lima, Camilo Henrique; de Alencastro, Ricardo Bicca; Kaiser, Carlos Roland; de Souza, Marcus Vinícius Nora; Rodrigues, Carlos Rangel; Albuquerque, Magaly Girão

    2015-01-01

    Molecular dynamics (MD) simulations of 12 aqueous systems of the NADH-dependent enoyl-ACP reductase from Mycobacterium tuberculosis (InhA) were carried out for up to 20–40 ns using the GROMACS 4.5 package. Simulations of the holoenzyme, holoenzyme-substrate, and 10 holoenzyme-inhibitor complexes were conducted in order to gain more insight about the secondary structure motifs of the InhA substrate-binding pocket. We monitored the lifetime of the main intermolecular interactions: hydrogen bonds and hydrophobic contacts. Our MD simulations demonstrate the importance of evaluating the conformational changes that occur close to the active site of the enzyme-cofactor complex before and after binding of the ligand and the influence of the water molecules. Moreover, the protein-inhibitor total steric (ELJ) and electrostatic (EC) interaction energies, related to Gly96 and Tyr158, are able to explain 80% of the biological response variance according to the best linear equation, pKi = 7.772 − 0.1885 × Gly96 + 0.0517 × Tyr158 (R2 = 0.80; n = 10), where interactions with Gly96, mainly electrostatic, increase the biological response, while those with Tyr158 decrease. These results will help to understand the structure-activity relationships and to design new and more potent anti-TB drugs. PMID:26457706

  8. Characterization and Solution Structure of the Factor VIII C2 Domain in a Ternary Complex with Classical and Non-classical Inhibitor Antibodies*

    Science.gov (United States)

    Walter, Justin D.; Werther, Rachel A.; Polozova, Maria S.; Pohlman, Julie; Healey, John F.; Meeks, Shannon L.; Lollar, Pete; Spiegel, P. Clint

    2013-01-01

    The most significant complication for patients with severe cases of congenital or acquired hemophilia A is the development of inhibitor antibodies against coagulation factor VIII (fVIII). The C2 domain of fVIII is a significant antigenic target of anti-fVIII antibodies. Here, we have utilized small angle x-ray scattering (SAXS) and biochemical techniques to characterize interactions between two different classes of anti-C2 domain inhibitor antibodies and the isolated C2 domain. Multiple assays indicated that antibodies 3E6 and G99 bind independently to the fVIII C2 domain and can form a stable ternary complex. SAXS-derived numerical estimates of dimensional parameters for all studied complexes agree with the proportions of the constituent proteins. Ab initio modeling of the SAXS data results in a long kinked structure of the ternary complex, showing an angle centered at the C2 domain of ∼130°. Guided by biochemical data, rigid body modeling of subunits into the molecular envelope of the ternary complex suggests that antibody 3E6 recognizes a C2 domain epitope consisting of the Arg2209–Ser2216 and Leu2178–Asp2187 loops. In contrast, antibody G99 recognizes the C2 domain primarily through the Pro2221–Trp2229 loop. These two epitopes are on opposing sides of the fVIII C2 domain, are consistent with the solvent accessibility in the context of the entire fVIII molecule, and provide further structural detail regarding the pathogenic immune response to fVIII. PMID:23417672

  9. Characterization and solution structure of the factor VIII C2 domain in a ternary complex with classical and non-classical inhibitor antibodies.

    Science.gov (United States)

    Walter, Justin D; Werther, Rachel A; Polozova, Maria S; Pohlman, Julie; Healey, John F; Meeks, Shannon L; Lollar, Pete; Spiegel, P Clint

    2013-04-01

    The most significant complication for patients with severe cases of congenital or acquired hemophilia A is the development of inhibitor antibodies against coagulation factor VIII (fVIII). The C2 domain of fVIII is a significant antigenic target of anti-fVIII antibodies. Here, we have utilized small angle x-ray scattering (SAXS) and biochemical techniques to characterize interactions between two different classes of anti-C2 domain inhibitor antibodies and the isolated C2 domain. Multiple assays indicated that antibodies 3E6 and G99 bind independently to the fVIII C2 domain and can form a stable ternary complex. SAXS-derived numerical estimates of dimensional parameters for all studied complexes agree with the proportions of the constituent proteins. Ab initio modeling of the SAXS data results in a long kinked structure of the ternary complex, showing an angle centered at the C2 domain of ∼130°. Guided by biochemical data, rigid body modeling of subunits into the molecular envelope of the ternary complex suggests that antibody 3E6 recognizes a C2 domain epitope consisting of the Arg(2209)-Ser(2216) and Leu(2178)-Asp(2187) loops. In contrast, antibody G99 recognizes the C2 domain primarily through the Pro(2221)-Trp(2229) loop. These two epitopes are on opposing sides of the fVIII C2 domain, are consistent with the solvent accessibility in the context of the entire fVIII molecule, and provide further structural detail regarding the pathogenic immune response to fVIII. PMID:23417672

  10. Structure of the catalytic domain of the Tannerella forsythia matrix metallopeptidase karilysin in complex with a tetrapeptidic inhibitor

    DEFF Research Database (Denmark)

    Guevara, Tibisay; Ksiazek, Miroslaw; Skottrup, Peter Durand;

    2013-01-01

    Karilysin is the only metallopeptidase identified as a virulence factor in the odontopathogen Tannerella forsythia owing to its deleterious effect on the host immune response during bacterial infection. The very close structural and sequence-based similarity of its catalytic domain (Kly18...... to the primed side of the active-site cleft in a substrate-like manner. The catalytic zinc ion is clamped by the α-amino group and the carbonyl O atom of the serine, thus distantly mimicking the general manner of binding of hydroxamate inhibitors to metallopeptidases and contributing, together with three zinc...

  11. Corrosion Inhibitors for Reinforced Concrete

    OpenAIRE

    ECT Team, Purdue

    2007-01-01

    Steel corrosion in reinforced concrete structures has been a major problem across the U.S. Steel-reinforced concrete structures are continually subject to attack by corrosion brought on by naturally occurring environmental conditions. FerroGard, a corrosion inhibitor, developed by Sika Corporation, penetrates hardened concrete to dramatically reduce corrosion by 65% and extend the structure's service life.

  12. Mitigation of Malicious Attacks on Networks

    CERN Document Server

    Schneider, Christian M; Andrade, Jose S; Havlin, Shlomo; Herrmann, Hans J; 10.1073/pnas.1009440108

    2011-01-01

    Terrorist attacks on transportation networks have traumatized modern societies. With a single blast, it has become possible to paralyze airline traffic, electric power supply, ground transportation or Internet communication. How and at which cost can one restructure the network such that it will become more robust against a malicious attack? We introduce a unique measure for robustness and use it to devise a method to mitigate economically and efficiently this risk. We demonstrate its efficiency on the European electricity system and on the Internet as well as on complex networks models. We show that with small changes in the network structure (low cost) the robustness of diverse networks can be improved dramatically while their functionality remains unchanged. Our results are useful not only for improving significantly with low cost the robustness of existing infrastructures but also for designing economically robust network systems.

  13. Quinoline-2-carboxaldehyde thiosemicarbazones and their Cu(II) and Ni(II) complexes as topoisomerase IIa inhibitors.

    Science.gov (United States)

    Bisceglie, Franco; Musiari, Anastasia; Pinelli, Silvana; Alinovi, Rossella; Menozzi, Ilaria; Polverini, Eugenia; Tarasconi, Pieralberto; Tavone, Matteo; Pelosi, Giorgio

    2015-11-01

    A series of quinoline-2-carboxaldehyde thiosemicarbazones and their copper(II) and nickel(II) complexes were synthesized and characterized. In all complexes the ligands are in the E configuration with respect to the imino bond and behave as terdentate. The copper(II) complexes form square planar derivatives with one molecule of terdentate ligand and chloride ion. A further non-coordinated chloride ion compensates the overall charge. Nickel(II) ions form instead octahedral complexes with two ligands for each metal ion, independently from the stoichiometric metal:ligand ratio used in the synthesis. Ligands and complexes were tested for their antiproliferative properties on histiocytic lymphoma cell line U937. Copper(II) derivatives are systematically more active than the ligands and the nickel complexes. All copper derivatives result in inhibiting topoisomerase IIa in vitro. Computational methods were used to propose a model to explain the different extent of inhibition presented by these compounds. The positive charge of the dissociated form of the copper complexes may play a key role in their action. PMID:26335598

  14. Assessing Terrorist Motivations for Attacking Critical Infrastructure

    Energy Technology Data Exchange (ETDEWEB)

    Ackerman, G; Abhayaratne, P; Bale, J; Bhattacharjee, A; Blair, C; Hansell, L; Jayne, A; Kosal, M; Lucas, S; Moran, K; Seroki, L; Vadlamudi, S

    2006-12-04

    Certain types of infrastructure--critical infrastructure (CI)--play vital roles in underpinning our economy, security and way of life. These complex and often interconnected systems have become so ubiquitous and essential to day-to-day life that they are easily taken for granted. Often it is only when the important services provided by such infrastructure are interrupted--when we lose easy access to electricity, health care, telecommunications, transportation or water, for example--that we are conscious of our great dependence on these networks and of the vulnerabilities that stem from such dependence. Unfortunately, it must be assumed that many terrorists are all too aware that CI facilities pose high-value targets that, if successfully attacked, have the potential to dramatically disrupt the normal rhythm of society, cause public fear and intimidation, and generate significant publicity. Indeed, revelations emerging at the time of this writing about Al Qaida's efforts to prepare for possible attacks on major financial facilities in New York, New Jersey, and the District of Columbia remind us just how real and immediate such threats to CI may be. Simply being aware that our nation's critical infrastructure presents terrorists with a plethora of targets, however, does little to mitigate the dangers of CI attacks. In order to prevent and preempt such terrorist acts, better understanding of the threats and vulnerabilities relating to critical infrastructure is required. The Center for Nonproliferation Studies (CNS) presents this document as both a contribution to the understanding of such threats and an initial effort at ''operationalizing'' its findings for use by analysts who work on issues of critical infrastructure protection. Specifically, this study focuses on a subsidiary aspect of CI threat assessment that has thus far remained largely unaddressed by contemporary terrorism research: the motivations and related factors that

  15. WILD PIG ATTACKS ON HUMANS

    Energy Technology Data Exchange (ETDEWEB)

    Mayer, J.

    2013-04-12

    Attacks on humans by wild pigs (Sus scrofa) have been documented since ancient times. However, studies characterizing these incidents are lacking. In an effort to better understand this phenomenon, information was collected from 412 wild pig attacks on humans. Similar to studies of large predator attacks on humans, data came from a variety of sources. The various attacks compiled occurred in seven zoogeographic realms. Most attacks occurred within the species native range, and specifically in rural areas. The occurrence was highest during the winter months and daylight hours. Most happened under non-hunting circumstances and appeared to be unprovoked. Wounded animals were the chief cause of these attacks in hunting situations. The animals involved were typically solitary, male and large in size. The fate of the wild pigs involved in these attacks varied depending upon the circumstances, however, most escaped uninjured. Most human victims were adult males traveling on foot and alone. The most frequent outcome for these victims was physical contact/mauling. The severity of resulting injuries ranged from minor to fatal. Most of the mauled victims had injuries to only one part of their bodies, with legs/feet being the most frequent body part injured. Injuries were primarily in the form of lacerations and punctures. Fatalities were typically due to blood loss. In some cases, serious infections or toxemia resulted from the injuries. Other species (i.e., pets and livestock) were also accompanying some of the humans during these attacks. The fates of these animals varied from escaping uninjured to being killed. Frequency data on both non-hunting and hunting incidents of wild pig attacks on humans at the Savannah River Site, South Carolina, showed quantitatively that such incidents are rare.

  16. The Staphylococcus aureus protein Sbi acts as a complement inhibitor and forms a tripartite complex with host complement Factor H and C3b.

    Directory of Open Access Journals (Sweden)

    Katrin Haupt

    2008-12-01

    Full Text Available The Gram-positive bacterium Staphylococcus aureus, similar to other pathogens, binds human complement regulators Factor H and Factor H related protein 1 (FHR-1 from human serum. Here we identify the secreted protein Sbi (Staphylococcus aureus binder of IgG as a ligand that interacts with Factor H by a-to our knowledge-new type of interaction. Factor H binds to Sbi in combination with C3b or C3d, and forms tripartite SbiratioC3ratioFactor H complexes. Apparently, the type of C3 influences the stability of the complex; surface plasmon resonance studies revealed a higher stability of C3d complexed to Sbi, as compared to C3b or C3. As part of this tripartite complex, Factor H is functionally active and displays complement regulatory activity. Sbi, by recruiting Factor H and C3b, acts as a potent complement inhibitor, and inhibits alternative pathway-mediated lyses of rabbit erythrocytes by human serum and sera of other species. Thus, Sbi is a multifunctional bacterial protein, which binds host complement components Factor H and C3 as well as IgG and beta(2-glycoprotein I and interferes with innate immune recognition.

  17. A New Guess-and-Determine Attack on the A5/1

    CERN Document Server

    Shah, Jay

    2012-01-01

    In Europe and North America, the most widely used stream cipher to ensure privacy and confidentiality of conversations in GSM mobile phones is the A5/1. In this paper, we present a new attack on the A5/1 stream cipher with a minimum time complexity of around 2^(40) and an average complexity of 2^(48.5), which is much less than the brute-force attack with a complexity of 2^(64). The attack has a 100% success rate and requires about 5.65GB storage. We provide a detailed description of our new attack along with its implementation and results.

  18. Detonation nanodiamond complexes with cancer stem cells inhibitors or paracrine products of mesenchymal stem cells as new potential medications

    Science.gov (United States)

    Konoplyannikov, A. G.; Alekseenskiy, A. E.; Zlotin, S. G.; Smirnov, B. B.; Kalsina, S. Sh.; Lepehina, L. A.; Semenkova, I. V.; Agaeva, E. V.; Baboyan, S. B.; Rjumshina, E. A.; Nosachenko, V. V.; Konoplyannikov, M. A.

    2015-09-01

    Combined use of complexes of the most active chemotherapeutic drugs and detonation nanodiamonds (DND) is a new trend in cancer therapy, which is probably related to selective chemotherapeutic drug delivery by DND to the zone of so-called cancer stem cells (CSC). Stable DND complexes of 4-5 nm size with salinomycin—a strong CSC inhibitor—have been obtained (as a suspension). It has been demonstrated that a complex administration considerably increases the drug antitumor effect on the transplantable tumor of LLC mice. A similar effect has been observed in CSC models in vivo, obtained by exposure of stem cells of normal mice tissues to a carcinogen 1,2-dimethylhydrazine. It has also been found out, that administration of DND complexes with the conditioned medium from mesenchymal stem cells (MSC) cultures to mice results in a considerable stimulation of stem cell pools in normal mice tissues, which can be used in regenerative medicine.

  19. The Cyber-Physical Attacker

    DEFF Research Database (Denmark)

    Vigo, Roberto

    2012-01-01

    The world of Cyber-Physical Systems ranges from industrial to national interest applications. Even though these systems are pervading our everyday life, we are still far from fully understanding their security properties. Devising a suitable attacker model is a crucial element when studying the...... security properties of CPSs, as a system cannot be secured without defining the threats it is subject to. In this work an attacker scenario is presented which addresses the peculiarities of a cyber-physical adversary, and we discuss how this scenario relates to other attacker models popular in the security...

  20. Suicide Attacks on the Rise

    OpenAIRE

    CCS Research Staff

    2008-01-01

    This article was published in Culture and Conflict Review (March 2008), v.2 no.2 "The last six weeks has brought some of the worst violence in Afghanistan since 2001. In 2007, there were more than 230 Improvised Explosive Device (IED) attacks and 145 suicide attacks. Casualty rates were at least 25 percent higher in 2007 than the previous year. In the past 18 months, IED attacks have targeted numerous police and army busses, a group of legislators outside a factory at Baghlan, a five-star ...

  1. Lifestyle Changes for Heart Attack Prevention

    Science.gov (United States)

    ... from the NHLBI on Twitter. How Can a Heart Attack Be Prevented? Lowering your risk factors for coronary ... This Content: NEXT >> Featured Video What is a heart attack? 05/22/2014 Describes how a heart attack ...

  2. Antithrombin, an Important Inhibitor in Blood Clots.

    Science.gov (United States)

    Zhu, Ying; Cong, Qing-Wei; Liu, Yue; Wan, Chun-Ling; Yu, Tao; He, Guang; He, Lin; Cai, Lei; Chou, Kuo-Chen

    2016-01-01

    Blood coagulation is healthy and lifesaving because it can stop bleeding. It can, however, be a troublemaker as well, causing serious medical problems including heart attack and stroke. Body has complex blood coagulation cascade to modulate the blood clots. In the environment of plasma, the blood coagulation cascade is regulated by antithrombin, which is deemed one of the most important serine protease inhibitors. It inhibits thrombin; it can inhibit factors IXa and Xa as well. Interestingly, its inhibitory ability will be significantly increased with the existence of heparin. In this minireview paper, we are to summarize the structural features of antithrombin, as well as its heparin binding modes and anti-coagulation mechanisms, in hopes that the discussion and analysis presented in this paper can stimulate new strategies to find more effective approaches or compounds to modulate the antithrombin. PMID:26411319

  3. DNA cleavage, antimicrobial studies and a DFT-based QSAR study of new antimony(III) complexes as glutathione reductase inhibitor.

    Science.gov (United States)

    Tunç, Turgay; Koç, Yasemin; Açık, Leyla; Karacan, Mehmet Sayım; Karacan, Nurcan

    2015-02-01

    New antimony(III) complexes, [Sb(2-aminopyridine)2Cl3] (1a), [Sb(2-aminopyridine)2Br3] (1b), [Sb(5-methyl-2-aminopyridine)2Cl3] (2a), [Sb(5-methyl-2-aminopyridine)2Br3] (2b), [Sb(2-aminopyrimidine)2Cl3] (3a), [Sb(2-aminopyrimidine)2Br3] (3b), [Sb(4,6-dimethoxy-2-aminopyrimidine)2Cl3] (4a), [Sb(4,6-dimethoxy-2-aminopyrimidine)2Br3] (4b), [Sb(2-amino-1,3,5-triazine)2Cl3] (5a), [Sb(2-amino-1,3,5-triazine)2Br3] (5b), [Sb(2-guanidinobenzimidazole) Cl3] (6a), [Sb(2-guanidinobenzimidazole)Br3] (6b) [Sb(2- benzyl-2-thiopseudeourea)2Cl3] (7a) and [Sb(2- benzyl-2-thiopseudeourea)2Br3] (7b) were synthesized. Their structures were characterized by elemental analysis, molecular conductivity, FT-IR, (1)H NMR, LC-MS techniques. Glutathione reductase inhibitor activity, antimicrobial activity and DNA cleavage studies of the complexes were determined. The geometrical structures of the complexes were optimized by DFT/B3LYP method with LANL2DZ as basis set. Calculation results indicated that the equilibrium geometries of all complexes have square pyramidal shape. About 350 molecular descriptors (constitutional, topological, geometrical, electrostatic and quantum chemical parameters) of the complexes were calculated by DFT/B3LYP/LANL2DZ method with CODESSA software. Calculated molecular parameters were correlated to glutathione reductase inhibitory activity values (pIC50) of all complexes by Best Multi-Linear Regression (BMLR) method. Obtained two-parameter QSAR equation shows that increase in "maximum partial charge for a H atom" and decrease in HOMO-LUMO gap would be favorable for the glutathione reductase inhibitory activity. PMID:25459701

  4. Social Engineering:A Partial Technical attack

    OpenAIRE

    P.S.Maan; Manish Sharma

    2012-01-01

    This paper suggests the crystal clear concept behind the social engineering attack. Basically social engineering is a non technical attack. But social engineering attack is an attack on human psychology to get the information, but using what? Basically it is an attack on human psychology by using some technical skills or technology. Social engineering attack has many types like fake mail, telephonic cheat etc. which are impossible without any technical skills, so in this paper we suggest that...

  5. Effect of the ATPase inhibitor protein IF1 on H+ translocation in the mitochondrial ATP synthase complex

    International Nuclear Information System (INIS)

    The H+ FoF1-ATP synthase complex of coupling membranes converts the proton-motive force into rotatory mechanical energy to drive ATP synthesis. The F1 moiety of the complex protrudes at the inner side of the membrane, the Fo sector spans the membrane reaching the outer side. The IF1 component of the mitochondrial complex is a basic 10 kDa protein, which inhibits the FoF1-ATP hydrolase activity. The mitochondrial matrix pH is the critical factor for the inhibitory binding of the central segment of IF1 (residue 42-58) to the F1-α/β subunits. We have analyzed the effect of native purified IF1 the IF1-(42-58) synthetic peptide and its mutants on proton conduction, driven by ATP hydrolysis or by [K+] gradients, in bovine heart inside-out submitochondrial particles and in liposome-reconstituted FoF1 complex. The results show that IF1, and in particular its central 42-58 segment, displays different inhibitory affinity for proton conduction from the F1 to the Fo side and in the opposite direction. Cross-linking of IF1 to F1-α/β subunits inhibits the ATP-driven H+ translocation but enhances H+ conduction in the reverse direction. These observation are discussed in terms of the rotary mechanism of the FoF1 complex.

  6. Acute ischemic cerebral attack

    Directory of Open Access Journals (Sweden)

    Franco-Garcia Samir

    2010-12-01

    Full Text Available The decrease of the cerebral blood flow below the threshold of autoregulation led to changes of cerebral ischemia and necrosis that traduce in signs and symtoms of focal neurologic dysfunction called acute cerebrovascular symdrome (ACS or stroke. Two big groups according to its etiology are included in this category the hemorragic that constitue a 20% and the ischemic a 80% of cases. Great interest has wom the ischemic ACS because of its high social burden, being the third cause of no violent death in the world and the first of disability. Many risk factors favor the presentation of these events and some of them are susceptible of modification and therfore are objetives of primary prevention just as the control of diabetes, hypertension and the practice of healthy habits of life. The advances in the knowledge of the physiopatology, had taken to sustantial change in the nomenclature and management of ischemic ACS. Within these changes it was substituted the term cerebrovascular accident fo acute stroke, making emphasis in the key rol of a timely management with goals of time similiar to the acute coronary syndrome. It was redefined the time of acute ischemic attack to a one hour. Once stablished the cerebrovascular attack the semiology of symtoms with frecuency will led us make a topographic diagnosis of the in injury that joined to the cerebral TAC will allow us to exclude an hemorragic event and to start the treatment. In the management of these patients its essential the coordination of the differents teams of work, from the early recognition of symtoms on the part of patients andthe family, the rapid activation and response of emergency systems and the gearing of health care institutions. Are pillars of treatment: the abcde of reanimatiion, to avoid the hiperpirexis, the seizures, the hipoglicemy, the hiperglicemy, to achieve the thrombolysis in the first three hours of the begining of symtoms, to use antiplatelets, antithrombotic profilaxis

  7. Panic Attacks and Panic Disorders

    OpenAIRE

    Fontaine, Rejean; Beaudry, Paul

    1984-01-01

    The diagnosis and treatment of panic attacks and panic disorders have progressed markedly during the last decade. Unlike phobic disorders, the key feature of panic disorders is the many panic attacks that are mostly spontaneous or not caused by a particular situation. Recent studies linking its pathogenesis with lactate infusion tests are reviewed. For treatment, psychotherapy combined with in vivo exposure and pharmacotherapy is more efficacious than either treatment alone. In most cases, ps...

  8. Impersonation Attack on EKE Protocol

    OpenAIRE

    Shirisha Tallapally

    2010-01-01

    The key exchange protocol is one of the most elegant ways of establishing secure communication between pair of users by using a session key. The passwords are of low entropy, hence the protocol should resist all types of password guessing attacks. Recently ECC-3PEKE protocol has been proposed by Chang and Chang. They claimed the protocol is secure, efficient and practical. Unless their claims Yoon and Yoo presented an Undetectable online password guessing attack on the above protocol. A key r...

  9. Migraine attacks the Basal Ganglia

    OpenAIRE

    Bigal Marcelo; Brawn Jennifer; Pendse Gautam; Nutile Lauren; Becerra Lino; Maleki Nasim; Burstein Rami; Borsook David

    2011-01-01

    Abstract Background With time, episodes of migraine headache afflict patients with increased frequency, longer duration and more intense pain. While episodic migraine may be defined as 1-14 attacks per month, there are no clear-cut phases defined, and those patients with low frequency may progress to high frequency episodic migraine and the latter may progress into chronic daily headache (> 15 attacks per month). The pathophysiology of this progression is completely unknown. Attempting to unr...

  10. Vasoactivity of rucaparib, a PARP-1 inhibitor, is a complex process that involves myosin light chain kinase, P2 receptors, and PARP itself.

    Directory of Open Access Journals (Sweden)

    Cian M McCrudden

    Full Text Available Therapeutic inhibition of poly(ADP-ribose polymerase (PARP, as monotherapy or to supplement the potencies of other agents, is a promising strategy in cancer treatment. We previously reported that the first PARP inhibitor to enter clinical trial, rucaparib (AG014699, induced vasodilation in vivo in xenografts, potentiating response to temozolomide. We now report that rucaparib inhibits the activity of the muscle contraction mediator myosin light chain kinase (MLCK 10-fold more potently than its commercially available inhibitor ML-9. Moreover, rucaparib produces additive relaxation above the maximal degree achievable with ML-9, suggesting that MLCK inhibition is not solely responsible for dilation. Inhibition of nitric oxide synthesis using L-NMMA also failed to impact rucaparib's activity. Rucaparib contains the nicotinamide pharmacophore, suggesting it may inhibit other NAD+-dependent processes. NAD+ exerts P2 purinergic receptor-dependent inhibition of smooth muscle contraction. Indiscriminate blockade of the P2 purinergic receptors with suramin abrogated rucaparib-induced vasodilation in rat arterial tissue without affecting ML-9-evoked dilation, although the specific receptor subtypes responsible have not been unequivocally identified. Furthermore, dorsal window chamber and real time tumor vessel perfusion analyses in PARP-1-/- mice indicate a potential role for PARP in dilation of tumor-recruited vessels. Finally, rucaparib provoked relaxation in 70% of patient-derived tumor-associated vessels. These data provide tantalising evidence of the complexity of the mechanism underlying rucaparib-mediated vasodilation.

  11. Social Engineering:A Partial Technical attack

    Directory of Open Access Journals (Sweden)

    P. S. Maan

    2012-03-01

    Full Text Available This paper suggests the crystal clear concept behind the social engineering attack. Basically social engineering is a non technical attack. But social engineering attack is an attack on human psychology to get the information, but using what? Basically it is an attack on human psychology by using some technical skills or technology. Social engineering attack has many types like fake mail, telephonic cheat etc. which are impossible without any technical skills, so in this paper we suggest that , it is a partial technical attack and can be divided in human based and typical computer based social engineering attack.

  12. Binding of the Respiratory Chain Inhibitor Antimycin to theMitochondrial bc1 Complex: A New Crystal Structure Reveals an AlteredIntramolecular Hydrogen-Bonding Pattern

    Energy Technology Data Exchange (ETDEWEB)

    Huang, Li-shar; Cobessi, David; Tung, Eric Y.; Berry, Edward A.

    2005-05-10

    Antimycin A (antimycin), one of the first known and most potent inhibitors of the mitochondrial respiratory chain, binds to the quinone reduction site of the cytochrome bc1 complex.Structure-activity-relationship studies have shown that the N-formylamino-salicyl-amide group is responsible for most of the binding specificity, and suggested that a low pKa for the phenolic OH group and an intramolecular H-bond between that OH and the carbonyl O of the salicylamide linkage are important. Two previous X-ray structures of antimycin bound to vertebrate bc1 complex gave conflicting results. A new structure reported here of the bovine mitochondrial bc1 complex at 2.28Angstrom resolution with antimycin bound, allows us for the first time to reliably describe the binding of antimycin and shows that the intramolecular hydrogen bond described in solution and in the small-molecule structure is replaced by one involving the NH rather than carbonyl O of the amide linkage, with rotation of the amide group relative to the aromatic ring. The phenolic OH and formylamino N form H-bonds with conserved Asp228 of cyt b, and the formylamino O H-bonds via a water molecule to Lys227. A strong density the right size and shape for a diatomic molecule is found between the other side of the dilactone ring and the alpha-A helix.

  13. Mitocans as anti-cancer agents targeting mitochondria: lessons from studies with vitamin E analogues, inhibitors of complex II

    Czech Academy of Sciences Publication Activity Database

    Neužil, Jiří; Dyason, J.C.; Freeman, R.; Dong, L.F.; Procházka, L.; Wang, X. F.; Scheffler, I.; Ralph, S.J.

    2007-01-01

    Roč. 39, č. 1 (2007), s. 65-72. ISSN 0145-479X Institutional research plan: CEZ:AV0Z50520701; CEZ:AV0Z50520514 Keywords : mitocans * mitochondria * complex II Subject RIV: EB - Genetics ; Molecular Biology Impact factor: 2.634, year: 2007

  14. Attack Coverage in High-Level Men's Volleyball: Organization on the Edge of Chaos?

    Science.gov (United States)

    Laporta, Lorenzo; Nikolaidis, Pantelis; Thomas, Luke; Afonso, José

    2015-09-29

    Change is pervasive, but emerging patterns are occasionally detectable through analysis of systemic behaviors. Match analysis uses these patterns in order to reduce the degree of improvisation and to optimize the training process. However, it is possible that certain game phases elude systematic patterning. In this vein, our aim was to analyze the case of attack coverage in men's volleyball, as we suspected it would elude systematic patterning and has received negligible attention in scientific research. We analyzed the occurrence of attack coverage in 4544 plays of the 2011 Volleyball World League. A Chi-square test with residual adjusted values was applied to explore significant associations between variables. A Monte Carlo correction was applied, as some cells had n<5. Effect sizes were determined using Cramer's V. Overall, attack coverage occurred in 3.89% of ball possessions, and 23 distinct structures emerged. These structures lacked significant associations with the game complex, setting zone, and effect of attack coverage. Conversely, attack coverage structures showed significant associations with the attack zone and tempo, with very strong effect sizes (V=0.472 and V=0.521, respectively). As certain attack zones are deeply associated with attack tempo, it is apparent that quicker attack plays affect attack coverage structuring, promoting the formation of less complex structures. Ultimately, attack coverage structures seem to depend on momentary constraints, thereby rendering rigid systematization impracticable. Still, we contended that a principle-based approach might be suitable. This invites researchers to rethink how to interpret game regularities. PMID:26557208

  15. A cluster based approach for wormhole attack detection in wireless sensor networks

    Directory of Open Access Journals (Sweden)

    Maliheh Shahryari

    2015-02-01

    Full Text Available Due to the need of cooperation among nodes to relay packets, wireless sensor networks are very vulnerable to attacks in all layers of the network. One of these severe attacks is the wormhole attack. Detection of wormhole attack is hard, because it can be easily implemented by attacker without having knowledge of nodes in the network or it can be compromised by any legal node in the network. To date, the most of proposed protocols to defend against wormhole attacks are made by adopting synchronized clocks, directional antennas or strong assumptions in order to detect wormhole attacks. A method based on clustering is presented in this paper to detect this type of attacks. This method is implemented in static and mobile networks. The superiority of our protocol is that during the attack prevention or attack detection, the malicious nodes are detected and requires no additional hardware or complex calculations. Simulation results are perused with the NS-2 simulator and the protocol has been evaluated in terms of packet drop ratio, throughput, delay and energy consumption compared to a network without or under attack. Simulation results show that our protocol is practical and effective in improving resilience against wormhole attacks.

  16. Major histocompatibility complex class II-associated p41 invariant chain fragment is a strong inhibitor of lysosomal cathepsin L

    OpenAIRE

    1996-01-01

    The invariant chain (Ii) is associated with major histocompatibility complex class II molecules during early stages of their intracellular transport. In an acidic endosomal/lysosomal compartment, it is proteolytically cleaved and removed from class II heterodimers. Participation of aspartic and cysteine proteases has been observed in in vitro degradation of Ii, but the specific enzymes responsible for its in vivo processing are as yet undefined. We have previously isolated a noncovalent compl...

  17. Insights into the complex formed by matrix metalloproteinase-2 and alloxan inhibitors: molecular dynamics simulations and free energy calculations.

    Directory of Open Access Journals (Sweden)

    Ilenia Giangreco

    Full Text Available Matrix metalloproteinases (MMP are well-known biological targets implicated in tumour progression, homeostatic regulation, innate immunity, impaired delivery of pro-apoptotic ligands, and the release and cleavage of cell-surface receptors. Hence, the development of potent and selective inhibitors targeting these enzymes continues to be eagerly sought. In this paper, a number of alloxan-based compounds, initially conceived to bias other therapeutically relevant enzymes, were rationally modified and successfully repurposed to inhibit MMP-2 (also named gelatinase A in the nanomolar range. Importantly, the alloxan core makes its debut as zinc binding group since it ensures a stable tetrahedral coordination of the catalytic zinc ion in concert with the three histidines of the HExxHxxGxxH metzincin signature motif, further stabilized by a hydrogen bond with the glutamate residue belonging to the same motif. The molecular decoration of the alloxan core with a biphenyl privileged structure allowed to sample the deep S(1' specificity pocket of MMP-2 and to relate the high affinity towards this enzyme with the chance of forming a hydrogen bond network with the backbone of Leu116 and Asn147 and the side chains of Tyr144, Thr145 and Arg149 at the bottom of the pocket. The effect of even slight structural changes in determining the interaction at the S(1' subsite of MMP-2 as well as the nature and strength of the binding is elucidated via molecular dynamics simulations and free energy calculations. Among the herein presented compounds, the highest affinity (pIC(50 = 7.06 is found for BAM, a compound exhibiting also selectivity (>20 towards MMP-2, as compared to MMP-9, the other member of the gelatinases.

  18. VoIP Malware: Attack Tool & Attack Scenarios

    OpenAIRE

    Nassar, Mohamed; State, Radu; Festor, Olivier

    2009-01-01

    With the appearance of new Internet services like Voice over IP and IP television, malwares are in the way to update and extend their targets. In this paper, we discuss the emergence of a new generation of malwares attacking VoIP infrastructures and services. Such malwares constitute a real threat to the currently deployed VoIP architectures without strong security measures in place. We present one implemented environment that can be used to evaluate such attacks. Our ``VoIP bots'' support a ...

  19. Dolutegravir (S/GSK1349572) exhibits significantly slower dissociation than raltegravir and elvitegravir from wild-type and integrase inhibitor-resistant HIV-1 integrase-DNA complexes.

    Science.gov (United States)

    Hightower, Kendra E; Wang, Ruolan; Deanda, Felix; Johns, Brian A; Weaver, Kurt; Shen, Yingnian; Tomberlin, Ginger H; Carter, H Luke; Broderick, Timothy; Sigethy, Scott; Seki, Takahiro; Kobayashi, Masanori; Underwood, Mark R

    2011-10-01

    The integrase inhibitor (INI) dolutegravir (DTG; S/GSK1349572) has significant activity against HIV-1 isolates with raltegravir (RAL)- and elvitegravir (ELV)-associated resistance mutations. As an initial step in characterizing the different resistance profiles of DTG, RAL, and ELV, we determined the dissociation rates of these INIs with integrase (IN)-DNA complexes containing a broad panel of IN proteins, including IN substitutions corresponding to signature RAL and ELV resistance mutations. DTG dissociates slowly from a wild-type IN-DNA complex at 37°C with an off-rate of 2.7 × 10(-6) s(-1) and a dissociative half-life (t(1/2)) of 71 h, significantly longer than the half-lives for RAL (8.8 h) and ELV (2.7 h). Prolonged binding (t(1/2), at least 5 h) was observed for DTG with IN-DNA complexes containing E92, Y143, Q148, and N155 substitutions. The addition of a second substitution to either Q148 or N155 typically resulted in an increase in the off-rate compared to that with the single substitution. For all of the IN substitutions tested, the off-rate of DTG from IN-DNA complexes was significantly slower (from 5 to 40 times slower) than the off-rate of RAL or ELV. These data are consistent with the potential for DTG to have a higher genetic barrier to resistance, provide evidence that the INI off-rate may be an important component of the mechanism of INI resistance, and suggest that the slow dissociation of DTG may contribute to its distinctive resistance profile. PMID:21807982

  20. RESIST SRP AGAINST WORMHOLE ATTACK

    Directory of Open Access Journals (Sweden)

    Marjan Kuchaki Rafsanjani

    2013-06-01

    Full Text Available Ad-hoc networks refer to temporary or interim networks which form for special purposes. Actually they are wireless networks with mobile nodes. These networks use no network assisting element for path routing and in these networks available nodes are responsible for path routing. Therefore when malicious nodes want to find a way to interfere with the path routing then the existence of a secure route protocol (SRP can prevent the interference. SRP protocol is one of the secure algorithms of path routing protocol but it is notresistant against wormhole attack. Wormhole attack is considered as a subtle attack in which two malicious nodes make a short connection in network's topology through private or implicit connection and represent two non neighbor nodes as neighbors and prevent the correctoperation of path routing protocol by using this method. One of the methods of preventing wormhole attack is by using packet leashes. We try to decrease the wormhole attack occurrence in this routing protocol by a kind of packet leashes called temporal leashes. We alsowill minimize problems resulting from using temporal leashes by different methods and modifications in its structure.

  1. Inhibition of localized attack on the aluminium alloy AA 6351 in glycol/water solutions

    Energy Technology Data Exchange (ETDEWEB)

    Monticelli, C.; Brunoro, G.; Zucchi, F.; Fagioli, F.

    1989-06-01

    The objective of this work was to examine the feasibility of enhancing pitting resistance of AA 6351 (nominal composition: 1% Si, 0.6% Mg, 0.3% Mn, balance Al) by adding suitable inhibitors to the solutions. The compounds used were two inorganic salts: sodium molybdate and sodium tungstate and two derivatives of pyrimidine: 2-aminopyrimidine (2AP) and 2-hydroxypyrimidine (2HP). The inhibiting efficiencies of these substances were tested by both short-time electrochemical tests (galvanic coupling tests and polarization curves) and long-time immersions under experimental conditions causing the localized attack. Molybdate, tungstate and, to some extent, also 2AP efficiently inhibit AA 6351 localized corrosion in degraded solutions at 80/sup 0/C and in pure boiling solutions, for long exposure periods. The short-time electrochemical tests suggest that molybdate and tungstate are able to retard the electrochemical processes occurring on both the aluminium alloy and the small copper cathodic area produced by copper deposition. On the other hand, the 2AP efficiency is attributed to some complexing capability of this pyrimidine derivative towards dissolved copper ions, that are stabilized in solution. 2HP does not prevent AA 6351 localized attack. (orig./MM).

  2. One-pot regio- and stereoselective synthesis of α'-methoxy-γ-pyrones: biological evaluation as mitochondrial respiratory complex inhibitors.

    Science.gov (United States)

    Rosso, Helena; De Paolis, Michaël; Collin, Valérie C; Dey, Sriloy; Hecht, Sidney M; Prandi, Cristina; Richard, Vincent; Maddaluno, Jacques

    2011-11-18

    The one-pot construction of functionalized α'-methoxy-γ-pyrones is detailed. Starting from α,α'-dimethoxy-γ-pyrone, molecular diversity is attained by a regio- and stereoselective desymmetrization using allyllithium followed by vinylogous aldol reaction. Mechanistic considerations including density functional theory calculations and insightful experiments have been gathered to shed light on this complex multistep process. To illustrate the versatility of this methodology, some of the molecules prepared were evaluated for their ability to inhibit NADH-oxidase and NADH-ubiquinone oxidoreductase. In the process, a potent new inihibitor of NADH-oxidase activity (IC(50) 44 nM) was identified. PMID:22011074

  3. Crystal structures of the psychrophilic alpha-amylase from Alteromonas haloplanctis in its native form and complexed with an inhibitor.

    OpenAIRE

    Aghajari, N.; Feller, G; Gerday, C.; Haser, R.

    1998-01-01

    Alteromonas haloplanctis is a bacterium that flourishes in Antarctic sea-water and it is considered as an extreme psychrophile. We have determined the crystal structures of the alpha-amylase (AHA) secreted by this bacterium, in its native state to 2.0 angstroms resolution as well as in complex with Tris to 1.85 angstroms resolution. The structure of AHA, which is the first experimentally determined three-dimensional structure of a psychrophilic enzyme, resembles those of other known alpha-amy...

  4. A heterotetrameric alpha-amylase inhibitor from emmer (Triticum dicoccon Schrank) seeds.

    Science.gov (United States)

    Capocchi, A; Muccilli, V; Cunsolo, V; Saletti, R; Foti, S; Fontanini, D

    2013-04-01

    Plants have developed a constitutive defense system against pest attacks, which involves the expression of a set of inhibitors acting on heterologous amylases of different origins. Investigating the soluble protein complement of the hulled wheat emmer we have isolated and characterized a heterotetrameric α-amylase inhibitor (ETI). Based on mass spectrometry data, it is an assembly of proteins highly similar to the CM2/CM3/CM16 found in durum wheat. Our data indicate that these proteins can also inhibit exogenous α-amylases in binary assemblies. The calculated dissociation constants (K(i)) for the pancreatic porcine amylase- and human salivary amylase-ETI complexes are similar to those found in durum and soft wheat. Homology modeling of the CM subunits indicate structural similarities with other proteins belonging to the cereal family of trypsin/α-amylase inhibitors; a possible homology modeled structure for a tetrameric assembly of the subunits is proposed. PMID:23320956

  5. Crystal structure of human cyclin-dependent kinase-2 complex with MK2 inhibitor TEI-I01800: insight into the selectivity

    Energy Technology Data Exchange (ETDEWEB)

    Fujino, Aiko; Fukushima, Kei; Kubota, Takaharu; Kosugi, Tomomi; Takimoto-Kamimura, Midori, E-mail: m.kamimura@teijin.co.jp [Teijin Pharma Limited, 4-3-2 Asahigaoka, Hino-shi, Tokyo 191-8512 (Japan)

    2013-11-01

    The Gly-rich loop of cyclin-dependent kinase 2 (CDK2) bound to TEI-I01800 as an MK2 specific inhibitor forms a β-sheet which is a common structure in CDK2–ligand complexes. Here, the reason why TEI-I01800 does not become a strong inhibitor against CDK2 based on the conformation of TEI-I01800 is presented. Mitogen-activated protein kinase-activated protein kinase 2 (MK2 or MAPKAP-K2) is a Ser/Thr kinase from the p38 mitogen-activated protein kinase signalling pathway and plays an important role in inflammatory diseases. The crystal structure of the MK2–TEI-I01800 complex has been reported; its Gly-rich loop was found to form an α-helix, not a β-sheet as has been observed for other Ser/Thr kinases. TEI-I01800 is 177-fold selective against MK2 compared with CDK2; in order to understand the inhibitory mechanism of TEI-I01800, the cyclin-dependent kinase 2 (CDK2) complex structure with TEI-I01800 was determined at 2.0 Å resolution. Interestingly, the Gly-rich loop of CDK2 formed a β-sheet that was different from that of MK2. In MK2, TEI-I01800 changed the secondary structure of the Gly-rich loop from a β-sheet to an α-helix by collision between Leu70 and a p-ethoxyphenyl group at the 7-position and bound to MK2. However, for CDK2, TEI-I01800 bound to CDK2 without this structural change and lost the interaction with the substituent at the 7-position. In summary, the results of this study suggest that the reason for the selectivity of TEI-I01800 is the favourable conformation of TEI-I01800 itself, making it suitable for binding to the α-form MK2.

  6. Crystal structure of human cyclin-dependent kinase-2 complex with MK2 inhibitor TEI-I01800: insight into the selectivity

    International Nuclear Information System (INIS)

    The Gly-rich loop of cyclin-dependent kinase 2 (CDK2) bound to TEI-I01800 as an MK2 specific inhibitor forms a β-sheet which is a common structure in CDK2–ligand complexes. Here, the reason why TEI-I01800 does not become a strong inhibitor against CDK2 based on the conformation of TEI-I01800 is presented. Mitogen-activated protein kinase-activated protein kinase 2 (MK2 or MAPKAP-K2) is a Ser/Thr kinase from the p38 mitogen-activated protein kinase signalling pathway and plays an important role in inflammatory diseases. The crystal structure of the MK2–TEI-I01800 complex has been reported; its Gly-rich loop was found to form an α-helix, not a β-sheet as has been observed for other Ser/Thr kinases. TEI-I01800 is 177-fold selective against MK2 compared with CDK2; in order to understand the inhibitory mechanism of TEI-I01800, the cyclin-dependent kinase 2 (CDK2) complex structure with TEI-I01800 was determined at 2.0 Å resolution. Interestingly, the Gly-rich loop of CDK2 formed a β-sheet that was different from that of MK2. In MK2, TEI-I01800 changed the secondary structure of the Gly-rich loop from a β-sheet to an α-helix by collision between Leu70 and a p-ethoxyphenyl group at the 7-position and bound to MK2. However, for CDK2, TEI-I01800 bound to CDK2 without this structural change and lost the interaction with the substituent at the 7-position. In summary, the results of this study suggest that the reason for the selectivity of TEI-I01800 is the favourable conformation of TEI-I01800 itself, making it suitable for binding to the α-form MK2

  7. Structure of the factor VIII C2 domain in a ternary complex with 2 inhibitor antibodies reveals classical and nonclassical epitopes.

    Science.gov (United States)

    Walter, Justin D; Werther, Rachel A; Brison, Caileen M; Cragerud, Rebecca K; Healey, John F; Meeks, Shannon L; Lollar, Pete; Spiegel, P Clint

    2013-12-19

    The factor VIII C2 domain is a highly immunogenic domain, whereby inhibitory antibodies develop following factor VIII replacement therapy for congenital hemophilia A patients. Inhibitory antibodies also arise spontaneously in cases of acquired hemophilia A. The structural basis for molecular recognition by 2 classes of anti-C2 inhibitory antibodies that bind to factor VIII simultaneously was investigated by x-ray crystallography. The C2 domain/3E6 FAB/G99 FAB ternary complex illustrates that each antibody recognizes epitopes on opposing faces of the factor VIII C2 domain. The 3E6 epitope forms direct contacts to the C2 domain at 2 loops consisting of Glu2181-Ala2188 and Thr2202-Arg2215, whereas the G99 epitope centers on Lys2227 and also makes direct contacts with loops Gln2222-Trp2229, Leu2261-Ser2263, His2269-Val2282, and Arg2307-Gln2311. Each binding interface is highly electrostatic, with positive charge present on both C2 epitopes and complementary negative charge on each antibody. A new model of membrane association is also presented, where the 3E6 epitope faces the negatively charged membrane surface and Arg2320 is poised at the center of the binding interface. These results illustrate the potential complexities of the polyclonal anti-factor VIII immune response and further define the "classical" and "nonclassical" types of antibody inhibitors against the factor VIII C2 domain. PMID:24085769

  8. Novel 2-oxoimidazolidine-4-carboxylic acid derivatives as Hepatitis C virus NS3-4A serine protease inhibitors: synthesis, activity, and X-ray crystal structure of an enzyme inhibitor complex

    Energy Technology Data Exchange (ETDEWEB)

    Arasappan, Ashok; Njoroge, F. George; Parekh, Tejal N.; Yang, Xiaozheng; Pichardo, John; Butkiewicz, Nancy; Prongay, Andrew; Yao, Nanhua; Girijavallabhan, Viyyoor (SPRI)

    2008-06-30

    Synthesis and HCV NS3 serine protease inhibitory activity of some novel 2-oxoimidazolidine-4-carboxylic acid derivatives are reported. Inhibitors derived from this new P2 core exhibited activity in the low {micro}M range. X-ray structure of an inhibitor, 15c bound to the protease is presented.

  9. A Model of Biological Attacks on a Realistic Population

    Science.gov (United States)

    Carley, Kathleen M.; Fridsma, Douglas; Casman, Elizabeth; Altman, Neal; Chen, Li-Chiou; Kaminsky, Boris; Nave, Demian; Yahja, Alex

    The capability to assess the impacts of large-scale biological attacks and the efficacy of containment policies is critical and requires knowledge-intensive reasoning about social response and disease transmission within a complex social system. There is a close linkage among social networks, transportation networks, disease spread, and early detection. Spatial dimensions related to public gathering places such as hospitals, nursing homes, and restaurants, can play a major role in epidemics [Klovdahl et. al. 2001]. Like natural epidemics, bioterrorist attacks unfold within spatially defined, complex social systems, and the societal and networked response can have profound effects on their outcome. This paper focuses on bioterrorist attacks, but the model has been applied to emergent and familiar diseases as well.

  10. Binding of the potential antitumour agent indirubin-5-sulphonate at the inhibitor site of rabbit muscle glycogen phosphorylase b. Comparison with ligand binding to pCDK2-cyclin A complex.

    Science.gov (United States)

    Kosmopoulou, Magda N; Leonidas, Demetres D; Chrysina, Evangelia D; Bischler, Nicolas; Eisenbrand, Gerhard; Sakarellos, Constantinos E; Pauptit, Richard; Oikonomakos, Nikos G

    2004-06-01

    The binding of indirubin-5-sulphonate (E226), a potential anti-tumour agent and a potent inhibitor (IC(50) = 35 nm) of cyclin-dependent kinase 2 (CDK2) and glycogen phosphorylase (GP) has been studied by kinetic and crystallographic methods. Kinetic analysis revealed that E226 is a moderate inhibitor of GPb (K(i) = 13.8 +/- 0.2 micro m) and GPa (K(i) = 57.8 +/- 7.1 micro m) and acts synergistically with glucose. To explore the molecular basis of E226 binding we have determined the crystal structure of the GPb/E226 complex at 2.3 A resolution. Structure analysis shows clearly that E226 binds at the purine inhibitor site, where caffeine and flavopiridol also bind [Oikonomakos, N.G., Schnier, J.B., Zographos, S.E., Skamnaki, V.T., Tsitsanou, K.E. & Johnson, L.N. (2000) J. Biol. Chem.275, 34566-34573], by intercalating between the two aromatic rings of Phe285 and Tyr613. The mode of binding of E226 to GPb is similar, but not identical, to that of caffeine and flavopiridol. Comparative structural analyses of the GPb-E226, GPb-caffeine and GPb-flavopiridol complex structures reveal the structural basis of the differences in the potencies of the three inhibitors and indicate binding residues in the inhibitor site that can be exploited to obtain more potent inhibitors. Structural comparison of the GPb-E226 complex structure with the active pCDK2-cyclin A-E226 complex structure clearly shows the different binding modes of the ligand to GPb and CDK2; the more extensive interactions of E226 with the active site of CDK2 may explain its higher affinity towards the latter enzyme. PMID:15153119

  11. X-ray structure of the ternary MTX·NADPH complex of the anthrax dihydrofolate reductase: A pharmacophore for dual-site inhibitor design

    Energy Technology Data Exchange (ETDEWEB)

    Bennett, Brad C.; Wan, Qun; Ahmad, Md Faiz; Langan, Paul; Dealwis, Chris G.; (Case Western); (LANL)

    2009-11-18

    For reasons of bioterrorism and drug resistance, it is imperative to identify and develop new molecular points of intervention against anthrax. Dihydrofolate reductase (DHFR) is a highly conserved enzyme and an established target in a number of species for a variety of chemotherapeutic programs. Recently, the crystal structure of B. anthracis DHFR (baDHFR) in complex with methotrexate (MTX) was determined and, based on the structure, proposals were made for drug design strategies directed against the substrate binding site. However, little is gleaned about the binding site for NADPH, the cofactor responsible for hydride transfer in the catalytic mechanism. In the present study, X-ray crystallography at 100 K was used to determine the structure of baDHFR in complex with MTX and NADPH. Although the NADPH binding mode is nearly identical to that seen in other DHFR ternary complex structures, the adenine moiety adopts an off-plane tilt of nearly 90 deg. and this orientation is stabilized by hydrogen bonds to functionally conserved Arg residues. A comparison of the binding site, focusing on this region, between baDHFR and the human enzyme is discussed, with an aim at designing species-selective therapeutics. Indeed, the ternary model, refined to 2.3{angstrom} resolution, provides an accurate template for testing the feasibility of identifying dual-site inhibitors, compounds that target both the substrate and cofactor binding site. With the ternary model in hand, using in silico methods, several compounds were identified which could potentially form key bonding contacts in the substrate and cofactor binding sites. Ultimately, two structurally distinct compounds were verified that inhibit baDHFR at low {mu}M concentrations. The apparent K{sub d} for one of these, (2-(3-(2-(hydroxyimino)-2-(pyridine-4-yl)-6,7-dimethylquinoxalin-2-yl)-1-(pyridine-4-yl)ethanone oxime), was measured by fluorescence spectroscopy to be 5.3 {mu}M.

  12. Letermovir and inhibitors of the terminase complex: a promising new class of investigational antiviral drugs against human cytomegalovirus

    Directory of Open Access Journals (Sweden)

    Melendez DP

    2015-08-01

    Full Text Available Dante P Melendez,1,2 Raymund R Razonable1,2 1Division of Infectious Diseases, 2William J von Liebig Center for Transplantation and Clinical Regeneration, Mayo Clinic, Rochester, MN, USA Abstract: Infection with cytomegalovirus is prevalent in immunosuppressed patients. In solid organ transplant and hematopoietic stem cell transplant recipients, cytomegalovirus infection is associated with high morbidity and preventable mortality. Prevention and treatment of cytomegalovirus with currently approved antiviral drugs is often associated with side effects that sometimes preclude their use. Moreover, cytomegalovirus has developed mutations that confer resistance to standard antiviral drugs. During the last decade, there have been calls to develop novel antiviral drugs that could provide better options for prevention and treatment of cytomegalovirus. Letermovir (AIC246 is a highly specific antiviral drug that is currently undergoing clinical development for the management of cytomegalovirus infection. It acts by inhibiting the viral terminase complex. Letermovir is highly potent in vitro and in vivo against cytomegalovirus. Because of a distinct mechanism of action, it does not exhibit cross-resistance with other antiviral drugs. It is predicted to be active against strains that are resistant to ganciclovir, foscarnet, and cidofovir. To date, early-phase clinical trials suggest a very low incidence of adverse effects. Herein, we present a comprehensive review on letermovir, from its postulated novel mechanism of action to the results of most recent clinical studies. Keywords: cytomegalovirus, letermovir, AIC246, terminase, antivirals, transplantation 

  13. Complexity

    CERN Document Server

    Gershenson, Carlos

    2011-01-01

    The term complexity derives etymologically from the Latin plexus, which means interwoven. Intuitively, this implies that something complex is composed by elements that are difficult to separate. This difficulty arises from the relevant interactions that take place between components. This lack of separability is at odds with the classical scientific method - which has been used since the times of Galileo, Newton, Descartes, and Laplace - and has also influenced philosophy and engineering. In recent decades, the scientific study of complexity and complex systems has proposed a paradigm shift in science and philosophy, proposing novel methods that take into account relevant interactions.

  14. Automated Generation of Attack Trees

    DEFF Research Database (Denmark)

    Vigo, Roberto; Nielson, Flemming; Nielson, Hanne Riis

    2014-01-01

    Attack trees are widely used to represent threat scenarios in a succinct and intuitive manner, suitable for conveying security information to non-experts. The manual construction of such objects relies on the creativity and experience of specialists, and therefore it is error-prone and impractica...

  15. Television Journalism During Terror Attacks

    DEFF Research Database (Denmark)

    Mogensen, Kirsten

    This article views television news coverage of ongoing terrorist attacks and their immediate aftermath as a special genre within journalism, and describes norms connected with the genre. The description is based on qualitative analyses of the coverage on the major American networks in the fi rst ...

  16. Television journalism during terror attacks

    DEFF Research Database (Denmark)

    Mogensen, Kirsten

    2008-01-01

    This article views television news coverage of ongoing terrorist attacks and their immediate aftermath as a special genre within journalism, and describes norms connected with the genre. The description is based on qualitative analyses of the coverage on major American networks the first 24 hours...

  17. FLOODING ATTACK AWARE SECURE AODV

    Directory of Open Access Journals (Sweden)

    S. Madhavi

    2013-01-01

    Full Text Available Providing security in a Mobile Ad hoc Network (MANET is a challenging task due to its inherent nature. Flooding is a type of Denial of Service (DoS attack in MANET. Intentional flooding may lead to disturbances in the networking operation. This kind of attack consumes battery power, storage space and bandwidth. Flooding the excessive number of packets may degrade the performance of the network. This study considers hello flooding attack. As the hello packets are continuously flooded by the malicious node, the neighbor node is not able to process other packets. The functioning of the legitimate node is diverted and destroys the networking operation. Absence of hello packet during the periodical hello interval may lead to wrong assumption that the neighbor node has moved away. So one of the intermediate neighbor nodes sends Route Error (RERR message and the source node reinitiates the route discovery process. In a random fashion the hello interval values are changed and convey this information to other nodes in the network in a secured manner. This study identifies and prevents the flooding attack. This methodology considers the performance parameters such as packet delivery ratio, delay and throughput. This algorithm is implemented in Secure AODV and tested in ad hoc environment. The result of the proposed algorithm decreases the control overhead by 2%.

  18. The Timing of Terrorist Attacks

    DEFF Research Database (Denmark)

    Jensen, Thomas

    2016-01-01

    I use a simple optimal stopping model to derive policy relevant insights on the timing of one-shot attacks by small autonomous terrorist units or “lone wolf” individuals. A main insight is that an increase in proactive counterterrorism measures can lead to a short term increase in the number of a...

  19. Impact of Degree Heterogeneity on Attack Vulnerability of Interdependent Networks.

    Science.gov (United States)

    Sun, Shiwen; Wu, Yafang; Ma, Yilin; Wang, Li; Gao, Zhongke; Xia, Chengyi

    2016-01-01

    The study of interdependent networks has become a new research focus in recent years. We focus on one fundamental property of interdependent networks: vulnerability. Previous studies mainly focused on the impact of topological properties upon interdependent networks under random attacks, the effect of degree heterogeneity on structural vulnerability of interdependent networks under intentional attacks, however, is still unexplored. In order to deeply understand the role of degree distribution and in particular degree heterogeneity, we construct an interdependent system model which consists of two networks whose extent of degree heterogeneity can be controlled simultaneously by a tuning parameter. Meanwhile, a new quantity, which can better measure the performance of interdependent networks after attack, is proposed. Numerical simulation results demonstrate that degree heterogeneity can significantly increase the vulnerability of both single and interdependent networks. Moreover, it is found that interdependent links between two networks make the entire system much more fragile to attacks. Enhancing coupling strength between networks can greatly increase the fragility of both networks against targeted attacks, which is most evident under the case of max-max assortative coupling. Current results can help to deepen the understanding of structural complexity of complex real-world systems. PMID:27609483

  20. Assessing Terrorist Motivations for Attacking Critical Infrastructure

    Energy Technology Data Exchange (ETDEWEB)

    Ackerman, G; Abhayaratne, P; Bale, J; Bhattacharjee, A; Blair, C; Hansell, L; Jayne, A; Kosal, M; Lucas, S; Moran, K; Seroki, L; Vadlamudi, S

    2006-12-04

    Certain types of infrastructure--critical infrastructure (CI)--play vital roles in underpinning our economy, security and way of life. These complex and often interconnected systems have become so ubiquitous and essential to day-to-day life that they are easily taken for granted. Often it is only when the important services provided by such infrastructure are interrupted--when we lose easy access to electricity, health care, telecommunications, transportation or water, for example--that we are conscious of our great dependence on these networks and of the vulnerabilities that stem from such dependence. Unfortunately, it must be assumed that many terrorists are all too aware that CI facilities pose high-value targets that, if successfully attacked, have the potential to dramatically disrupt the normal rhythm of society, cause public fear and intimidation, and generate significant publicity. Indeed, revelations emerging at the time of this writing about Al Qaida's efforts to prepare for possible attacks on major financial facilities in New York, New Jersey, and the District of Columbia remind us just how real and immediate such threats to CI may be. Simply being aware that our nation's critical infrastructure presents terrorists with a plethora of targets, however, does little to mitigate the dangers of CI attacks. In order to prevent and preempt such terrorist acts, better understanding of the threats and vulnerabilities relating to critical infrastructure is required. The Center for Nonproliferation Studies (CNS) presents this document as both a contribution to the understanding of such threats and an initial effort at ''operationalizing'' its findings for use by analysts who work on issues of critical infrastructure protection. Specifically, this study focuses on a subsidiary aspect of CI threat assessment that has thus far remained largely unaddressed by contemporary terrorism research: the motivations and related factors that

  1. Network robustness under large-scale attacks

    CERN Document Server

    Zhou, Qing; Liu, Ruifang

    2012-01-01

    Network Robustness under Large-Scale Attacks provides the analysis of network robustness under attacks, with a focus on large-scale correlated physical attacks. The book begins with a thorough overview of the latest research and techniques to analyze the network responses to different types of attacks over various network topologies and connection models. It then introduces a new large-scale physical attack model coined as area attack, under which a new network robustness measure is introduced and applied to study the network responses. With this book, readers will learn the necessary tools to

  2. Generic attack approaches for industrial control systems.

    Energy Technology Data Exchange (ETDEWEB)

    Duggan, David P.

    2006-01-01

    This report suggests a generic set of attack approaches that are expected to be used against Industrial Control Systems that have been built according to a specific reference model for control systems. The posed attack approaches are ordered by the most desirable, based upon the goal of an attacker. Each attack approach is then graded by the category of adversary that would be capable of utilizing that attack approach. The goal of this report is to identify necessary levels of security required to prevent certain types of attacks against Industrial Control Systems.

  3. Hidden Attacks on Power Grid: Optimal Attack Strategies and Mitigation

    OpenAIRE

    Deka, Deepjyoti; Baldick, Ross; Vishwanath, Sriram

    2014-01-01

    Real time operation of the power grid and synchronism of its different elements require accurate estimation of its state variables. Errors in state estimation will lead to sub-optimal Optimal Power Flow (OPF) solutions and subsequent increase in the price of electricity in the market or, potentially overload and create line outages. This paper studies hidden data attacks on power systems by an adversary trying to manipulate state estimators. The adversary gains control of a few meters, and is...

  4. How to Deal with Weak Interactions in Noncovalent Complexes Analyzed by Electrospray Mass Spectrometry: Cyclopeptidic Inhibitors of the Nuclear Receptor Coactivator 1-STAT6

    OpenAIRE

    Touboul, D.; Maillard, L.; Grässlin, A; Moumne, R; Seitz, M; Robinson, J. A.; R. Zenobi

    2009-01-01

    Mass spectrometry, and especially electrospray ionization, is now an efficient tool to study noncovalent interactions between proteins and inhibitors. It is used here to study the interaction of some weak inhibitors with the NCoA-1/STAT6 protein with KD values in the μM range. High signal intensities corresponding to some nonspecific electrostatic interactions between NCoA-1 and the oppositely charged inhibitors were observed by nanoelectrospray mass spectrometry, due to the use of high ligan...

  5. A peptide derived from the parasite receptor, complement C2 receptor inhibitor trispanning, suppresses immune complex-mediated inflammation in mice.

    Science.gov (United States)

    Inal, Jameel M; Schneider, Brigitte; Armanini, Marta; Schifferli, Jürg A

    2003-04-15

    Complement C2 receptor inhibitor trispanning (CRIT) is a Schistosoma protein that binds the human complement protein, C2. We recently showed that peptides based on the ligand binding region of CRIT inhibit the classical pathway (CP) of complement activation in human serum, using hemolytic assays and so speculated that on the parasite surface CRIT has the function of evading human complement. We now show that in vitro the C2-binding 11-aa C terminus of the first extracellular domain of CRIT, a 1.3-kDa peptide termed CRIT-H17, inhibits CP activation in a species-specific manner, inhibiting mouse and rat complement but not that from guinea pig. Hitherto, the ability of CRIT to regulate complement in vivo has not been assessed. In this study we show that by inhibiting the CP, CRIT-H17 is able to reduce immune complex-mediated inflammation (dermal reversed passive Arthus reaction) in BALB/c mice. Upon intradermal injection of CRIT-H17, and similarly with recombinant soluble complement receptor type 1, there was a 41% reduction in edema and hemorrhage, a 72% reduction in neutrophil influx, and a reduced C3 deposition. Furthermore, when H17 was administered i.v. at a 1 mg/kg dose, inflammation was reduced by 31%. We propose that CRIT-H17 is a potential therapeutic agent against CP complement-mediated inflammatory tissue destruction. PMID:12682267

  6. Crystal Structure of the Homo sapiens Kynureninase-3-Hydroxyhippuric Acid Inhibitor Complex: Insights into the Molecular Basis Of Kynureninase Substrate Specificity

    Energy Technology Data Exchange (ETDEWEB)

    Lima,Santiago; Kumar,Sunil; Gawandi,Vijay; Momany,Cory; Phillips,Robert S.; (Georgia)

    2009-02-23

    Homo sapiens kynureninase is a pyridoxal-5'-phosphate dependent enzyme that catalyzes the hydrolytic cleavage of 3-hydroxykynurenine to yield 3-hydroxyanthranilate and L-alanine as part of the tryptophan catabolic pathway leading to the de novo biosynthesis of NAD{sup +}. This pathway results in quinolinate, an excitotoxin that is an NMDA receptor agonist. High levels of quinolinate have been correlated with the etiology of neurodegenerative disorders such as AIDS-related dementia and Alzheimer's disease. We have synthesized a novel kynureninase inhibitor, 3-hydroxyhippurate, cocrystallized it with human kynureninase, and solved the atomic structure. On the basis of an analysis of the complex, we designed a series of His-102, Ser-332, and Asn-333 mutants. The H102W/N333T and H102W/S332G/N333T mutants showed complete reversal of substrate specificity between 3-hydroxykynurenine and L-kynurenine, thus defining the primary residues contributing to substrate specificity in kynureninases.

  7. Medicines to Treat Heart Attack

    Science.gov (United States)

    ... other medicines, such as a diuretic or a beta blocker. Side effects. ACE inhibitors don’t usually cause ... and tell you exactly how to take it. Beta Blockers Beta blockers are a group of drugs that ...

  8. Perfection of Recent Attacks using IP

    Directory of Open Access Journals (Sweden)

    A. RENGARAJAN

    2012-02-01

    Full Text Available The Internet threat monitoring (ITM systems have been deployed to detect widespread attacks on the Internet in recent years. However, the effectiveness of ITM systems critically depends on the confidentiality of the location of their monitors. If adversaries learn the monitor locations of an ITM system, they can bypass the monitors and focus on the uncovered IP address space without being detected. In this paper, we study a new class of attacks, the invisible LOCalization (iLOC attack. The iLOC attack can accurately and invisibly localize monitors of ITM systems. In the iLOC attack, the attacker launches low-rate port-scan traffic, encoded with a selected pseudo noise code (PN-code, to targeted networks. While the secret PN-code is invisible to others, the attacker can accurately determine the existence of monitors in the targeted networks based on whether the PN-code is embedded in the report data queried from the data center of the ITM system. We formally analyze the impact of various parameters on attack effectiveness. We implement the iLOC attack and conduct the performance evaluation on a real-world ITM system to demonstrate the possibility of such attacks. We also conduct extensive simulations on the iLOC attack using real-world traces. Our data show that the iLOC attack can accurately identify monitors while being invisible to ITM systems. Finally, we present a set of guidelines to counteract the iLOC attack.

  9. Finding multi-step attacks in computer networks using heuristic search and mobile ambients

    NARCIS (Netherlands)

    Franqueira, Virginia Nunes Leal

    2009-01-01

    An important aspect of IT security governance is the proactive and continuous identification of possible attacks in computer networks. This is complicated due to the complexity and size of networks, and due to the fact that usually network attacks are performed in several steps. This thesis proposes

  10. Conestat alfa for the treatment of angioedema attacks

    Directory of Open Access Journals (Sweden)

    Davis B

    2011-07-01

    Full Text Available Benjamin Davis, Jonathan A BernsteinUniversity of Cincinnati College of Medicine, Department of Internal Medicine, Division of Immunology/Allergy Section, Cincinnati, OH, USAAbstract: Recently, multiple C1 inhibitor (C1-INH replacement products have been approved for the treatment of hereditary angioedema (HAE. This review summarizes HAE and its current treatment modalities and focuses on findings from bench to bedside trials of a new C1-INH replacement, conestat alfa. Conestat alfa is unique among the other C1-INH replacement products because it is produced from transgenic rabbits rather than derived from human plasma donors, which can potentially allow an unlimited source of drug without any concern of infectious transmission. The clinical trial data generated to date indicate that conestat alfa is safe and effective for the treatment of acute HAE attacks.Keywords: androgens, adverse events, patients, HAE attacks 

  11. A simple coherent attack and practical security of differential phase shift quantum cryptography

    International Nuclear Information System (INIS)

    The differential phase shift quantum key distribution protocol reveals good security against such powerful attacks as unambiguous state discrimination and beam splitting attacks. Its complete security analysis is complex due to high dimensions of the supposed spaces and density operators. In this paper, we consider a particular and conceptually simple coherent attack, available in practical implementations. The main condition for this attack is the length of used coherent state tuples of order 8–12. We show that under this condition, no high level of practical distance between legitimate users can be achieved. (paper)

  12. Intermittent hypoendorphinaemia in migraine attack.

    Science.gov (United States)

    Baldi, E; Salmon, S; Anselmi, B; Spillantini, M G; Cappelli, G; Brocchi, A; Sicuteri, F

    1982-06-01

    Beta-endorphin (RIA method, previous chromatographic extraction) was evaluated in plasma of migraine sufferers in free periods and during attacks. Decreased levels of the endogenous opioid peptide were found in plasma sampled during the attacks but not in free periods. Even chronic headache sufferers exhibited significantly lowered levels of beta-endorphin, when compared with control subjects with a negative personal and family history of head pains. The mechanism of the hypoendorphinaemia is unknown: lowered levels of the neuropeptide, which controls nociception, vegetative functions and hedonia, could be important in a syndrome such as migraine, characterized by pain, dysautonomia and anhedonia. The impairment of monoaminergic synapses ("empty neuron" condition) constantly present in sufferers from serious headaches, could be due to the fact that opioid neuropeptides, because of a receptoral or metabolic impairment, poorly modulate the respective monoaminergic neurons, resulting in imbalance of synaptic neurotransmission. PMID:6290072

  13. Diabetes Ups Risk of Heart Attack Death

    Science.gov (United States)

    ... 159557.html Diabetes Ups Risk of Heart Attack Death Study points to need for better coordinated care, ... people with diabetes have a higher risk of death after a heart attack. "We knew that following ...

  14. Diabetes - preventing heart attack and stroke

    Science.gov (United States)

    ... medlineplus.gov/ency/patientinstructions/000080.htm Diabetes - preventing heart attack and stroke To use the sharing features on ... with diabetes have a higher chance of having heart attacks and strokes. Smoking and having high blood pressure ...

  15. Heart attack - what to ask your doctor

    Science.gov (United States)

    ... this page: //medlineplus.gov/ency/patientinstructions/000231.htm Heart attack - what to ask your doctor To use the ... features on this page, please enable JavaScript. A heart attack occurs when blood flow to a part of ...

  16. Being active after a heart attack (image)

    Science.gov (United States)

    ... best activity when you start exercising after a heart attack. Start slowly, and increase the amount of time ... best activity when you start exercising after a heart attack. Start slowly, and increase the amount of time ...

  17. DULOXETINE-RELATED PANIC ATTACKS

    OpenAIRE

    Sabljić, Vladimir; Rakun, Radmir; Ružić, Klementina; Grahovac, Tanja

    2011-01-01

    Side-effects arising on the grounds of antidepressant administration pose as a substantial obstacle hindering successful depressive disorder treatment. Side-effects, especially those severe or those manifested through dramatic clinical presentations such as panic attacks, make the treatment far more difficult and shake patients’ trust in both the treatment and the treating physician. This case report deals with a patient experiencing a moderately severe depressive episode, who respon...

  18. IAP inhibitor-mediated sensitization of neuroblastoma towards TRAIL-induced apoptosis via a RIP1/FADD/caspase-8 cell death complex / by Behnaz Ahangarian Abhari

    OpenAIRE

    Abhari, Behnaz

    2012-01-01

    Inhibitor of Apoptosis (IAP) proteins are expressed at high levels in many cancers and contribute to apoptosis resistance. Therefore, they represent promising anticancer drug targets. Here, we report that small molecule IAP inhibitors at subtoxic concentrations cooperate with monoclonal antibodies against TRAIL receptor 1 (Mapatumumab) or TRAIL receptor 2 (Lexatumumab) to induce apoptosis in neuroblastoma cells in a highly synergistic manner (combination index

  19. A binuclear complex constituted by diethyldithiocarbamate and copper(I) functions as a proteasome activity inhibitor in pancreatic cancer cultures and xenografts

    International Nuclear Information System (INIS)

    It is a therapeutic strategy for cancers including pancreatic to inhibit proteasome activity. Disulfiram (DSF) may bind copper (Cu) to form a DSF–Cu complex. DSF–Cu is capable of inducing apoptosis in cancer cells by inhibiting proteasome activity. DSF is rapidly converted to diethyldithiocarbamate (DDTC) within bodies. Copper(II) absorbed by bodies is reduced to copper(I) when it enters cells. We found that DDTC and copper(I) could form a binuclear complex which might be entitled DDTC–Cu(I), and it had been synthesized by us in the laboratory. This study is to investigate the anticancer potential of this complex on pancreatic cancer and the possible mechanism. Pancreatic cancer cell lines, SW1990, PANC-1 and BXPC-3 were used for in vitro assays. Female athymic nude mice grown SW1990 xenografts were used as animal models. Cell counting kit-8 (cck-8) assay and flow cytometry were used for analyzing apoptosis in cells. A 20S proteasome assay kit was used in proteasome activity analysis. Western blot (WB) and immunohistochemistry (IHC) and terminal deoxynucleotidyl transferase dUTP nick end labeling (TUNEL) assays were used in tumor sample analysis. The results suggest that DDTC–Cu(I) inhibit pancreatic cancer cell proliferation and proteasome activity in vitro and in vivo. Accumulation of ubiquitinated proteins, and increased p27 as well as decreased NF-κB expression were detected in tumor tissues of DDTC–Cu(I)-treated group. Our data indicates that DDTC–Cu(I) is an effective proteasome activity inhibitor with the potential to be explored as a drug for pancreatic cancer. - Highlights: • A new structure of DDTC–Cu(I) was reported for the first time. • DDTC–Cu(I) dissolved directly in water was for in vitro and in vivo uses. • DDTC–Cu(I) demonstrated significant anticancer effect in vitro and in vivo. • DDTC–Cu(I) is capable of inhibiting proteasome activity in vitro and in vivo

  20. A binuclear complex constituted by diethyldithiocarbamate and copper(I) functions as a proteasome activity inhibitor in pancreatic cancer cultures and xenografts

    Energy Technology Data Exchange (ETDEWEB)

    Han, Jinbin, E-mail: hanjinbin@gmail.com [Department of Integrative Oncology, Fudan University Shanghai Cancer Center, Shanghai 200032 (China); Department of Oncology, Shanghai Medical College, Fudan University, Shanghai 200032 (China); Shanghai Clinical Center, Chinese Academy of Sciences/Xuhui Central Hospital, Shanghai 200031 (China); Liu, Luming, E-mail: llm1010@163.com [Department of Integrative Oncology, Fudan University Shanghai Cancer Center, Shanghai 200032 (China); Department of Oncology, Shanghai Medical College, Fudan University, Shanghai 200032 (China); Yue, Xiaoqiang [Department of Traditional Chinese Medicine, Changhai Hospital, Second Military Medical University, Shanghai 200433 (China); Chang, Jinjia [Department of Oncology, Shanghai Medical College, Fudan University, Shanghai 200032 (China); Department of Medical Oncology, Fudan University Shanghai Cancer Center, Shanghai 200032 (China); Shi, Weidong; Hua, Yongqiang [Department of Integrative Oncology, Fudan University Shanghai Cancer Center, Shanghai 200032 (China); Department of Oncology, Shanghai Medical College, Fudan University, Shanghai 200032 (China)

    2013-12-15

    It is a therapeutic strategy for cancers including pancreatic to inhibit proteasome activity. Disulfiram (DSF) may bind copper (Cu) to form a DSF–Cu complex. DSF–Cu is capable of inducing apoptosis in cancer cells by inhibiting proteasome activity. DSF is rapidly converted to diethyldithiocarbamate (DDTC) within bodies. Copper(II) absorbed by bodies is reduced to copper(I) when it enters cells. We found that DDTC and copper(I) could form a binuclear complex which might be entitled DDTC–Cu(I), and it had been synthesized by us in the laboratory. This study is to investigate the anticancer potential of this complex on pancreatic cancer and the possible mechanism. Pancreatic cancer cell lines, SW1990, PANC-1 and BXPC-3 were used for in vitro assays. Female athymic nude mice grown SW1990 xenografts were used as animal models. Cell counting kit-8 (cck-8) assay and flow cytometry were used for analyzing apoptosis in cells. A 20S proteasome assay kit was used in proteasome activity analysis. Western blot (WB) and immunohistochemistry (IHC) and terminal deoxynucleotidyl transferase dUTP nick end labeling (TUNEL) assays were used in tumor sample analysis. The results suggest that DDTC–Cu(I) inhibit pancreatic cancer cell proliferation and proteasome activity in vitro and in vivo. Accumulation of ubiquitinated proteins, and increased p27 as well as decreased NF-κB expression were detected in tumor tissues of DDTC–Cu(I)-treated group. Our data indicates that DDTC–Cu(I) is an effective proteasome activity inhibitor with the potential to be explored as a drug for pancreatic cancer. - Highlights: • A new structure of DDTC–Cu(I) was reported for the first time. • DDTC–Cu(I) dissolved directly in water was for in vitro and in vivo uses. • DDTC–Cu(I) demonstrated significant anticancer effect in vitro and in vivo. • DDTC–Cu(I) is capable of inhibiting proteasome activity in vitro and in vivo.

  1. Coyote Attacks: An Increasing Suburban Problem

    OpenAIRE

    Timm, Robert M.; Baker, Rex O.; Bennett, Joe R.; Coolahan, Craig C.

    2004-01-01

    Coyote attacks on humans and pets have increased within the past 5 years in California. We discuss documented occurrences of coyote aggression and attacks on people, using data from USDA Wildlife Services, the California Department of Fish & Game, and other sources. Forty-eight such attacks on children and adults were verified from 1998 through 2003, compared to 41 attacks during the period 1988 through 1997; most incidents occurred in Southern California near the suburban-wildland interfac...

  2. Sybil attack in Wireless Sensor Network

    OpenAIRE

    Abirami.K; Santhi.B

    2013-01-01

    Wireless network is very susceptible to different types of attack. The main attack is Sybil attack, which allows forming other attacks on the network. Security is very important to the wireless network. In wireless sensor network, to verify node identities by cryptographic authentication but this is not easy because sensor node which contains limited resources. Therefore the current research is going on how to handling the situation of different traffic levels and transmission power for secur...

  3. Faked states attack and quantum cryptography protocols

    CERN Document Server

    Denny, Travis

    2011-01-01

    Leveraging quantum mechanics, cryptographers have devised provably secure key sharing protocols. Despite proving the security in theory, real-world application falls short of the ideal. Last year, cryptanalysts completed an experiment demonstrating a successful eavesdropping attack on commercial quantum key distribution (QKD) systems. This attack exploits a weakness in the typical real-world implementation of quantum cryptosystems. Cryptanalysts have successfully attacked several protocols. In this paper, we examine the Kak quantum cryptography protocol and how it may perform under such attacks.

  4. Panic attacks simulate presence of somatic illnesses

    OpenAIRE

    Latas Milan; Soldatović Ivan; Stamenović Marko; Starčević Vladan

    2009-01-01

    Introduction. Panic attacks are characterized with sudden attacks of anxiety with numerous somatic symptoms, such as palpitations, tachycardia, tachypnea, nausea, vertigo. The objective of this study was to analyze symptoms of panic attacks in patients with panic disorder, especially, to determine the specific relationship of somatic and neurological symptoms of panic attacks in boundaries of somatic systems. Material and methods. The study sample consisted of 97 patients with primary diagnos...

  5. A Robust Localization in Wireless Sensor Networks against Wormhole Attack

    Directory of Open Access Journals (Sweden)

    Yanchao Niu

    2012-01-01

    Full Text Available Wormhole attack is one of the most devastating threats for range-free localization in wireless sensor networks. To address this issue, we propose a robust localization scheme in wireless sensor networks against wormhole attack, called ConSetLoc, which neither complicated distance measuring devices nor extra complex encrypting algorithms is necessary. With the relationship between hop counts and geographic distance of sensor nodes in the deployment territory, we design a partition method of consistent anchors sets by the convex constraints in geometry which can reduce the effect of bad measurements on estimates,  and then present a filtering strategy for the candidate locations with these anchors sets. In addition, we conduct simulation experiments for performance evaluation and the results demonstrate the proposed ConSetLoc can estimate the locations for most of sensor nodes with good accuracy and stability when wormhole attack exists in the network.

  6. Attacks and countermeasures on AES and ECC

    DEFF Research Database (Denmark)

    Tange, Henrik; Andersen, Birger

    2013-01-01

    AES (Advanced Encryption Standard) is widely used in LTE and Wi-Fi communication systems. AES has recently been exposed to new attacks which have questioned the overall security of AES. The newest attack is a so called biclique attack, which is using the fact that the content of the state array...

  7. Understand Your Risk of Heart Attack

    Science.gov (United States)

    ... Stroke More Understand Your Risks to Prevent a Heart Attack Updated:Aug 2,2016 Knowledge is power, so ... medication. This content was last reviewed June 2016. Heart Attack • Home • About Heart Attacks Acute Coronary Syndrome (ACS) • ...

  8. Attacks and countermeasures on AES and ECC

    DEFF Research Database (Denmark)

    Tange, Henrik; Andersen, Birger

    foreseeable while the rounds are performed. ECC (Elliptic Curve Cryptography) is used as a public key crypto system with the key purpose of creating a private shared between two participants in a communication network. Attacks on ECC include the Pohlig-Hellman attack and the Pollard's rho attack. Furthermore...

  9. A Novel Attack against Android Phones

    CERN Document Server

    Backes, Michael; von Styp-Rekowsky, Philipp

    2011-01-01

    In the first quarter of 2011, Android has become the top-selling operating system for smartphones. In this paper, we present a novel, highly critical attack that allows unprompted installation of arbitrary applications from the Android Market. Our attack is based on a single malicious application, which, in contrast to previously known attacks, does not require the user to grant it any permissions.

  10. Size exclusion chromatography to gain insight into the complex formation of carrot pectin methylesterase and its inhibitor from kiwi fruit as influenced by thermal and high-pressure processing.

    Science.gov (United States)

    Jolie, Ruben P; Duvetter, Thomas; Verlinde, Philippe H C J; Van Buggenhout, Sandy; Van Loey, Ann M; Hendrickx, Marc E

    2009-12-01

    A size exclusion chromatography (HPSEC) method was implemented to study complex formation between carrot pectin methylesterase (PME) and its inhibitor (PMEI) from kiwi fruit in the context of traditional thermal and novel high-pressure processing. Evidence was gained that both thermal and high-pressure treatments of PME give rise to two distinct enzyme subpopulations: a catalytically active population, eluting from the size exclusion column, and an inactive population, aggregated and excluded from the column. When mixing a partly denatured PME sample with a fixed amount of PMEI, a PME-PMEI complex peak was observed on HPSEC, of which the peak area was highly correlated with the residual enzyme activity of the corresponding PME sample. This observation indicates complex formation to be restricted to the active PME fraction. When an equimolar mixture of PME and PMEI was subjected to either a thermal or a high-pressure treatment, marked differences were observed. At elevated temperature, enzyme and inhibitor remained united and aggregated as a whole, thus gradually disappearing from the elution profile. Conversely, elevated pressure caused the dissociation of the PME-PMEI complexes, followed by a separate action of pressure on enzyme and inhibitor. Remarkably, PMEI appeared to be pressure-resistant when compressed at acidic pH (ca. 4). PMID:19908835

  11. Computing Preferred Extensions for Argumentation Systems with Sets of Attacking

    DEFF Research Database (Denmark)

    Nielsen, Søren Holbech; Parsons, Simon

    2006-01-01

    The hitherto most abstract, and hence general, argumentation system, is the one described by Dung in a paper from 1995. This framework does not allow for joint attacks on arguments, but in a recent paper we adapted it to support such attacks, and proved that this adapted framework enjoyed the sam...... these systems. In this paper we propose a method for enumerating preferred extensions of the potentially more complex systems, where joint attacks are allowed. The method is inspired by the one given by Doutre and Mengin.......The hitherto most abstract, and hence general, argumentation system, is the one described by Dung in a paper from 1995. This framework does not allow for joint attacks on arguments, but in a recent paper we adapted it to support such attacks, and proved that this adapted framework enjoyed the same...... formal properties as that of Dung. One problem posed by Dung's original framework, which was neglected for some time, is how to compute preferred extensions of the argumentation systems. However, in 2001, in a paper by Doutre and Mengin, a procedure was given for enumerating preferred extensions for...

  12. Distributed Denial of Service (DDoS) Attacks Detection Mechanism

    CERN Document Server

    Kumarasamy, Saravanan

    2012-01-01

    Pushback is a mechanism for defending against Distributed Denial-of-Service (DDoS) attacks. DDoS attacks are treated as a congestion-control problem, but because most such congestion is caused by malicious hosts not obeying traditional end-to-end congestion control, the problem must be handled by the routers. Functionality is added to each router to detect and preferentially drop packets that probably belong to an attack. Upstream routers are also notified to drop such packets in order that the router's resources be used to route legitimate traffic hence term pushback. Client puzzles have been advocated as a promising countermeasure to DoS attacks in the recent years. In order to identify the attackers, the victim server issues a puzzle to the client that sent the traffic. When the client is able to solve the puzzle, it is assumed to be authentic and the traffic from it is allowed into the server. If the victim suspects that the puzzles are solved by most of the clients, it increases the complexity of the puz...

  13. Novel bis-(−)-nor-meptazinol derivatives act as dual binding site AChE inhibitors with metal-complexing property

    Energy Technology Data Exchange (ETDEWEB)

    Zheng, Wei [Department of Medicinal Chemistry, School of Pharmacy, Fudan University, 826 Zhangheng Road, Shanghai 200032 (China); NPFPC Key Laboratory of Contraceptives and Devices, Shanghai Institute of Planned Parenthood Research, 2140 Xietu Road, Shanghai 200032 (China); Li, Juan [Department of Pharmacology, Institute of Medical Sciences, Shanghai Jiaotong University School of Medicine, 280 South Chongqing Road, Shanghai 200025 (China); Qiu, Zhuibai [Department of Medicinal Chemistry, School of Pharmacy, Fudan University, 826 Zhangheng Road, Shanghai 200032 (China); Xia, Zheng [Department of Pharmacology, Institute of Medical Sciences, Shanghai Jiaotong University School of Medicine, 280 South Chongqing Road, Shanghai 200025 (China); Li, Wei [Department of Medicinal Chemistry, School of Pharmacy, Fudan University, 826 Zhangheng Road, Shanghai 200032 (China); Yu, Lining; Chen, Hailin; Chen, Jianxing [NPFPC Key Laboratory of Contraceptives and Devices, Shanghai Institute of Planned Parenthood Research, 2140 Xietu Road, Shanghai 200032 (China); Chen, Yan; Hu, Zhuqin; Zhou, Wei; Shao, Biyun; Cui, Yongyao [Department of Pharmacology, Institute of Medical Sciences, Shanghai Jiaotong University School of Medicine, 280 South Chongqing Road, Shanghai 200025 (China); Xie, Qiong, E-mail: xiejoanxq@gmail.com [Department of Medicinal Chemistry, School of Pharmacy, Fudan University, 826 Zhangheng Road, Shanghai 200032 (China); Chen, Hongzhuan, E-mail: yaoli@shsmu.edu.cn [Department of Pharmacology, Institute of Medical Sciences, Shanghai Jiaotong University School of Medicine, 280 South Chongqing Road, Shanghai 200025 (China)

    2012-10-01

    The strategy of dual binding site acetylcholinesterase (AChE) inhibition along with metal chelation may represent a promising direction for multi-targeted interventions in the pathophysiological processes of Alzheimer's disease (AD). In the present study, two derivatives (ZLA and ZLB) of a potent dual binding site AChE inhibitor bis-(−)-nor-meptazinol (bis-MEP) were designed and synthesized by introducing metal chelating pharmacophores into the middle chain of bis-MEP. They could inhibit human AChE activity with IC{sub 50} values of 9.63 μM (for ZLA) and 8.64 μM (for ZLB), and prevent AChE-induced amyloid-β (Aβ) aggregation with IC{sub 50} values of 49.1 μM (for ZLA) and 55.3 μM (for ZLB). In parallel, molecular docking analysis showed that they are capable of interacting with both the catalytic and peripheral anionic sites of AChE. Furthermore, they exhibited abilities to complex metal ions such as Cu(II) and Zn(II), and inhibit Aβ aggregation triggered by these metals. Collectively, these results suggest that ZLA and ZLB may act as dual binding site AChEIs with metal-chelating potency, and may be potential leads of value for further study on disease-modifying treatment of AD. -- Highlights: ► Two novel bis-(−)-nor-meptazinol derivatives are designed and synthesized. ► ZLA and ZLB may act as dual binding site AChEIs with metal-chelating potency. ► They are potential leads for disease-modifying treatment of Alzheimer's disease.

  14. Loss of Tuberous Sclerosis Complex 2 (TSC2) Is Frequent in Hepatocellular Carcinoma and Predicts Response to mTORC1 Inhibitor Everolimus.

    Science.gov (United States)

    Huynh, Hung; Hao, Huai-Xiang; Chan, Stephen L; Chen, David; Ong, Richard; Soo, Khee Chee; Pochanard, Panisa; Yang, David; Ruddy, David; Liu, Manway; Derti, Adnan; Balak, Marissa N; Palmer, Michael R; Wang, Yan; Lee, Benjamin H; Sellami, Dalila; Zhu, Andrew X; Schlegel, Robert; Huang, Alan

    2015-05-01

    Hepatocellular carcinoma (HCC) is the third leading cause of cancer deaths worldwide and hyperactivation of mTOR signaling plays a pivotal role in HCC tumorigenesis. Tuberous sclerosis complex (TSC), a heterodimer of TSC1 and TSC2, functions as a negative regulator of mTOR signaling. In the current study, we discovered that TSC2 loss-of-function is common in HCC. TSC2 loss was found in 4 of 8 HCC cell lines and 8 of 28 (28.6%) patient-derived HCC xenografts. TSC2 mutations and deletions are likely to be the underlying cause of TSC2 loss in HCC cell lines, xenografts, and primary tumors for most cases. We further demonstrated that TSC2-null HCC cell lines and xenografts had elevated mTOR signaling and, more importantly, were significantly more sensitive to RAD001/everolimus, an mTORC1 inhibitor. These preclinical findings led to the analysis of TSC2 status in HCC samples collected in the EVOLVE-1 clinical trial of everolimus using an optimized immunohistochemistry assay and identified 15 of 139 (10.8%) samples with low to undetectable levels of TSC2. Although the sample size is too small for formal statistical analysis, TSC2-null/low tumor patients who received everolimus tended to have longer overall survival than those who received placebo. Finally, we performed an epidemiology survey of more than 239 Asian HCC tumors and found the frequency of TSC2 loss to be approximately 20% in Asian HBV(+) HCC. Taken together, our data strongly argue that TSC2 loss is a predictive biomarker for the response to everolimus in HCC patients. PMID:25724664

  15. Methods of Identifying and Preventing SQL Attacks

    Directory of Open Access Journals (Sweden)

    Bojken Shehu

    2012-11-01

    Full Text Available The paper begins by identifying the organizations which are vulnerable to the SQL attack referred to as an SQL injection attack. The term SQL injection attack is defined and a diagram is used to illustrate the way that attack occurs. In another section, the paper identifies the methods used to detect an attack to SQL, whereby the techniques are discussed extensively using relevant diagrams for illustration. The other sections cover the preventive methods, where the methods are also discussed with an illustration using diagrams.

  16. Whispering through DDoS attack

    OpenAIRE

    Miralem Mehic; Jiri Slachta; Miroslav Voznak

    2016-01-01

    Denial of service (DoS) attack is an attempt of the attacker to disable victim's machine by depleting network or computing resources. If this attack is performed with more than one machine, it is called distributed denial of service (DDoS) attack. Covert channels are those channels which are used for information transmission even though they are neither designed nor intended to transfer information at all. In this article, we investigated the possibility of using of DDoS attack for purposes o...

  17. Attacking Embedded Systems through Power Analysis

    Directory of Open Access Journals (Sweden)

    Dr. Sastry JKR

    2011-03-01

    Full Text Available Embedded Systems are being used for the development and implementation of Safety and Mission Critical Systems. Malfunctions of such type of embedded systems will lead to disasters at times. The embedded systems must be fully secured from outside intervention in order to have effective functioning as well as to provide protective environment to these mission critical systems. There are several attacking systems discussed in the literature each requiring a kind of counter attacking system. Power Analysis and variations of power analysis are the significant attacking mechanisms discussed in the literature. Crypto servers are the main areas of attacking as they deal with securing the data that flow in-between several components of the embedded systems. Most of the attacking systems suggested in the litterer suffer from lack of experimental models to emulate the attacking system. An attacking system could be amply proved when several samples of data are used for attacking and the samples of data provides for knowledge base. In this paper an experimental setup is proposed which is an embedded system itself for creation of a Knowledgebase which shall form the basis for attacking. The experimental setup required for undertaking the actual attacking with the usage of the knowledgebase is also presented. Further the proposed attacking system is applied for mission critical system and the experimental results obtained through the simulation are also presented.

  18. NETWORK SECURITY ATTACKS. ARP POISONING CASE STUDY

    Directory of Open Access Journals (Sweden)

    Luminiţa DEFTA

    2010-12-01

    Full Text Available Arp poisoning is one of the most common attacks in a switched network. A switch is a network device that limits the ability of attackers that use a packet sniffer to gain access to information from internal network traffic. However, using ARP poisoning the traffic between two computers can be intercepted even in a network that uses switches. This method is known as man in the middle attack. With this type of attack the affected stations from a network will have invalid entries in the ARP table. Thus, it will contain only the correspondence between the IP addresses of the stations from the same network and a single MAC address (the station that initiated the attack. In this paper we present step by step the initiation of such an attack in a network with three computers. We will intercept the traffic between two stations using the third one (the attacker.

  19. SQL Injection Attacks and Defense

    CERN Document Server

    Clarke, Justin

    2012-01-01

    SQL Injection Attacks and Defense, First Edition: Winner of the Best Book Bejtlich Read Award "SQL injection is probably the number one problem for any server-side application, and this book unequaled in its coverage." -Richard Bejtlich, Tao Security blog SQL injection represents one of the most dangerous and well-known, yet misunderstood, security vulnerabilities on the Internet, largely because there is no central repository of information available for penetration testers, IT security consultants and practitioners, and web/software developers to turn to for help. SQL Injection Att

  20. What Are the Symptoms of a Heart Attack?

    Science.gov (United States)

    ... on Twitter. What Are the Symptoms of a Heart Attack? Not all heart attacks begin with the sudden, ... This Content: NEXT >> Featured Video What is a heart attack? 05/22/2014 Describes how a heart attack ...

  1. Migraine attacks the Basal Ganglia

    Directory of Open Access Journals (Sweden)

    Bigal Marcelo

    2011-09-01

    Full Text Available Abstract Background With time, episodes of migraine headache afflict patients with increased frequency, longer duration and more intense pain. While episodic migraine may be defined as 1-14 attacks per month, there are no clear-cut phases defined, and those patients with low frequency may progress to high frequency episodic migraine and the latter may progress into chronic daily headache (> 15 attacks per month. The pathophysiology of this progression is completely unknown. Attempting to unravel this phenomenon, we used high field (human brain imaging to compare functional responses, functional connectivity and brain morphology in patients whose migraine episodes did not progress (LF to a matched (gender, age, age of onset and type of medication group of patients whose migraine episodes progressed (HF. Results In comparison to LF patients, responses to pain in HF patients were significantly lower in the caudate, putamen and pallidum. Paradoxically, associated with these lower responses in HF patients, gray matter volume of the right and left caudate nuclei were significantly larger than in the LF patients. Functional connectivity analysis revealed additional differences between the two groups in regard to response to pain. Conclusions Supported by current understanding of basal ganglia role in pain processing, the findings suggest a significant role of the basal ganglia in the pathophysiology of the episodic migraine.

  2. Green Plant Extract as a passivationpromoting Inhibitor for Reinforced Concrete

    OpenAIRE

    Abdulrahman A. S.; Mohammad Ismail

    2011-01-01

    The present corrosion inhibitors in market for the protection of steel reinforcement in concrete exposed to chloride attack are toxic to the environment and compromises sustainability drives. There is the needs to develop inhibitor that are eco-friendly and sustainable. In this work the ability of hydrophobic green plant extracts inhibitor (Bambusa arundinacea) to repassivates the chloride induced corrosion of steel was studied. Its efficacy and effectiveness was also compared with calcium ni...

  3. Attack Coverage in High-Level Men’s Volleyball: Organization on the Edge of Chaos?

    Directory of Open Access Journals (Sweden)

    Laporta Lorenzo

    2015-09-01

    Full Text Available Change is pervasive, but emerging patterns are occasionally detectable through analysis of systemic behaviors. Match analysis uses these patterns in order to reduce the degree of improvisation and to optimize the training process. However, it is possible that certain game phases elude systematic patterning. In this vein, our aim was to analyze the case of attack coverage in men’s volleyball, as we suspected it would elude systematic patterning and has received negligible attention in scientific research. We analyzed the occurrence of attack coverage in 4544 plays of the 2011 Volleyball World League. A Chi-square test with residual adjusted values was applied to explore significant associations between variables. A Monte Carlo correction was applied, as some cells had n<5. Effect sizes were determined using Cramer’s V. Overall, attack coverage occurred in 3.89% of ball possessions, and 23 distinct structures emerged. These structures lacked significant associations with the game complex, setting zone, and effect of attack coverage. Conversely, attack coverage structures showed significant associations with the attack zone and tempo, with very strong effect sizes (V=0.472 and V=0.521, respectively. As certain attack zones are deeply associated with attack tempo, it is apparent that quicker attack plays affect attack coverage structuring, promoting the formation of less complex structures. Ultimately, attack coverage structures seem to depend on momentary constraints, thereby rendering rigid systematization impracticable. Still, we contended that a principle-based approach might be suitable. This invites researchers to rethink how to interpret game regularities.

  4. Attack Coverage in High-Level Men’s Volleyball: Organization on the Edge of Chaos?

    Science.gov (United States)

    Laporta, Lorenzo; Nikolaidis, Pantelis; Thomas, Luke; Afonso, José

    2015-01-01

    Change is pervasive, but emerging patterns are occasionally detectable through analysis of systemic behaviors. Match analysis uses these patterns in order to reduce the degree of improvisation and to optimize the training process. However, it is possible that certain game phases elude systematic patterning. In this vein, our aim was to analyze the case of attack coverage in men’s volleyball, as we suspected it would elude systematic patterning and has received negligible attention in scientific research. We analyzed the occurrence of attack coverage in 4544 plays of the 2011 Volleyball World League. A Chi-square test with residual adjusted values was applied to explore significant associations between variables. A Monte Carlo correction was applied, as some cells had n<5. Effect sizes were determined using Cramer’s V. Overall, attack coverage occurred in 3.89% of ball possessions, and 23 distinct structures emerged. These structures lacked significant associations with the game complex, setting zone, and effect of attack coverage. Conversely, attack coverage structures showed significant associations with the attack zone and tempo, with very strong effect sizes (V=0.472 and V=0.521, respectively). As certain attack zones are deeply associated with attack tempo, it is apparent that quicker attack plays affect attack coverage structuring, promoting the formation of less complex structures. Ultimately, attack coverage structures seem to depend on momentary constraints, thereby rendering rigid systematization impracticable. Still, we contended that a principle-based approach might be suitable. This invites researchers to rethink how to interpret game regularities. PMID:26557208

  5. To mitigate Black-hole attack with CBDS in MANET

    OpenAIRE

    Navjot; Er.Pooja Ran

    2015-01-01

    Mobile ad-hoc network is self configured network that consist of mobile nodes which communicate with each other. Distributed self-organized nature of this network makes it venerable to various attacks likes DOS attack, Black hole attack, wormhole attack and jamming attack etc. Blackhole attack is one of the serious attack in network in which information loss occur which degrades the performance of network. In this work black hole attack is detected with the help of CBDS (cooperati...

  6. Anger attacks in obsessive compulsive disorder

    Directory of Open Access Journals (Sweden)

    Nitesh Prakash Painuly

    2011-01-01

    Full Text Available Background: Research on anger attacks has been mostly limited to depression, and only a few studies have focused on anger attacks in obsessive compulsive disorder. Materials and Methods: In a cross-sectional study all new obsessive compulsive disorder patients aged 20-60 years attending an outpatient clinic were assessed using the anger attack questionnaire, irritability, depression and anxiety scale (for the direction of the aggressive behavior and quality of life (QOL. Results: The sample consisted of 42 consecutive subjects with obsessive compulsive disorder, out of which 21 (50% had anger attacks. The obsessive compulsive disorder subjects with and without anger attacks did not show significant differences in terms of sociodemographic variables, duration of illness, treatment, and family history. However, subjects with anger attacks had significantly higher prevalence of panic attacks and comorbid depression. Significantly more subjects with anger attacks exhibited aggressive acts toward spouse, parents, children, and other relatives in the form of yelling and threatening to hurt, trying to hurt, and threatening to leave. However, the two groups did not differ significantly in terms of QOL, except for the psychological domain being worse in the subjects with anger attacks. Conclusion: Anger attacks are present in half of the patients with obsessive compulsive disorder, and they correlate with the presence of comorbid depression.

  7. Invulnerability of grown Peer-to-Peer networks under progressive targeted attacks

    Science.gov (United States)

    Peng, Hao; Zhao, Dandan; Han, Jianmin; Lu, Jianfeng

    2015-06-01

    Security issues of Peer-to-Peer (P2P) networks have attracted more and more research in recent years. In this paper, using complex features of P2P networks, we shift the focus to the study of invulnerability of grown P2P networks under progressive targeted attacks. Based on dynamic process and reverse percolation theory, we present several mechanisms that attacked P2P networks can adopt to minimize the disasters aftermath progressive targeted attacks. In this process, we proposed: (i) the dynamics of grown P2P networks under targeted attacks can make sure an attacked P2P network restore a power-law (PL) characteristic to a normal level; (ii) a global degree restoring process from the aftermath of progressive targeted attacks can restore the status of set of high degree peers to normal; (iii) a reverse percolation process glues the fragmented small connected component of a destroyed grown P2P network into a giant connected component (GCC). Experimental results show that an attacked grown P2P network can restore the key characteristics, such as power-law characteristic of original P2P network, the set of high degree peers and the giant connected component, to a regular status. In this way, we can illustrate the invulnerability of progressive targeted attacks on grown P2P networks which is particularly useful in designing complex P2P networks.

  8. Management of acute attacks of hereditary angioedema: role of ecallantide

    Directory of Open Access Journals (Sweden)

    Duffey H

    2015-04-01

    Full Text Available Hannah Duffey,1 Rafael Firszt1,2 1Department of Pediatrics, 2Division of Allergy, Immunology and Rheumatology, University of Utah, Salt Lake City, UT, USA Abstract: Hereditary angioedema (HAE is characterized as an episodic swelling disorder with autosomal dominant inheritance. Clinical features include nonpitting edema of external or mucosal body surfaces, and patients often present with swelling of the extremities, abdominal pain, and swelling of the mouth and throat, which can lead to asphyxiation. Patients with HAE classically have no associated urticaria, which is often referred to as nonhistaminergic angioedema. Treatment for HAE involves long-term prophylaxis, short-term prophylaxis, and management of acute attacks. Up until the past few years, acute HAE episodes were predominately treated with supportive measures. Three classes of medications have recently been approved by the US Food and Drug Administration (FDA for the management of acute HAE attacks. Ecallantide, a recombinant protein that acts as a reversible inhibitor of kallikrein, is currently indicated for acute attacks of HAE in those aged 12 years. In two randomized, double-blind, placebo-controlled, multicenter trials, EDEMA3 and EDEMA4, patients treated with 30 mg of ecallantide demonstrated statistically significant improvement in symptoms compared to those on placebo. In addition to its use as treatment for HAE, ecallantide has been used off label in the management of nonhistaminergic angioedema, not due to HAE. Ecallantide has shown promise in the treatment of these other forms; however, data are limited to mainly case reports at this time. Ecallantide is generally a safe and well-tolerated medication; however, based on reports of anaphylaxis, ecallantide does contain a black box warning. Due to the risk of anaphylaxis, ecallantide cannot be self-administered and must be given by a health care professional. Overall, ecallantide is a safe and effective medication for the

  9. C1 inhibitor serpin domain structure reveals the likely mechanism of heparin potentiation and conformational disease.

    Science.gov (United States)

    Beinrohr, László; Harmat, Veronika; Dobó, József; Lörincz, Zsolt; Gál, Péter; Závodszky, Péter

    2007-07-20

    C1 inhibitor, a member of the serpin family, is a major down-regulator of inflammatory processes in blood. Genetic deficiency of C1 inhibitor results in hereditary angioedema, a dominantly inheritable, potentially lethal disease. Here we report the first crystal structure of the serpin domain of human C1 inhibitor, representing a previously unreported latent form, which explains functional consequences of several naturally occurring mutations, two of which are discussed in detail. The presented structure displays a novel conformation with a seven-stranded beta-sheet A. The unique conformation of the C-terminal six residues suggests its potential role as a barrier in the active-latent transition. On the basis of surface charge pattern, heparin affinity measurements, and docking of a heparin disaccharide, a heparin binding site is proposed in the contact area of the serpin-proteinase encounter complex. We show how polyanions change the activity of the C1 inhibitor by a novel "sandwich" mechanism, explaining earlier reaction kinetic and mutagenesis studies. These results may help to improve therapeutic C1 inhibitor preparations used in the treatment of hereditary angioedema, organ transplant rejection, and heart attack. PMID:17488724

  10. Interactions between Barley a-Amylases, Substrates, Inhibitors and Regulatory Proteins

    DEFF Research Database (Denmark)

    Hachem, Maher Abou; Bozonnet, Sophie; Willemoës, Martin;

    2006-01-01

    Barley a-amylase binds sugars at two sites on the enzyme surface in addition to the active site. Crystallography and site-directed mutagenesis highlight the importance of aromatic residues at these surface sites as demonstrated by Kd values determined for ß-cyclodextrin by surface plasmon resonance...... is studied by mutagenesis, crystallography and microcalorimetry. Further improvement of recombinant AMY2 production allows future direct mutational analysis in this isozyme. Specific proteinaceous inhibitors act on a-amylases of different origin. In the complex of barley a-amylase...... are targets of the disulphide reductase thioredoxin h that attacks a specific disulphide bond in BASI and, remarkably, reduces two different disulphide bonds in the barley monomeric and dimeric amylase inhibitors that both belong to the CM-proteins and inhibit animal a-amylase....

  11. Acid-catalyzed attack of dinitrogen ligand in the complexes cis-(me2PhP)4 Mo(N2)2 and trans-(Ph2PCH2CH2PPh2)2W(N2)2 by nitronium and nitrosonium cations with formation of nitrogen oxides

    International Nuclear Information System (INIS)

    The interaction of the labelled dinitrogen complexes cis-(Me2PhP4Mo(15N2)2 and trans-(dppe)2W(15N2)2 with 14NO2BF4 and 14NOBF4 at room temperature in sulfolane in the presence of H2SO4 results in rapid formation of labelled nitrous and nitric oxides (15N14NO, 15NO) as well as 15N14N. The yield of the products depends on the reagent ratio and reaches 10-20 mol. % per mole of a complex under optimal conditions. The proposed mechanisms of the reactions found involves the step of protonation of dinitrogen ligand to from corresponding hydrazide(2-) direvatives, which are then attacked by nitronium or nitrosonium cations. In accordance with this mechanism it has been established that individual hydrazido(2-) complexes (Me2Ph)3Mo(15N2H2)Cl2 and (dppe)2W(15N2H2)Cl2 are capable of forming 15N14NO, 15NO and 15N14N under the action of 14NO2BF4, and NOBF4 in the absence of an acid. 14 refs., 6 tabs

  12. Classification of Attacks in Wireless Sensor Networks

    OpenAIRE

    Messai, Mohamed-Lamine

    2014-01-01

    In wireless sensor networks (WSNs), security has a vital importance. Recently, there was a huge interest to propose security solutions in WSNs because of their applications in both civilian and military domains. Adversaries can launch different types of attacks, and cryptography is used to countering these attacks. This paper presents challenges of security and a classification of the different possible attacks in WSNs. The problems of security in each layer of the network's OSI model are dis...

  13. Detection Block Model for SQL Injection Attacks

    OpenAIRE

    Diksha G. Kumar; Madhumita Chatterjee

    2014-01-01

    With the rapid development of Internet, more and more organizations connect their databases to the Internet for resource sharing. However, due to developers' lack of knowledge of all possible attacks, web applications become vulnerable to multiple attacks. Thus the network databases could face multiple threats. Web applications generally consist of a three tier architecture where database is in the third pole, which is the most valuable asset in any organization. SQL injection is an attack te...

  14. Investigation of Sulfate Attack by Experimental and Thermodynamic Means

    OpenAIRE

    Kunther, Wolfgang

    2012-01-01

    This work investigates sulfate attack in complex sulfate environments by exposing different binder types to various sulfate solutions and comparing predicted phase and volume changes with experimental data. The most important aspects of this work can be grouped in three topics: The comparison of the predicted volume increase with the experimentally observed length changes. This part of the work shows that volume increase cannot be linked direct...

  15. FPGA Implementation of a Statistical Saturation Attack against PRESENT

    OpenAIRE

    Kerckhof, Stéphanie; Collard, Baudoin; Standaert, François-Xavier; AFRICACRYPT 2011

    2011-01-01

    Statistical attacks against block ciphers usually exploit “characteristics”. A characteristic essentially defines a relation between (parts of) the block cipher’s inputs, outputs and intermediate values. Intuitively, a good characteristic is one for which the relation between the cipher’s inputs and outputs exhibit a significant deviation from the uniform distribution. Due to its intensive computational complexity, the search for good characteristics generally relies on heuristics, e.g. based...

  16. Ancestry Analysis in the 11-M Madrid Bomb Attack Investigation

    OpenAIRE

    Christopher Phillips; Lourdes Prieto; Manuel Fondevila; Antonio Salas; Antonio Gómez-Tato; José Alvarez-Dios; Antonio Alonso; Alejandro Blanco-Verea; María Brión; Marta Montesino; Angel Carracedo; María Victoria Lareu

    2009-01-01

    The 11-M Madrid commuter train bombings of 2004 constituted the second biggest terrorist attack to occur in Europe after Lockerbie, while the subsequent investigation became the most complex and wide-ranging forensic case in Spain. Standard short tandem repeat (STR) profiling of 600 exhibits left certain key incriminatory samples unmatched to any of the apprehended suspects. A judicial order to perform analyses of unmatched samples to differentiate European and North African ancestry became a...

  17. Where can an Insider attack?

    DEFF Research Database (Denmark)

    Probst, Christian W.; Hansen, René Rydhof; Nielson, Flemming

    2006-01-01

    the targeted organisation. While the problem is well recognised in the security community as well as in law-enforcement and intelligence communities, the main resort still is to audit log files \\$\\backslash\\$emph{after the fact}. There has been little research into developing models, automated tools......By definition, an insider has better access, is more trusted, and has better information about internal procedures, high-value targets, and potential weak spots in the security, than an outsider. Consequently, an insider attack has the potential to cause significant, even catastrophic, damage to...... properties of the modelled systems. Our analysis of processes identifies which actions may be performed by whom, at which locations, accessing which data. This allows to compute a superset of audit results---before an incident occurs....

  18. Management of acute attacks of hereditary angioedema: role of ecallantide

    Science.gov (United States)

    Duffey, Hannah; Firszt, Rafael

    2015-01-01

    Hereditary angioedema (HAE) is characterized as an episodic swelling disorder with autosomal dominant inheritance. Clinical features include nonpitting edema of external or mucosal body surfaces, and patients often present with swelling of the extremities, abdominal pain, and swelling of the mouth and throat, which can lead to asphyxiation. Patients with HAE classically have no associated urticaria, which is often referred to as nonhistaminergic angioedema. Treatment for HAE involves long-term prophylaxis, short-term prophylaxis, and management of acute attacks. Up until the past few years, acute HAE episodes were predominately treated with supportive measures. Three classes of medications have recently been approved by the US Food and Drug Administration (FDA) for the management of acute HAE attacks. Ecallantide, a recombinant protein that acts as a reversible inhibitor of kallikrein, is currently indicated for acute attacks of HAE in those aged ≥12 years. In two randomized, double-blind, placebo-controlled, multicenter trials, EDEMA3 and EDEMA4, patients treated with 30 mg of ecallantide demonstrated statistically significant improvement in symptoms compared to those on placebo. In addition to its use as treatment for HAE, ecallantide has been used off label in the management of nonhistaminergic angioedema, not due to HAE. Ecallantide has shown promise in the treatment of these other forms; however, data are limited to mainly case reports at this time. Ecallantide is generally a safe and well-tolerated medication; however, based on reports of anaphylaxis, ecallantide does contain a black box warning. Due to the risk of anaphylaxis, ecallantide cannot be self-administered and must be given by a health care professional. Overall, ecallantide is a safe and effective medication for the treatment of acute attacks of HAE. PMID:25931832

  19. Cyber attacks against state estimation in power systems: Vulnerability analysis and protection strategies

    Science.gov (United States)

    Liu, Xuan

    Power grid is one of the most critical infrastructures in a nation and could suffer a variety of cyber attacks. With the development of Smart Grid, false data injection attack has recently attracted wide research interest. This thesis proposes a false data attack model with incomplete network information and develops optimal attack strategies for attacking load measurements and the real-time topology of a power grid. The impacts of false data on the economic and reliable operations of power systems are quantitatively analyzed in this thesis. To mitigate the risk of cyber attacks, a distributed protection strategies are also developed. It has been shown that an attacker can design false data to avoid being detected by the control center if the network information of a power grid is known to the attacker. In practice, however, it is very hard or even impossible for an attacker to obtain all network information of a power grid. In this thesis, we propose a local load redistribution attacking model based on incomplete network information and show that an attacker only needs to obtain the network information of the local attacking region to inject false data into smart meters in the local region without being detected by the state estimator. A heuristic algorithm is developed to determine a feasible attacking region by obtaining reduced network information. This thesis investigates the impacts of false data on the operations of power systems. It has been shown that false data can be designed by an attacker to: 1) mask the real-time topology of a power grid; 2) overload a transmission line; 3) disturb the line outage detection based on PMU data. To mitigate the risk of cyber attacks, this thesis proposes a new protection strategy, which intends to mitigate the damage effects of false data injection attacks by protecting a small set of critical measurements. To further reduce the computation complexity, a mixed integer linear programming approach is also proposed to

  20. Detecting Denial of Service Attacks in Tor

    Science.gov (United States)

    Danner, Norman; Krizanc, Danny; Liberatore, Marc

    Tor is currently one of the more popular systems for anonymizing near real-time communications on the Internet. Recently, Borisov et al. proposed a denial of service based attack on Tor (and related systems) that significantly increases the probability of compromising the anonymity provided. In this paper, we propose an algorithm for detecting such attacks and examine the effectiveness of the obvious approach to evading such detection. We implement a simplified version of the detection algorithm and study whether the attack may be in progress on the current Tor network. Our preliminary measurements indicate that the attack was probably not implemented during the period we observed the network.

  1. Off-Path Attacking the Web

    CERN Document Server

    Gilad, Yossi

    2012-01-01

    We show how an off-path (spoofing-only) attacker can perform cross-site scripting (XSS), cross-site request forgery (CSRF) and site spoofing/defacement attacks, without requiring vulnerabilities in either web-browser or server and circumventing known defenses. Attacker can also launch devastating denial of service (DoS) attacks, even when the connection between the client and the server is secured with SSL/TLS. The attacks are practical and require a puppet (malicious script in browser sandbox) running on a the victim client machine, and attacker capable of IP-spoofing on the Internet. Our attacks use a technique allowing an off-path attacker to learn the sequence numbers of both client and server in a TCP connection. The technique exploits the fact that many computers, in particular those running Windows, use a global IP-ID counter, which provides a side channel allowing efficient exposure of the connection sequence numbers. We present results of experiments evaluating the learning technique and the attacks ...

  2. Improved Collision Attack on Hash Function MD5

    Institute of Scientific and Technical Information of China (English)

    Jie Liang; Xue-Jia Lai

    2007-01-01

    In this paper, we present a fast attack algorithm to find two-block collision of hash function MD5.The algorithm is based on the two-block collision differential path of MD5 that was presented by Wang et al.In the Conference EUROCRYPT 2005.We found that the derived conditions for the desired collision differential path were not sufficient to guarantee the path to hold and that some conditions could be modified to enlarge the collision set.By using technique of small range searching and omitting the computing steps to check the characteristics in the attack algorithm, we can speed up the attack of MD5 efficiently.Compared with the Advanced Message Modification technique presented by Wang et al.,the small range searching technique can correct 4 more conditions for the first iteration differential and 3 more conditions for the second iteration differential, thus improving the probability and the complexity to find collisions.The whole attack on the MD5 can be accomplished within 5 hours using a PC with Pentium4 1.70GHz CPU.

  3. Hello Flood Attack and its Countermeasures in Wireless Sensor Networks

    Directory of Open Access Journals (Sweden)

    Virendra Pal Singh

    2010-05-01

    Full Text Available Wireless sensor network have emerged as an important application of the ad-hoc networks paradigm, such as for monitoring physical environment. These sensor networks have limitations of system resources like battery power, communication range and processing capability. Low processing power and wireless connectivity make such networks vulnerable to various types of network attacks. One of them is hello flood attack, in which an adversary, which is not a legal node in the network, can flood hello request to any legitimate node and break the security of WSN. The current solutions for these types of attacks are mainly cryptographic, which suffer from heavy computational complexity. Hence they are less suitable for wireless sensor networks. In this paper a method based on signal strength has been proposed to detect and prevent hello flood attack. Nodes have been classified as friend and stranger based on the signal strength. Short client puzzles that require less computational power and battery power have been used to check the validity of suspicious nodes.

  4. Agent Based Preventive Measure for UDP Flood Attack in DDoS Attacks

    Directory of Open Access Journals (Sweden)

    AARTI SINGH,

    2010-08-01

    Full Text Available Distributed Denial-of-Service (DDoS attack is an attack which makes victim resources and services unavailable to its intended users. In particular, User Datagram Protocol (UDP flood attack in DDoS attacks is a method causing host based denial of service. It occurs when attacker sends UDP packets to a random port on the victim system,causing responses to be sent to forged IP address. The basic thrust of this paper is agent based solution for UDP lood attack because software agent technology seems to be a strong candidate for defending DDoS attacks and very few researchers have thought of deploying agents towards providing solution for UDP attack earlier.

  5. Development of an Attack-Resistant and Secure SCADA System using WSN, MANET, and Internet

    Directory of Open Access Journals (Sweden)

    N. Rajesh kumar

    2014-06-01

    Full Text Available Industrial Control Systems (ICS are open to security attacks when they are integrated with IT systems and wireless technologies for enhanced processing and remote control. These Critical Infrastructures (CIs are highly important as they provide service for an entire nation and causes serious danger even when interrupted for a while. Some of the common SCADA (Supervisory Control and Data Acquisition systems involve energy and water distribution systems. In this paper, the energy distribution SCADA system comprising several substations is considered. A secure framework is proposed that combines the energy control system with Wireless Sensor Networks (WSNs, Mobile Ad hoc Networks (MANETs, and the Internet, providing anomaly prevention and status management. SCADA attacks occur at the state estimators of the power systems which are used to route power flows and detect faulty devices. These estimators are located in the SCADA control center which is a sensitive area and measurements must be transmitted over a secure communication channel. The attack-resistance of the SCADA system is enhanced by increasing the hardness and complexity of the attack problem. The Attack-Resistant and Secure (ARS SCADA system is evaluated against existing techniques like NAMDIA (Network-Aware Mitigation of Data Integrity Attacks, Retrofit IDS (Intrusion Detection System, and CSBF (Critical State-Based Filtering for enhancing the attack-resistance and security of SCADA systems. It is found that the performance of ARS SCADA system is good compared to the existing methods in terms of maximum normalized attack impact and latency.

  6. Corrosion inhibitor development for slightly sour environments with oxygen intrusion

    Energy Technology Data Exchange (ETDEWEB)

    Wylde, J.; Wang, H.; Li, J. [Clariant Oil Services North America, Calgary, AB (Canada)

    2009-07-01

    This presentation reported on a study that examined the effect of oxygen on the inhibition of carbon steel in slightly sour corrosion, and the initiation and propagation of localized attack. Oxygen can enter sour water injection systems through the vapor space in storage tanks and process system. Oxygen aggravates the corrosion attack by participating in the cathodic reaction under full or partial diffusion control. Laboratory testing results were reported in this presentation along with the development of corrosion inhibitors for such a slightly sour system. Bubble testing cells were used with continuous H{sub 2}/CO{sub 2} mixture gas sparging and occasional oxygen intrusion of 2 to 4 hours during a week long test. Linear polarization resistance (LPR) measurements and weight loss corrosion coupons were used to quantify the corrosion attack. The findings were presented in terms of the magnitude of localized attacks at different oxygen concentrations and intrusion periods, with and without the presence of corrosion inhibitors. tabs., figs.

  7. A Efficient Approach for Password Attacks

    Directory of Open Access Journals (Sweden)

    I. Naga Geethika

    2014-03-01

    Full Text Available Online password guessing attacks has emerged as a major problem in password based systems. To avoid this we implemented many solutions day by day to restrict bruteforce attacks and password guessing attacks and dictionary attacks. The approach in this paper is that using of mobile alert messages and giving options to the mobile user for more security that will intimate admin that someone is trying to hack his email. The legal users/attackers are challenged to answer the code that is sent to the mobile to retrieve the login page when the number of failed login attempts from a single machine crosses certain threshold value. This protocol uses either the IP addresses of the machines or the browser cookies, or both to identify the machines from which successful logins are made previously. A machine is said to be known when a successful login is made from it and its IP address is added to whitelist. The main goal of this protocol is to limit the attackers with a few failed login attempts made from each unknown machine and forcing them to challenge the security options. Attackers can have a threshold value (For ex 5 which is Whenever a user/attacker types an invalid username.

  8. Panic attacks simulate presence of somatic illnesses

    Directory of Open Access Journals (Sweden)

    Latas Milan

    2009-01-01

    Full Text Available Introduction. Panic attacks are characterized with sudden attacks of anxiety with numerous somatic symptoms, such as palpitations, tachycardia, tachypnea, nausea, vertigo. The objective of this study was to analyze symptoms of panic attacks in patients with panic disorder, especially, to determine the specific relationship of somatic and neurological symptoms of panic attacks in boundaries of somatic systems. Material and methods. The study sample consisted of 97 patients with primary diagnosis of panic disorder, without any acute, severe and unstable somatic illness. The presence and frequency of symptoms of panic attacks were estimated by the Panic Disorder Questionnaire. Results. The study results indicate that the most frequent symptoms of panic attacks were cardiological signs (heart pounding or racing and trembling, followed by unsteady and fainting feeling symptoms, sweating, respiratory symptoms and gastroenterological symptoms. The results of correlation analyses indicate that symptoms of panic attacks classified into cardio-vascular, gastro-enterological, respiratory and neuro-otological systems show statistically significant correlations. Conclusion. The results of analyses of symptoms of panic attacks point to their intercorrelation. This specific association of the symptoms, if they are examined on their own in the patients, could lead to false clinical manifestation of some somatic illness. Therefore, it is necessary to analyze adequately and make the proper differential diagnosis of patients with panic disorder.

  9. Fast Collision Attack on MD5

    NARCIS (Netherlands)

    Stevens, M.M.J.

    2006-01-01

    In this paper, we present an improved attack algorithm to find two-block collisions of the hash function MD5. The attack uses the same differential path of MD5 and the set of sufficient conditions that was presented by Wang et al. We present a new technique which allows us to deterministically fulfi

  10. Rotational Rebound Attacks on Reduced Skein

    DEFF Research Database (Denmark)

    Khovratovich, Dmitry; Nikolic, Ivica; Rechberger, Christian

    In this paper we combine a recent rotational cryptanalysis with the rebound attack, which results in the best cryptanalysis of Skein, a candidate for the SHA-3 competition. The rebound attack approach was so far only applied to AES-like constructions. For the first time, we show that this approach...

  11. The cost of attack in competing networks.

    Science.gov (United States)

    Podobnik, B; Horvatic, D; Lipic, T; Perc, M; Buldú, J M; Stanley, H E

    2015-11-01

    Real-world attacks can be interpreted as the result of competitive interactions between networks, ranging from predator-prey networks to networks of countries under economic sanctions. Although the purpose of an attack is to damage a target network, it also curtails the ability of the attacker, which must choose the duration and magnitude of an attack to avoid negative impacts on its own functioning. Nevertheless, despite the large number of studies on interconnected networks, the consequences of initiating an attack have never been studied. Here, we address this issue by introducing a model of network competition where a resilient network is willing to partially weaken its own resilience in order to more severely damage a less resilient competitor. The attacking network can take over the competitor's nodes after their long inactivity. However, owing to a feedback mechanism the takeovers weaken the resilience of the attacking network. We define a conservation law that relates the feedback mechanism to the resilience dynamics for two competing networks. Within this formalism, we determine the cost and optimal duration of an attack, allowing a network to evaluate the risk of initiating hostilities. PMID:26490628

  12. Automated Detection System for SQL Injection Attacks

    Directory of Open Access Journals (Sweden)

    Dr K.V.N.Sunitha

    2010-10-01

    Full Text Available Many software systems have evolved to include a Web-based component that makes them available to the public via the Internet and can expose them to a variety of Web-based attacks. One of these attacks is SQL Injection vulnerability (SQLIV, which can give attackers unrestricted access to the databases that underlie Web applications and has become increasingly frequent and serious. The intent is that Web applications will limit the kinds of queries that can be generated to a safe subset of all possible queries, regardless of what input users provide. SQL Injection attacks are possible due to the design drawbacks of the web sites, which interact with back-end databases. Successful attacks may damage more. We introduce a system that deals with new automated technique for preventing SQLIA based on the novel concept of regular expressions is to detect SQL Injection attacks. The proposed system can detect the attacks that are from Internet and Insider Attacks, by analyzing the packets of the network servers.

  13. Pediatric hereditary angioedema due to C1-inhibitor deficiency

    Directory of Open Access Journals (Sweden)

    Farkas Henriette

    2010-07-01

    Full Text Available Abstract Hereditary angioedema (HAE resulting from the deficiency of the C1 inhibitor (C1-INH is a rare, life-threatening disorder. It is characterized by attacks of angioedema involving the skin and/or the mucosa of the upper airways, as well as the intestinal mucosa. In approximately 50 per cent of cases, clinical manifestations may appear during childhood. The complex management of HAE in pediatric patients is in many respects different from the management of adults. Establishing the diagnosis early, preferably before the onset of clinical symptoms, is essential in cases with a positive family history. Complement studies usually afford accurate diagnosis, whereas molecular genetics tests may prove helpful in uncertain cases. Appropriate therapy, supported by counselling, suitable modification of lifestyle, and avoidance of triggering factors (which primarily include mechanical trauma, mental stress and airway infections in children may spare the patient unnecessary surgery and may prevent mortality. Prompt control of edematous attacks, short-term prophylaxis and intermittent therapy are recommended as the primary means for the management of pediatric cases. Medicinal products currently used for the treatment of children with hereditary angioedema include antifibrinolytics, attenuated androgens, and C1-INH replacement therapy. Current guidelines favour antifibrinolytics for long-term prophylaxis because of their favorable safety profile but efficacy may be lacking. Attenuated androgens administered in the lowest effective dose are another option. C1-INH replacement therapy is also an effective and safe agent for children. Regular monitoring and follow-up of patients are necessary.

  14. Evaluating Deterioration of Concrete by Sulfate Attack

    Institute of Scientific and Technical Information of China (English)

    2007-01-01

    Effects of factors such as water to cement ratio, fly ash and silica fume on the resistance of concrete to sulfate attack were investigated by dry-wet cycles and immersion method. The index of the resistance to sulfate attack was used to evaluate the deterioration degree of concrete damaged by sulfate. The relationship between the resistance of concrete to sulfate attack and its permeability/porosity were analyzed as well as its responding mechanism. Results show that the depth of sulfate crystal attack from surface to inner of concrete can be reduced by decreasing w/c and addition of combining fly ash with silica fume. The variation of relative elastic modulus ratio and relative flexural strength ratio of various specimens before and after being subjected to sulfate attack was compared.

  15. Automatic Classification of Attacks on IP Telephony

    Directory of Open Access Journals (Sweden)

    Jakub Safarik

    2013-01-01

    Full Text Available This article proposes an algorithm for automatic analysis of attack data in IP telephony network with a neural network. Data for the analysis is gathered from variable monitoring application running in the network. These monitoring systems are a typical part of nowadays network. Information from them is usually used after attack. It is possible to use an automatic classification of IP telephony attacks for nearly real-time classification and counter attack or mitigation of potential attacks. The classification use proposed neural network, and the article covers design of a neural network and its practical implementation. It contains also methods for neural network learning and data gathering functions from honeypot application.

  16. Combating Memory Corruption Attacks On Scada Devices

    Science.gov (United States)

    Bellettini, Carlo; Rrushi, Julian

    Memory corruption attacks on SCADA devices can cause significant disruptions to control systems and the industrial processes they operate. However, despite the presence of numerous memory corruption vulnerabilities, few, if any, techniques have been proposed for addressing the vulnerabilities or for combating memory corruption attacks. This paper describes a technique for defending against memory corruption attacks by enforcing logical boundaries between potentially hostile data and safe data in protected processes. The technique encrypts all input data using random keys; the encrypted data is stored in main memory and is decrypted according to the principle of least privilege just before it is processed by the CPU. The defensive technique affects the precision with which attackers can corrupt control data and pure data, protecting against code injection and arc injection attacks, and alleviating problems posed by the incomparability of mitigation techniques. An experimental evaluation involving the popular Modbus protocol demonstrates the feasibility and efficiency of the defensive technique.

  17. Rotational Rebound Attacks on Reduced Skein

    DEFF Research Database (Denmark)

    Khovratovich, Dmitry; Nikolic, Ivica; Rechberger, Christian

    2010-01-01

    In this paper we combine a recent rotational cryptanalysis with the rebound attack, which results in the best cryptanalysis of Skein, a candidate for the SHA-3 competition. The rebound attack approach was so far only applied to AES-like constructions. For the first time, we show that this approach...... Threefish cipher. The new techniques include an analytical search for optimal input values in the rotational cryptanalysis, which allows to extend the outbound phase of the attack with a precomputation phase, an approach never used in any rebound-style attack before. Further we show how to combine multiple...... inside-out computations and neutral bits in the inbound phase of the rebound attack, and give well-defined rotational distinguishers as certificates of weaknesses for the compression functions and block ciphers....

  18. New Multi-step Worm Attack Model

    CERN Document Server

    Robiah, Y; Shahrin, S; Faizal, M A; Zaki, M Mohd; Marliza, R

    2010-01-01

    The traditional worms such as Blaster, Code Red, Slammer and Sasser, are still infecting vulnerable machines on the internet. They will remain as significant threats due to their fast spreading nature on the internet. Various traditional worms attack pattern has been analyzed from various logs at different OSI layers such as victim logs, attacker logs and IDS alert log. These worms attack pattern can be abstracted to form worms' attack model which describes the process of worms' infection. For the purpose of this paper, only Blaster variants were used during the experiment. This paper proposes a multi-step worm attack model which can be extended into research areas in alert correlation and computer forensic investigation.

  19. SURVEY OF PACKET DROPPING ATTACK IN MANET

    Directory of Open Access Journals (Sweden)

    A.Janani

    2014-03-01

    Full Text Available Mobile Ad-hoc NETwork (MANET is an application of wireless network with self-configuring mobile nodes. MANET does not require any fixed infrastructure. Its development never has any threshold range. Nodes in MANET can communicate with each other if and only if all the nodes are in the same range. This wide distribution of nodes makes MANET vulnerable to various attacks, packet dropping attack or black hole attack is one of the possible attack. It is very hard to detect and prevent. To prevent from packet dropping attack, detection of misbehavior links and selfish nodes plays a vital role in MANETs. In this paper, a omprehensive investigation on detection of misbehavior links and malicious nodes is carried out.

  20. Use of Attack Graphs in Security Systems

    Directory of Open Access Journals (Sweden)

    Vivek Shandilya

    2014-01-01

    Full Text Available Attack graphs have been used to model the vulnerabilities of the systems and their potential exploits. The successful exploits leading to the partial/total failure of the systems are subject of keen security interest. Considerable effort has been expended in exhaustive modeling, analyses, detection, and mitigation of attacks. One prominent methodology involves constructing attack graphs of the pertinent system for analysis and response strategies. This not only gives the simplified representation of the system, but also allows prioritizing the security properties whose violations are of greater concern, for both detection and repair. We present a survey and critical study of state-of-the-art technologies in attack graph generation and use in security system. Based on our research, we identify the potential, challenges, and direction of the current research in using attack graphs.

  1. A Scalable Approach to Analyzing Network Security using Compact Attack Graphs

    Directory of Open Access Journals (Sweden)

    Feng Chen

    2010-05-01

    Full Text Available The compact attack graphs implicitly reveal the threat of sophisticated multi-step attacks by enumerating possible sequences of exploits leading to the compromising given critical resources in enterprise networks with thousands of hosts. For security analysts, the challenge is how to analyze the complex attack graphs with possible ten thousands of nodes for defending the security of network. In the paper, we will essentially discuss three issues about it. The first is to compute non-loop attack paths with the distance less than the given number that the real attacker may take practically in realistic attack scenarios. The second is how to measure security risk of the given critical resources.  The third is to find the solution to removing vulnerabilities in such a way that given critical resources cannot be compromised while the cost for such removal incurs the least cost. We propose the scalable approach to solve the above three issues respectively. The approach is proved to have a polynomial time complexity and can scale to the attack graphs with ten thousands of nodes corresponding large enterprise networks.

  2. The robustness of multiplex networks under layer node-based attack

    Science.gov (United States)

    Zhao, Da-Wei; Wang, Lian-Hai; Zhi, Yong-Feng; Zhang, Jun; Wang, Zhen

    2016-04-01

    From transportation networks to complex infrastructures, and to social and economic networks, a large variety of systems can be described in terms of multiplex networks formed by a set of nodes interacting through different network layers. Network robustness, as one of the most successful application areas of complex networks, has attracted great interest in a myriad of research realms. In this regard, how multiplex networks respond to potential attack is still an open issue. Here we study the robustness of multiplex networks under layer node-based random or targeted attack, which means that nodes just suffer attacks in a given layer yet no additional influence to their connections beyond this layer. A theoretical analysis framework is proposed to calculate the critical threshold and the size of giant component of multiplex networks when nodes are removed randomly or intentionally. Via numerous simulations, it is unveiled that the theoretical method can accurately predict the threshold and the size of giant component, irrespective of attack strategies. Moreover, we also compare the robustness of multiplex networks under multiplex node-based attack and layer node-based attack, and find that layer node-based attack makes multiplex networks more vulnerable, regardless of average degree and underlying topology.

  3. Detection Block Model for SQL Injection Attacks

    Directory of Open Access Journals (Sweden)

    Diksha G. Kumar

    2014-10-01

    Full Text Available With the rapid development of Internet, more and more organizations connect their databases to the Internet for resource sharing. However, due to developers' lack of knowledge of all possible attacks, web applications become vulnerable to multiple attacks. Thus the network databases could face multiple threats. Web applications generally consist of a three tier architecture where database is in the third pole, which is the most valuable asset in any organization. SQL injection is an attack technique in which specially crafted input string is entered in user input field. It is submitted to server and result is returned to the user. In SQL injection vulnerability, the database server is forced to execute malicious operations which may cause the data loss or corruption, denial of access, and unauthentic access to sensitive data by crafting specific inputs. An attacker can directly compromise the database, and that is why this is a most threatening web attack. SQL injection attack occupies first position in top ten vulnerabilities as specified by Open Web Application Security Project. It is probably the most common Website vulnerability today. Current scenarios which provide solutions to SQL injection attack either have limited scope i.e. can’t be implemented across all platforms, or do not cover all types of SQL injection attacks. In this work we implement Message Authentication Code (MAC based solution against SQL injection attacks. The model works both on client and server side. Client side implements a filter function and server side is based on information theory. MAC of static and dynamic queries is compared to detect SQL injection attack.

  4. Research on First Attack Probability Model of an Attacker Level Bombing Anti-air Radars

    Institute of Scientific and Technical Information of China (English)

    LUO Peng-cheng; MU Fu-ling; ZHOU Jing-lun

    2007-01-01

    The paper mainly studies the first attack probability (FAP) of an attacker level bombing anti-air radars through analyzing the radiant point orientation and attack (RPOA) process of attackers. Firstly, the searching target process is analyzed, and a corresponding target finding model is brought forward. Secondly, the target approaching process is concretely analyzed when the attacker levelly bombs the anti-air radar, and a corresponding target approaching model is presented. Finally, a demonstration is given to analyze the major factors in the model and prove its validity.

  5. Quantum attack-resistent certificateless multi-receiver signcryption scheme.

    Directory of Open Access Journals (Sweden)

    Huixian Li

    Full Text Available The existing certificateless signcryption schemes were designed mainly based on the traditional public key cryptography, in which the security relies on the hard problems, such as factor decomposition and discrete logarithm. However, these problems will be easily solved by the quantum computing. So the existing certificateless signcryption schemes are vulnerable to the quantum attack. Multivariate public key cryptography (MPKC, which can resist the quantum attack, is one of the alternative solutions to guarantee the security of communications in the post-quantum age. Motivated by these concerns, we proposed a new construction of the certificateless multi-receiver signcryption scheme (CLMSC based on MPKC. The new scheme inherits the security of MPKC, which can withstand the quantum attack. Multivariate quadratic polynomial operations, which have lower computation complexity than bilinear pairing operations, are employed in signcrypting a message for a certain number of receivers in our scheme. Security analysis shows that our scheme is a secure MPKC-based scheme. We proved its security under the hardness of the Multivariate Quadratic (MQ problem and its unforgeability under the Isomorphism of Polynomials (IP assumption in the random oracle model. The analysis results show that our scheme also has the security properties of non-repudiation, perfect forward secrecy, perfect backward secrecy and public verifiability. Compared with the existing schemes in terms of computation complexity and ciphertext length, our scheme is more efficient, which makes it suitable for terminals with low computation capacity like smart cards.

  6. Quantum attack-resistent certificateless multi-receiver signcryption scheme.

    Science.gov (United States)

    Li, Huixian; Chen, Xubao; Pang, Liaojun; Shi, Weisong

    2013-01-01

    The existing certificateless signcryption schemes were designed mainly based on the traditional public key cryptography, in which the security relies on the hard problems, such as factor decomposition and discrete logarithm. However, these problems will be easily solved by the quantum computing. So the existing certificateless signcryption schemes are vulnerable to the quantum attack. Multivariate public key cryptography (MPKC), which can resist the quantum attack, is one of the alternative solutions to guarantee the security of communications in the post-quantum age. Motivated by these concerns, we proposed a new construction of the certificateless multi-receiver signcryption scheme (CLMSC) based on MPKC. The new scheme inherits the security of MPKC, which can withstand the quantum attack. Multivariate quadratic polynomial operations, which have lower computation complexity than bilinear pairing operations, are employed in signcrypting a message for a certain number of receivers in our scheme. Security analysis shows that our scheme is a secure MPKC-based scheme. We proved its security under the hardness of the Multivariate Quadratic (MQ) problem and its unforgeability under the Isomorphism of Polynomials (IP) assumption in the random oracle model. The analysis results show that our scheme also has the security properties of non-repudiation, perfect forward secrecy, perfect backward secrecy and public verifiability. Compared with the existing schemes in terms of computation complexity and ciphertext length, our scheme is more efficient, which makes it suitable for terminals with low computation capacity like smart cards. PMID:23967037

  7. Corrosion inhibitors

    International Nuclear Information System (INIS)

    In this paper, we briefly describe the characteristics, cost and electrochemical nature of the corrosion phenomena as well as some of the technologies that are currently employed to minimize its effect. The main subject of the paper however, deals with the description, classification and mechanism of protection of the so-called corrosion inhibitors. Examples of the use of these substances in different aggressive environments are also presented as means to show that these compounds, or their combination, can in fact be used as excellent and relatively cheap technologies to control the corrosion of some metals. In the last part of the paper, the most commonly used techniques to evaluate the efficiency and performance of corrosion inhibitors are presented as well as some criteria to make a careful and proper selection of a corrosion inhibitor technology in a given situation. (Author) 151 refs

  8. Crystal structure of cytochrome P450 14α-sterol demethylase (CYP51) from Mycobacterium tuberculosis in complex with azole inhibitors

    OpenAIRE

    Larissa M. Podust; Poulos, Thomas L.; Waterman, Michael R.

    2001-01-01

    Cytochrome P450 14α-sterol demethylases (CYP51) are essential enzymes in sterol biosynthesis in eukaryotes. CYP51 removes the 14α-methyl group from sterol precursors such as lanosterol, obtusifoliol, dihydrolanosterol, and 24(28)-methylene-24,25-dihydrolanosterol. Inhibitors of CYP51 include triazole antifungal agents fluconazole and itraconazole, drugs used in treatment of topical and systemic mycoses. The 2.1- and 2.2-Å crystal structures reported here for 4-phen...

  9. Characterization of the interface structure of enzyme-inhibitor complex by using hydrogen-deuterium exchange and electrospray ionization Fourier transform ion cyclotron resonance mass spectrometry.

    OpenAIRE

    Akashi, S.; Takio, K

    2000-01-01

    We investigated the interaction between a thiol protease inhibitor, cystatin, and its target enzyme, papain, by hydrogen-deuterium (H/D) exchange in conjunction with successive analysis by collision-induced dissociation (CID) in an rf-only hexapole ion guide with electrospray ionization-Fourier transform ion cyclotron resonance mass spectrometry (ESI-FTICR MS). The deuterium incorporation into backbone amide hydrogens of cystatin was analyzed at different time points in the presence or absenc...

  10. Combining High-Level and Low-Level Approaches to Evaluate Software Implementations Robustness Against Multiple Fault Injection Attacks

    OpenAIRE

    Rivière, Lionel; Potet, Marie-Laure; Le, Thanh-Ha; Bringer, Julien; Chabanne, Hervé; Puys, Maxime

    2014-01-01

    International audience Physical fault injections break security functionalities of algorithms by targeting their implementations. Software techniques strengthen such implementations to enhance their robustness against fault attacks. Exhaustively testing physical fault injections is time consuming and requires complex platforms. Simulation solutions are developed for this specific purpose. We chose two independent tools presented in 2014, the Laser Attack Robustness (Lazart) and the Embedde...

  11. Secure State Estimation For Cyber Physical Systems Under Sensor Attacks: A Satisfiability Modulo Theory Approach

    OpenAIRE

    Shoukry, Yasser; Nuzzo, Pierluigi; Puggelli, Alberto; Sangiovanni-Vincentelli, Alberto L.; Seshia, Sanjit A.; Tabuada, Paulo

    2014-01-01

    We address the problem of detecting and mitigating the effect of malicious attacks to the sensors of a linear dynamical system. We develop a novel, efficient algorithm that uses a Satisfiability-Modulo-Theory approach to isolate the compromised sensors and estimate the system state despite the presence of the attack, thus harnessing the intrinsic combinatorial complexity of the problem. By leveraging results from formal methods over real numbers, we provide guarantees on the soundness and com...

  12. Effect of elemental sulfur on the performance of nitrogen-based oilfield corrosion inhibitors

    Energy Technology Data Exchange (ETDEWEB)

    Kennelley, K.J.; Smith, S.N. (Exxon Production Research Co., Houston, TX (USA)); Ramanarayanan, T.A. (Exxon Research and Engineering Co., Annandale, NJ (USA))

    1990-02-01

    The effect of elemental sulfur on the corrosion of carbon steel at high temperature and pressure was quantified in an aqueous environment containing sour gas. Elemental sulfur accelerated corrosion of carbon steel, and the attack occurred predominantly in the vicinity of sulfur particles in direct contact with the metal surface. Imidazoline-based inhibitors were ineffective in controlling accelerated localized attack.

  13. Utilizing Probabilistic Linear Equations in Cube Attacks

    Institute of Scientific and Technical Information of China (English)

    Yuan Yao; Bin Zhang; Wen-Ling Wu

    2016-01-01

    Cube attacks, proposed by Dinur and Shamir at EUROCRYPT 2009, have shown huge power against stream ciphers. In the original cube attacks, a linear system of secret key bits is exploited for key recovery attacks. However, we find a number of equations claimed linear in previous literature actually nonlinear and not fit into the theoretical framework of cube attacks. Moreover, cube attacks are hard to apply if linear equations are rare. Therefore, it is of significance to make use of probabilistic linear equations, namely nonlinear superpolys that can be approximated by linear expressions effectively. In this paper, we suggest a way to test out and utilize these probabilistic linear equations, thus extending cube attacks to a wider scope. Concretely, we employ the standard parameter estimation approach and the sequential probability ratio test (SPRT) for linearity test in the preprocessing phase, and use maximum likelihood decoding (MLD) for solving the probabilistic linear equations in the online phase. As an application, we exhibit our new attack against 672 rounds of Trivium and reduce the number of key bits to search by 7.

  14. Radiological attacks and accidents. Medical consequences

    International Nuclear Information System (INIS)

    Probability of the occurrence of radiological attacks appears to be elevated after the terrorist attacks against the United States on September 11 in 2001. There are a lot of scenarios of radiological attack: simple radiological device, radiological disperse device (RDD or dirty bomb), attacks against nuclear reactor, improvised nuclear device, and nuclear weapons. Of these, RDD attack is the most probable scenario, because it can be easily made and can generate enormous psychological and economic damages. Radiological incidents are occurring to and fro in the world, including several cases of theft to nuclear facilities and unsuccessful terrorist attacks against them. Recently, a former Russian spy has allegedly been killed using polonium-210. In addition, serious radiological accidents have occurred in Chernobyl, Goiania, and Tokai-mura. Planning, preparation, education, and training exercise appear to be essential factors to cope with radiological attacks and accidents effectively without feeling much anxiety. Triage and psychological first aid are prerequisite to manage and provide effective medial care for mass casualties without inducing panic. (author)

  15. Forensics Investigation of Web Application Security Attacks

    Directory of Open Access Journals (Sweden)

    Amor Lazzez

    2015-02-01

    Full Text Available Nowadays, web applications are popular targets for security attackers. Using specific security mechanisms, we can prevent or detect a security attack on a web application, but we cannot find out the criminal who has carried out the security attack. Being unable to trace back an attack, encourages hackers to launch new attacks on the same system. Web application forensics aims to trace back and attribute a web application security attack to its originator. This may significantly reduce the security attacks targeting a web application every day, and hence improve its security. The aim of this paper is to carry out a detailed overview about the web application forensics. First, we define the web applications forensics, and we present a taxonomic structure of the digital forensics. Then, we present the methodology of a web application forensics investigation. After that, we illustrate the forensics supportive tools for a web application forensics investigation. After that, we present a detailed presentation of a set of the main considered web application forensics tools. Finally, we provide a comparison of the main considered web application forensics tools.

  16. Smart Grid Integrity Attacks: Characterizations and Countermeasures

    Energy Technology Data Exchange (ETDEWEB)

    Annarita Giani; Eilyan Bitar; Miles McQueen; Pramod Khargonekar; Kameshwar Poolla

    2011-10-01

    Real power injections at loads and generators, and real power flows on selected lines in a transmission network are monitored, transmitted over a SCADA network to the system operator, and used in state estimation algorithms to make dispatch, re-balance and other energy management system [EMS] decisions. Coordinated cyber attacks of power meter readings can be arranged to be undetectable by any bad data detection algorithm. These unobservable attacks present a serious threat to grid operations. Of particular interest are sparse attacks that involve the compromise of a modest number of meter readings. An efficient algorithm to find all unobservable attacks [under standard DC load flow approximations] involving the compromise of exactly two power injection meters and an arbitrary number of power meters on lines is presented. This requires O(n2m) flops for a power system with n buses and m line meters. If all lines are metered, there exist canonical forms that characterize all 3, 4, and 5-sparse unobservable attacks. These can be quickly detected in power systems using standard graph algorithms. Known secure phase measurement units [PMUs] can be used as countermeasures against an arbitrary collection of cyber attacks. Finding the minimum number of necessary PMUs is NP-hard. It is shown that p + 1 PMUs at carefully chosen buses are sufficient to neutralize a collection of p cyber attacks.

  17. Activation of the ficolin-lectin pathway during attacks of hereditary angioedema

    DEFF Research Database (Denmark)

    Csuka, Dorottya; Munthe-Fog, Lea; Hein, Estrid;

    2014-01-01

    enrolled. We analyzed blood samples drawn during attacks, and obtained 35 samples from the same patients during symptom-free periods. The serum levels of ficolin-2, ficolin-3, MASP-2, ficolin-3/MASP-2 complex, C1-INH, and C4, as well as the extent of ficolin-3-mediated terminal complement complex (FCN3-TCC......) deposition, were measured using ELISA-based methods. RESULTS: Levels of MASP-2 and of the ficolin-3/MASP-2 complex were elevated (P < .0001 and .033, respectively), whereas that of FCN3-TCC was lower (P < .0001) during attacks than during the symptom-free period. During symptom-free periods, FCN3-TCC...

  18. Review Paper on Flooding Attack in MANET

    Directory of Open Access Journals (Sweden)

    Ruchita Meher,

    2014-01-01

    Full Text Available Mobile ad-hoc network (MANET is widely applicable in various areas like military services, civilian environments and emergency operations. The issues in MANET are broadcasting, clustering, mobility management, bandwidth management and power management. Broadcasting becomes an important issue in MANET for route information discovery. The different routing attacks in MANET are flooding, black hole, link spoofing and wormhole attack. In this paper we are representing works proposed by various author on flooding attack. Our contribution in this paper is that we have presented details comparison of various counter based schemes.

  19. RAPTOR: Routing Attacks on Privacy in Tor

    OpenAIRE

    Sun, Yixin; Edmundson, Anne; Vanbever, Laurent; Li, Oscar; Rexford, Jennifer; Chiang, Mung; Mittal, Prateek

    2015-01-01

    The Tor network is a widely used system for anonymous communication. However, Tor is known to be vulnerable to attackers who can observe traffic at both ends of the communication path. In this paper, we show that prior attacks are just the tip of the iceberg. We present a suite of new attacks, called Raptor, that can be launched by Autonomous Systems (ASes) to compromise user anonymity. First, AS-level adversaries can exploit the asymmetric nature of Internet routing to increase the chance of...

  20. Security Attacks On MANET Routing Protocols

    Directory of Open Access Journals (Sweden)

    Chiragkumar V. Patel

    2013-10-01

    Full Text Available The paper gives idea about various routing protocols for Mobile Ad-Hoc Network against security issues. MANET is vulnerable to various security attacks due to its dynamically changing topology, self configurable nature and lack of centralized control. Malicious node can significantly degrade the performance and reliability of Ad-hoc Network routing protocols. From the survey it has been made quite clear that basic MANET protocols are vulnerable to various routing attacks. While Secure AODV (SAODV routing protocol performs quite well to improve performance in presence of security attack in MANET.

  1. Inhibition of alanine racemase by alanine phosphonate: detection of an imine linkage to pyridoxal 5'-phosphate in the enzyme-inhibitor complex by solid-state 15N nuclear magnetic resonance

    International Nuclear Information System (INIS)

    Inhibition of alanine racemase from the Gram-positive bacterium Bacillus stearothermophilus by (1-aminoethyl)phosphonic acid (Ala-P) proceeds via a two-step reaction pathway in which reactivation occurs very slowly. In order to determine the mechanism of inhibition, the authors have recorded low-temperature, solid-state 15N NMR spectra from microcrystals of the [15N]Ala-P-enzyme complex, together with spectra of a series of model compounds that provide the requisite database for the interpretation of the 15N chemical shifts. Proton-decoupled spectra of the microcrystals exhibit a line at ∼ 150 ppm, which conclusively demonstrates the presence of a protonated Ala-P-PLP aldimine and thus clarifies the structure of the enzyme-inhibitor complex. They also report the pH dependence of Ala-P binding to alanine racemase

  2. Attack graph generation method based on attack source excitation and attack atom filter%基于攻击源激发和攻击原子筛选的攻击图构建方法

    Institute of Scientific and Technical Information of China (English)

    焦波; 黄赪东; 黄飞; 李伟

    2013-01-01

    With the shortcoming of high time complexity and messy graphical presentation in large scale network application for attack graphs, this paper proposed a new generation method. The method visited network hosts using breadth-first traversing algorithm from attack sources based on target network model and attacker model, acquired attack atoms with attack patterns instantiation and confidential relationship for network connections between two hosts, filtered attack atoms through greedy principle and probability metric for attack atoms, and updated effect states of attack atoms. The experimental results show that the method can traverse once among hosts and filter attack atoms, not only has higher time efficiency, but also provides objective attack paths information for security events analyzing. The proposed method can meet the needs of attacking auxiliary decision, intrusion detection and network security evaluation in large scale network environment.%针对现有攻击图在大规模网络应用中存在的时间复杂性高和图形化展示凌乱等不足,提出一种新的构建方法:在目标网络模型和攻击者模型的基础上,以攻击源为起点广度遍历网络主机,针对主机间的网络连接,通过攻击模式实例化和信任关系获取攻击原子集,并根据攻击者贪婪原则和攻击原子发生概率计算尺度筛选攻击原子,同时更新攻击原子作用对象状态.通过实验分析,该方法面向网络主机实现一次遍历,筛选关键攻击原子,快速生成攻击图,不仅具有较高的时间效率,而且为安全事件分析提供客观的攻击路径信息.该方法能够满足大规模网络环境下的攻击辅助决策、入侵检测和网络安全评估等应用需求.

  3. Who Is at Risk for a Heart Attack?

    Science.gov (United States)

    ... on Twitter. Who Is at Risk for a Heart Attack? Certain risk factors make it more likely that ... This Content: NEXT >> Featured Video What is a heart attack? 05/22/2014 Describes how a heart attack ...

  4. Preparation data of the bromodomains BRD3(1, BRD3(2, BRD4(1, and BRPF1B and crystallization of BRD4(1-inhibitor complexes

    Directory of Open Access Journals (Sweden)

    Martin Hügle

    2016-06-01

    Full Text Available This article presents detailed purification procedures for the bromodomains BRD3(1, BRD3(2, BRD4(1, and BRPF1B. In addition we provide crystallization protocols for apo BRD4(1 and BRD4(1 in complex with numerous inhibitors. The protocols described here were successfully applied to obtain affinity data by isothermal titration calorimetry (ITC and by differential scanning fluorimetry (DSF as well as structural characterizations of BRD4(1 inhibitor complexes (PDB codes: PDB: 4LYI, PDB: 4LZS, PDB: 4LYW, PDB: 4LZR, PDB: 4LYS, PDB: 5D24, PDB: 5D25, PDB: 5D26, PDB: 5D3H, PDB: 5D3J, PDB: 5D3L, PDB: 5D3N, PDB: 5D3P, PDB: 5D3R, PDB: 5D3S, PDB: 5D3T. These data have been reported previously and are discussed in more detail elsewhere [1,2].

  5. Effect of Ergotamine on Headache and Migraine Attack Induced by Sindenafil Citrate

    OpenAIRE

    Rayka Sharifian; Ayoub Barzgarnejad; Fatemeh Ghanbarpour; Mehrdad Taghipour

    2015-01-01

    Sildenafil citrate is a potent vasodilatation agent to treat male erectile dysfunction and pulmonary hypertension. Among its adverse effects, headache and migraine attack have been widely reported. Here we focus on the effect of sildenafil, a selective inhibitor of CGMP hydrolyzing phosphodiesterase-5 (PDE-5), on headache induction. PDEs are large families of enzyme that break down cyclic nucleotides CGMP. When PDEs are inhibited, the levels of CGMP increase within vascular smooth muscle cell...

  6. Proposed Methodology for Securing Wireless LANs from Wormhole Attack

    OpenAIRE

    Patel, A K; Jaypalsinh. A. Gohil; D.T. Meva

    2010-01-01

    Wormhole attacks enable an attacker with limited Resources and no cryptographic material to wreak havoc on wireless networks. Initial research focused that this attack is possible only on Adhoc networks, but in present condition wormhole attack is possible on infrastructure based wireless LANs also. We propose architecture and analyze the possibility of wormhole attack along with a countermeasure to avoid such an attack. The proposed mechanism involves the shared information between commun...

  7. The role of sleep in migraine attacks

    Directory of Open Access Journals (Sweden)

    Elaine Inamorato

    1993-11-01

    Full Text Available Migraine attacks may be precipitated by sleep deprivation or excessive sleep and sleep is also associated with relief of migraine attacks. In view of this variable relationship we studied the records of 159 consecutive outpatients of our Headache Unit. In 121 records there was reference to sleep involvement, in 55% by a single form and in 45% by more than one form. When only one form was related, relief was most common (70%. 30% of that group of patients had the migraine attack precipitated by sleep, 24% by deprivation and 6% by sleep excess. When the effects of sleep were multiple, these effects were as expected logically in 65%: «in accordance» group (e.g attack precipitated by sleep deprivation and relieved by sleep onset. In a second group, («conflicting» where the involvement was not logical, there were three different combinations of sleep involvement, possibly due to more than one pathophysiological mechanism.

  8. Recovery of infrastructure networks after localised attacks

    Science.gov (United States)

    Hu, Fuyu; Yeung, Chi Ho; Yang, Saini; Wang, Weiping; Zeng, An

    2016-04-01

    The stability of infrastructure network is always a critical issue studied by researchers in different fields. A lot of works have been devoted to reveal the robustness of the infrastructure networks against random and malicious attacks. However, real attack scenarios such as earthquakes and typhoons are instead localised attacks which are investigated only recently. Unlike previous studies, we examine in this paper the resilience of infrastructure networks by focusing on the recovery process from localised attacks. We introduce various preferential repair strategies and found that they facilitate and improve network recovery compared to that of random repairs, especially when population size is uneven at different locations. Moreover, our strategic repair methods show similar effectiveness as the greedy repair. The validations are conducted on simulated networks, and on real networks with real disasters. Our method is meaningful in practice as it can largely enhance network resilience and contribute to network risk reduction.

  9. SECURING MANET FROM BLACKHOLE AND WORMHOLE ATTACKS

    Directory of Open Access Journals (Sweden)

    C.M.Vidhyapathi

    2013-06-01

    Full Text Available Mobile Ad-Hoc networks are self-configuring and self-organizing multi-hop wireless networks. They do not have any fixed infrastructure or centralized management. Due to this, the ad hoc networks are vulnerable to attacks. The routing protocol for MANET considered in this paper is AODV(Ad hoc On-demand Distance Vector Routing Protocol. Blackhole and Wormhole nodes are malicious nodeswhich degrade the performance of the network. They actively participate in the network and conform to forward packets to the destination. The Watchdog Mechanism is used to correct the network from both blackhole and wormhole attacks. The networks originally, with the attacks and after being prevented from attacks are compared on the basis of packets received, throughput, end-to-end delay and packet delivery ratio. ns2 software is used for the simulation.

  10. Women's Heart Disease: Heart Attack Symptoms

    Science.gov (United States)

    ... this page please turn JavaScript on. Feature: Women's Heart Disease Heart Attack Symptoms Past Issues / Winter 2014 Table ... NHLBI has uncovered some of the causes of heart diseases and conditions, as well as ways to prevent ...

  11. Karachi Commander Escapes Attack, 10 Dead

    Institute of Scientific and Technical Information of China (English)

    潘志强

    2004-01-01

    KARACHI: The army commander in the Pakistani city of Karachi narrowly① escaped assassination② yesterday when gunmen attacked his convoy③ with gunfire and a bomb, killing at least 10 and wounding his driver, officials said.

  12. Compiling symbolic attacks to protocol implementation tests

    Directory of Open Access Journals (Sweden)

    Michael Rusinowitch

    2013-07-01

    Full Text Available Recently efficient model-checking tools have been developed to find flaws in security protocols specifications. These flaws can be interpreted as potential attacks scenarios but the feasability of these scenarios need to be confirmed at the implementation level. However, bridging the gap between an abstract attack scenario derived from a specification and a penetration test on real implementations of a protocol is still an open issue. This work investigates an architecture for automatically generating abstract attacks and converting them to concrete tests on protocol implementations. In particular we aim to improve previously proposed blackbox testing methods in order to discover automatically new attacks and vulnerabilities. As a proof of concept we have experimented our proposed architecture to detect a renegotiation vulnerability on some implementations of SSL/TLS, a protocol widely used for securing electronic transactions.

  13. AN APPROACH OF DEFENDING AGAINST DDOS ATTACK

    Institute of Scientific and Technical Information of China (English)

    Wu Zhijun; Duan Haixin; Li Xing

    2006-01-01

    An approach of defending against Distributed Denial of Service (DDoS) attack based on flow model and flow detection is presented. The proposed approach can protect targets from DDoS attacking, and allow targets to provide good service to legitimate traffic under DDoS attacking, with fast reaction. This approach adopts the technique of dynamic comb filter, yields a low level of false positives of less than 1.5%,drops similar percentage of good traffic, about 1%, and passes neglectable percentage of attack bandwidth to the victim, less than 1.5%. The prototype of commercial product, D-fighter, is developed by implementing this proposed approach on Intel network processor platform IXP 1200.

  14. Desynchronization Attacks on RFID Security Protocols

    Directory of Open Access Journals (Sweden)

    Miaolei Deng

    2013-02-01

    Full Text Available The characteristics of radio frequency identification (RFID systems introduce growing security and privacy concerns. RFID systems need security protocols to provide confidentiality, user privacy, mutual authentication and etc. Many security protocols for the RFID system have been presented. This paper analyze several of the newest RFID security protocols which proposed by Niu et al., Fu et al. and Habibi et al. respectively form the security viewpoint of data desynchronization attack. These lightweight protocols were expected to proposed security protections for the RFID system and safeguard against almost all major attacks. However, we found that these RFID security protocols were vulnerable to the attack of data desynchronization. Based on strand spaces model, data desynchronization attacks on these protocols were analyzed and described. Furthermore, improvements to overcome the security vulnerabilities of two protocols presented by Niu et al. and Fu et al. were given.

  15. Dengue Virus May Bolster Zika's Attack

    Science.gov (United States)

    ... page: https://medlineplus.gov/news/fullstory_159534.html Dengue Virus May Bolster Zika's Attack Prior exposure to ... 23, 2016 (HealthDay News) -- Prior exposure to the dengue fever virus may increase the severity of Zika ...

  16. Fault attacks on two software countermeasures

    OpenAIRE

    Moro, Nicolas; Heydemann, Karine; Dehbaoui, Amine; Robisson, Bruno; Encrenaz, Emmanuelle

    2014-01-01

    Short version of the article "Experimental evaluation of two software countermeasures against fault attacks" presented at the 2014 IEEE Symposium on Hardware-Oriented Security and Trust (HOST) in May 2014.

  17. Self-administration of C1-inhibitor concentrate in patients with hereditary or acquired angioedema caused by C1-inhibitor deficiency

    NARCIS (Netherlands)

    Levi, M; Choi, G; Picavet, C; Hack, CE

    2006-01-01

    Background: Administration of C1-inhibitor concentrate is effective for prophylaxis and treatment of severe angioedema attacks caused by Cl-inhibitor deficiency. The concentrate should be administered intravenously and hence needs to be administered by health care professionals, which might cause co

  18. Advanced meet-in-the-middle preimage attacks: First results on full tiger, and improved results on MD4 and SHA-2

    DEFF Research Database (Denmark)

    Guo, Jian; Ling, San; Wang, Huaxiong; Rechberger, Christian

    2010-01-01

    We revisit narrow-pipe designs that are in practical use, and their security against preimage attacks. Our results are the best known preimage attacks on Tiger, MD4, and reduced SHA-2, with the result on Tiger being the first cryptanalytic shortcut attack on the full hash function. Our attacks runs...... in time 2188.8 for finding preimages, and 2188.2 for second-preimages. Both have memory requirement of order 28, which is much less than in any other recent preimage attacks on reduced Tiger. Using pre-computation techniques, the time complexity for finding a new preimage or second-preimage for MD4...

  19. Robustness and structure of complex networks

    Science.gov (United States)

    Shao, Shuai

    This dissertation covers the two major parts of my PhD research on statistical physics and complex networks: i) modeling a new type of attack -- localized attack, and investigating robustness of complex networks under this type of attack; ii) discovering the clustering structure in complex networks and its influence on the robustness of coupled networks. Complex networks appear in every aspect of our daily life and are widely studied in Physics, Mathematics, Biology, and Computer Science. One important property of complex networks is their robustness under attacks, which depends crucially on the nature of attacks and the structure of the networks themselves. Previous studies have focused on two types of attack: random attack and targeted attack, which, however, are insufficient to describe many real-world damages. Here we propose a new type of attack -- localized attack, and study the robustness of complex networks under this type of attack, both analytically and via simulation. On the other hand, we also study the clustering structure in the network, and its influence on the robustness of a complex network system. In the first part, we propose a theoretical framework to study the robustness of complex networks under localized attack based on percolation theory and generating function method. We investigate the percolation properties, including the critical threshold of the phase transition pc and the size of the giant component Pinfinity. We compare localized attack with random attack and find that while random regular (RR) networks are more robust against localized attack, Erdoḧs-Renyi (ER) networks are equally robust under both types of attacks. As for scale-free (SF) networks, their robustness depends crucially on the degree exponent lambda. The simulation results show perfect agreement with theoretical predictions. We also test our model on two real-world networks: a peer-to-peer computer network and an airline network, and find that the real-world networks

  20. CASE STUDY OF SQL INJECTION ATTACKS

    OpenAIRE

    Sonakshi*, Rakesh Kumar, Girdhar Gopal

    2016-01-01

    Today, most of the web applications are associated with database at back-end so there are possibilities of SQL injection attacks (SQLIA) on it. A number of preventive measures have also been discovered by various researchers to overcome this attack, but which measure is more convenient and provides fast access to application without compromising the security is also a major concern nowadays. This paper provides a clear distinction among different types of SQLIAs and how these can be performed...

  1. Compiling symbolic attacks to protocol implementation tests

    OpenAIRE

    Michael Rusinowitch; Ghazi Maatoug; Hatem Ghabri

    2013-01-01

    Recently efficient model-checking tools have been developed to find flaws in security protocols specifications. These flaws can be interpreted as potential attacks scenarios but the feasability of these scenarios need to be confirmed at the implementation level. However, bridging the gap between an abstract attack scenario derived from a specification and a penetration test on real implementations of a protocol is still an open issue. This work investigates an architecture for automatically g...

  2. Panic Attack during Elective Gastrointestinal Endoscopy

    OpenAIRE

    Charalampos Mitsonis; Nikolaos Dimopoulos; Marianna Zavrou; Vassiliki Psarra; Christos Giofkos; Christos Fiorakis; Athanasios Dimitriadis; Dimitrios Valavanis; Eleni Vousoura; Iannis Zervas; Efstathios Papavassiliou

    2011-01-01

    Background. Esophagogastroduodenoscopy (EGD) and colonoscopy (CS) can evoke anxiety, embarrassment, and discomfort. These concerns can culminate in panic attacks, which may traumatize patients and significantly decrease their compliance to the procedure. The objective of this study was to evaluate the relationship between preendoscopic anxiety and the possibility of a panic attack during an elective gastrointestinal endoscopy (EGE). Methods. The study population comprised of 79 Greek outpatie...

  3. Attacks in WEB Based Embedded Applications

    OpenAIRE

    C. Yaashuwanth; Ramesh, R.

    2010-01-01

    This paper deals with the issues related to embedded applications when they are implemented in internet. There are various attacks in embedded systems when implemented in the internet. These attacks have a negligible effect in the operating system which results in the decrease in the system performance. But in embedded system case, it has life and death consequence attached to it. Many of these embedded systems work in hazardous environment where a system failure results to catastrophic effec...

  4. Wireless Sensor Networks Attacks and Solutions

    OpenAIRE

    Alajmi, Naser

    2014-01-01

    A few years ago, wireless sensor networks (WSNs) used by only military. Now, we have seen many of organizations use WSNs for some purposes such as weather, pollution, traffic control, and healthcare. Security is becoming on these days a major concern for wireless sensor network. In this paper I focus on the security types of attacks and their detection. This paper anatomizes the security requirements and security attacks in wireless sensor networks. Also, indicate to the benchmarks for the se...

  5. Cluster headache attacks and multiple sclerosis

    OpenAIRE

    Gentile, Salvatore; Ferrero, Margherita; Vaula, Giovanna; Rainero, Innocenzo; Pinessi, Lorenzo

    2007-01-01

    We report the case of a patient who developed typical cluster headache attacks and was diagnosed as having multiple sclerosis (MS) at the same time. The headache attacks resolved after i.v. treatment with methylprednisolone. MR imaging showed a pontine demyelinating lesion involving the trigeminal nerve root inlet area, on the same side as the pain. The association between cluster headache and MS has been rarely described before. This case suggests that in patients with cluster headache neuro...

  6. Cyber Security Audit and Attack Detection Toolkit

    Energy Technology Data Exchange (ETDEWEB)

    Peterson, Dale

    2012-05-31

    This goal of this project was to develop cyber security audit and attack detection tools for industrial control systems (ICS). Digital Bond developed and released a tool named Bandolier that audits ICS components commonly used in the energy sector against an optimal security configuration. The Portaledge Project developed a capability for the PI Historian, the most widely used Historian in the energy sector, to aggregate security events and detect cyber attacks.

  7. Two Improved Multiple-Differential Collision Attacks

    OpenAIRE

    An Wang; Liji Wu; Zongyue Wang; Xuexin Zheng; Man Chen; Jing Ma

    2014-01-01

    In CHES 2008, Bogdanov proposed multiple-differential collision attacks which could be applied to the power analysis attacks on practical cryptographic systems. However, due to the effect of countermeasures on FPGA, there are some difficulties during the collision detection, such as local high noise and the lack of sampling points. In this paper, keypoints voting test is proposed for solving these problems, which can increase the success ratio from 35% to 95% on the example of one implementat...

  8. Various Database Attacks and its Prevention Techniques

    OpenAIRE

    K.A.VarunKumar; M.Prabakaran; Ajay Kaurav; S.Sibi Chakkaravarthy; Thiyagarajan, S; Pokala Venkatesh

    2014-01-01

    Increasing in the popularity of internet, the application of database also widely spread. There are some serious threats because of hackers done various attempts to steal the data in the database. Various attacks like Sql injection, Cross site scripting may change the information in the databases which decreases the truthfulness of the database. Intrusion detection system is used to detect whether the attack is carried on the database. In this paper we surveyed different types of database att...

  9. Private Circuits II versus Fault Injection Attacks

    OpenAIRE

    Rakotomalala, Henitsoa; Ngo, Xuan Thuy; Najm, Zakaria; Danger, Jean-Luc; Guilley, Sylvain

    2015-01-01

    —Cryptographic implementations are subject to physical attacks. Private circuits II is a proven protection against a strong attacker, able to read and write on a finite number of chosen internal nodes. In practice, side-channel analyses and fault injections are less accurate: typically, classical injection techniques (clock and power glitches, electromagnetic pulses, etc.) can be reproducible, but they do not allow to choose the targeted nodes (the situation is different for software dual-rai...

  10. Logical Modes of Attack in Argumentation Networks

    OpenAIRE

    Gabbay, Dov M.; Garcez, A. S. D. Avila

    2009-01-01

    This paper studies methodologically robust options for giving logical contents to nodes in abstract argumentation networks. It defines a variety of notions of attack in terms of the logical contents of the nodes in a network. General properties of logics are refined both in the object level and in the meta level to suit the needs of the application. The network-based system improves upon some of the attempts in the literature to define attacks in terms of defeasible proofs, the...

  11. Session Initiation Protocol Attacks and Challenges

    OpenAIRE

    Keshavarz, Hassan; Sattari, Mohammad Reza Jabbarpour; Noor, Rafidah Md

    2012-01-01

    In recent years, Session Initiation Protocol (SIP) has become widely used in current internet protocols. It is a text-based protocol much like Hyper Text Transport Protocol (HTTP) and Simple Mail Transport Protocol (SMTP). SIP is a strong enough signaling protocol on the internet for establishing, maintaining, and terminating session. In this paper the areas of security and attacks in SIP are discussed. We consider attacks from diverse related perspectives. The authentication schemes are comp...

  12. To mitigate Black-hole attack with CBDS in MANET

    Directory of Open Access Journals (Sweden)

    Navjot

    2015-06-01

    Full Text Available Mobile ad-hoc network is self configured network that consist of mobile nodes which communicate with each other. Distributed self-organized nature of this network makes it venerable to various attacks likes DOS attack, Black hole attack, wormhole attack and jamming attack etc. Blackhole attack is one of the serious attack in network in which information loss occur which degrades the performance of network. In this work black hole attack is detected with the help of CBDS (cooperative Bait Detection Algorithm and MD5 is used for the security purpose. This work is implemented in Network simulator and performance is checked on the bases of network parameters.

  13. Noncombatants and liability to be attacked in wars

    DEFF Research Database (Denmark)

    Lippert-Rasmussen, Kasper

    2013-01-01

    attack," I mean that S has forfeited his or her right not to be attacked by armed forces. Here, "liable" is used in a normative-cum-legal sense, not descriptively as it is when one says "some colors are liable to darken in perpetual shade," and "attack" is used passively, as an equivalent of be attacked...... mean to focus on intended, as opposed to incidental, attacks. Finally, although "attack" often implies initiation of a conflict ("I didn't attack him! He started it!"), it does not do so here. An unjust aggressor who initiates a conflict can be, and indeed very often is, liable to attack. All...

  14. Distinguishing attack and second-preimage attack on encrypted message authentication codes (EMAC)

    Science.gov (United States)

    Ariwibowo, Sigit; Windarta, Susila

    2016-02-01

    In this paper we show that distinguisher on CBC-MAC can be applied to Encrypted Message Authentication Code (EMAC) scheme. EMAC scheme in general is vulnerable to distinguishing attack and second preimage attack. Distinguishing attack simulation on AES-EMAC using 225 message modifications, no collision have been found. According to second preimage attack simulation on AES-EMAC no collision found between EMAC value of S1 and S2, i.e. no second preimage found for messages that have been tested. Based on distinguishing attack simulation on truncated AES-EMAC we found collision in every message therefore we cannot distinguish truncated AES-EMAC with random function. Second-preimage attack is successfully performed on truncated AES-EMAC.

  15. High angle of attack aerodynamics subsonic, transonic, and supersonic flows

    CERN Document Server

    Rom, Josef

    1992-01-01

    The aerodynamics of aircraft at high angles of attack is a subject which is being pursued diligently, because the modern agile fighter aircraft and many of the current generation of missiles must perform well at very high incidence, near and beyond stall. However, a comprehensive presentation of the methods and results applicable to the studies of the complex aerodynamics at high angle of attack has not been covered in monographs or textbooks. This book is not the usual textbook in that it goes beyond just presenting the basic theoretical and experimental know-how, since it contains reference material to practical calculation methods and technical and experimental results which can be useful to the practicing aerospace engineers and scientists. It can certainly be used as a text and reference book for graduate courses on subjects related to high angles of attack aerodynamics and for topics related to three-dimensional separation in viscous flow courses. In addition, the book is addressed to the aerodynamicist...

  16. Identifying optimal targets of network attack by belief propagation

    Science.gov (United States)

    Mugisha, Salomon; Zhou, Hai-Jun

    2016-07-01

    For a network formed by nodes and undirected links between pairs of nodes, the network optimal attack problem aims at deleting a minimum number of target nodes to break the network down into many small components. This problem is intrinsically related to the feedback vertex set problem that was successfully tackled by spin-glass theory and an associated belief propagation-guided decimation (BPD) algorithm [Zhou, Eur. Phys. J. B 86, 455 (2013), 10.1140/epjb/e2013-40690-1]. In the present work we apply the BPD algorithm (which has approximately linear time complexity) to the network optimal attack problem and demonstrate that it has much better performance than a recently proposed collective information algorithm [Morone and Makse, Nature 524, 65 (2015), 10.1038/nature14604] for different types of random networks and real-world network instances. The BPD-guided attack scheme often induces an abrupt collapse of the whole network, which may make it very difficult to defend.

  17. Monitoring of sulphate attack on hardened cement paste studied by synchrotron XRD

    Science.gov (United States)

    Stroh, J.; Meng, B.; Emmerling, F.

    2015-10-01

    The complex matter of external sulphate attack on cement-based construction materials is still not completely understood. The concentration of sulphate is a crucial factor for the formation of secondary phases and phase transitions of cement hydrates due to sulphate ingress into the microstructure. The sulphate attack on building materials for high and low sulphate concentrations was monitored by laboratory experiments. Hardened cement paste consisting of ordinary Portland cement (CEM I) were exposed to aqueous solutions of sodium sulphate for 18 months. Three sample compositions were used for this research, including different supplementary cementitious materials (SCM). The phase composition was determined for different time spans by high resolution synchrotron X-ray diffraction. Cross sections of exposed cement prisms were investigated as a representation of the microstructural profile. Based on the data, a temporal and spatial determination of the stages of the sulphate attack and the deterioration course was possible. Cement matrices blended with slag showed the highest resistance against sulphate attack.

  18. Blocking of SQL Injection Attacks by Comparing Static and Dynamic Queries

    Directory of Open Access Journals (Sweden)

    Raman Kumar

    2013-02-01

    Full Text Available Due to internet expansion web applications have now become a part of everyday life. As a result a number of incidents which exploit web application vulnerabilities are increasing. A large number of these incidents are SQL Injection attacks which are a serious security threat to databases which contain sensitive information, the leakage of which cause a large amount of loss. SQL Injection Attacks occur when an intruder changes the query structure by inserting any malicious input. There are a number of methods available to detect and prevent SQL Injection Attacks. But these are too complex to use. This paper proposes a very simple, effective and time saving technique to detect SQLIAs which uses combined static and dynamic analysis and also defines an attack other than existing classification of SQLIAs.

  19. Detection and Prevention of Gray Hole and Black Hole Attack in MANET

    Directory of Open Access Journals (Sweden)

    Deepali Raut

    2014-08-01

    Full Text Available An Ad hoc network is the network with no fixed infrastructure. There is no central administrator so any node can come and move in and outside of the network in a dynamic manner. This makes it more dynamic and complex which makes it more prone to attacks. They can attack either active or passive. Some effects of malicious nodes are Denial of service, Routing table overflow, Impersonation, Energy consumption, Information disclosure etc. A black hole attack node attracts all packets by falsely claiming a fresh route to the destination node and absorbs them without forwarding them to destination. In this work the effect of Black hole and Gray Hole attack on DSR protocol has been considered. Simulation has been performed on the basis of performance parameters and effect has been analyzed using NS2 simulator. 

  20. Pyrazole inhibitors of HMG-CoA reductase: an attempt to dramatically reduce synthetic complexity through minimal analog re-design.

    Science.gov (United States)

    Larsen, Scott D; Poel, Toni-Jo; Filipski, Kevin J; Kohrt, Jeffrey T; Pfefferkorn, Jeffrey A; Sorenson, Roderick J; Tait, Bradley D; Askew, Valerie; Dillon, Lisa; Hanselman, Jeffrey C; Lu, Gina H; Robertson, Andrew; Sekerke, Catherine; Kowala, Mark C; Auerbach, Bruce J

    2007-10-15

    An extraordinarily potent and hepatoselective class of HMG-CoA reductase inhibitors containing a pyrazole core was recently reported; however, its development was hampered by a long and difficult synthetic route. We attempted to circumvent this obstacle by preparing closely related analogs wherein the key dihydroxyheptanoic acid sidechain was tethered to the pyrazole core via an oxygen linker ('oxypyrazoles'). This minor change reduced the total number of synthetic steps from 14 to 7. Although the resulting analogs maintained much of the in vitro and cell activity of the pyrazoles, inferior in vivo activity precluded further development. Caco-2 cell permeability data suggest that enhanced cellular efflux of the oxypyrazoles relative to the pyrazoles may be responsible for the poor in vivo activity. PMID:17764936

  1. Crystallization and preliminary X-ray diffraction studies of a complex of extracellular lipase from Streptomyces rimosus with the inhibitor 3,4-dichloroisocoumarin

    International Nuclear Information System (INIS)

    A lipolytic enzyme of the SGNH-hydrolase family from S. rimosus was inhibited with 3,4-dichloroisocoumarin, crystallized and analyzed using X-ray diffraction. A recombinant lipase (triacylglycerol acylhydrolase; EC 3.1.1.3) from the bacterium Streptomyces rimosus was inhibited by the serine protease inhibitor 3,4-dichloroisocoumarin and crystallized by the hanging-drop vapour-diffusion method at 291 K. The crystals belonged to the monoclinic space group P21, with unit-cell parameters a = 38.1, b = 78.7, c = 56.6 Å, β = 104.5° and probably two molecules in the asymmetric unit. Diffraction data were collected to 1.7 Å resolution using synchrotron radiation on the XRD beamline of the Elettra synchrotron, Trieste, Italy

  2. Structure of Mycobacterium tuberculosis phosphopantetheine adenylyltransferase in complex with the feedback inhibitor CoA reveals only one active-site conformation

    International Nuclear Information System (INIS)

    The X-ray structure of phosphopantetheine adenylyltransferase (PPAT) from M. tuberculosis in complex with its feedback regulator coenzyme A (CoA) was determined to 2.11 Å resolution. Unlike previous X-ray structures of PPAT–CoA complexes from other bacteria, which showed two distinct conformations of bound CoA, only one conformation of bound CoA is observed in the M. tuberculosis PPAT–CoA complex. Phosphopantetheine adenylyltransferase (PPAT) catalyzes the penultimate step in the coenzyme A (CoA) biosynthetic pathway, reversibly transferring an adenylyl group from ATP to 4′-phosphopantetheine to form dephosphocoenzyme A (dPCoA). To complement recent biochemical and structural studies on Mycobacterium tuberculosis PPAT (MtPPAT) and to provide further insight into the feedback regulation of MtPPAT by CoA, the X-ray crystal structure of the MtPPAT enzyme in complex with CoA was determined to 2.11 Å resolution. Unlike previous X-ray crystal structures of PPAT–CoA complexes from other bacteria, which showed two distinct CoA conformations bound to the active site, only one conformation of CoA is observed in the MtPPAT–CoA complex

  3. The resilience of interdependent transportation networks under targeted attack

    CERN Document Server

    Zhang, Peng; Zhao, Zhuang; Li, Daqing; Lu, Guangquan; Wang, Yunpeng; Xiao, Jinghua

    2013-01-01

    Modern world builds on the resilience of interdependent infrastructures characterized as complex networks. Recently, a framework for analysis of interdependent networks has been developed to explain the mechanism of resilience in interdependent networks. Here we extend this interdependent network model by considering flows in the networks and study the system's resilience under different attack strategies. In our model, nodes may fail due to either overload or loss of interdependency. Under the interaction between these two failure mechanisms, it is shown that interdependent scale-free networks show extreme vulnerability. The resilience of interdependent SF networks is found in our simulation much smaller than single SF network or interdependent SF networks without flows.

  4. Structure of Mycobacterium tuberculosis phosphopantetheine adenylyltransferase in complex with the feedback inhibitor CoA reveals only one active-site conformation

    Energy Technology Data Exchange (ETDEWEB)

    Wubben, T.; Mesecar, A.D. (Purdue); (UIC)

    2014-10-02

    Phosphopantetheine adenylyltransferase (PPAT) catalyzes the penultimate step in the coenzyme A (CoA) biosynthetic pathway, reversibly transferring an adenylyl group from ATP to 4'-phosphopantetheine to form dephosphocoenzyme A (dPCoA). To complement recent biochemical and structural studies on Mycobacterium tuberculosis PPAT (MtPPAT) and to provide further insight into the feedback regulation of MtPPAT by CoA, the X-ray crystal structure of the MtPPAT enzyme in complex with CoA was determined to 2.11 {angstrom} resolution. Unlike previous X-ray crystal structures of PPAT-CoA complexes from other bacteria, which showed two distinct CoA conformations bound to the active site, only one conformation of CoA is observed in the MtPPAT-CoA complex.

  5. 3-Nitropropionic Acid is a Suicide Inhibitor of MitochondrialRespiration that, Upon Oxidation by Complex II, Forms a Covalent AdductWith a Catalytic Base Arginine in the Active Site of the Enzyme

    Energy Technology Data Exchange (ETDEWEB)

    Huang, Li-shar; Sun, Gang; Cobessi, David; Wang, Andy C.; Shen,John T.; Tung, Eric Y.; Anderson, Vernon E.; Berry, Edward A.

    2005-12-01

    We report three new structures of mitochondrial respiratory Complex II (succinate ubiquinone oxidoreductase, E.C. 1.3.5.1) at up to 2.1 {angstrom} resolution, with various inhibitors. The structures define the conformation of the bound inhibitors and suggest the residues involved in substrate binding and catalysis at the dicarboxylate site. In particular they support the role of Arg297 as a general base catalyst accepting a proton in the dehydrogenation of succinate. The dicarboxylate ligand in oxaloacetate-containing crystals appears to be the same as that reported for Shewanella flavocytochrome c treated with fumarate. The plant and fungal toxin 3-nitropropionic acid, an irreversible inactivator of succinate dehydrogenase, forms a covalent adduct with the side chain of Arg297. The modification eliminates a trypsin cleavage site in the flavoprotein, and tandem mass spectroscopic analysis of the new fragment shows the mass of Arg 297 to be increased by 83 Da and to have potential of losing 44 Da, consistent with decarboxylation, during fragmentation.

  6. 3-Nitropropionic Acid is a Suicide Inhibitor of Mitochondrial Respiration that, Upon Oxidation by Complex II, Forms a Covalent Adduct With a Catalytic Base Arginine in the Active Site of the Enzyme

    International Nuclear Information System (INIS)

    We report three new structures of mitochondrial respiratory Complex II (succinate ubiquinone oxidoreductase, E.C. 1.3.5.1) at up to 2.1 (angstrom) resolution, with various inhibitors. The structures define the conformation of the bound inhibitors and suggest the residues involved in substrate binding and catalysis at the dicarboxylate site. In particular they support the role of Arg297 as a general base catalyst accepting a proton in the dehydrogenation of succinate. The dicarboxylate ligand in oxaloacetate-containing crystals appears to be the same as that reported for Shewanella flavocytochrome c treated with fumarate. The plant and fungal toxin 3-nitropropionic acid, an irreversible inactivator of succinate dehydrogenase, forms a covalent adduct with the side chain of Arg297. The modification eliminates a trypsin cleavage site in the flavoprotein, and tandem mass spectroscopic analysis of the new fragment shows the mass of Arg 297 to be increased by 83 Da and to have potential of losing 44 Da, consistent with decarboxylation, during fragmentation

  7. 芳香酮曼尼希碱酸化缓蚀剂的合成及复配研究%Synthesis and complex of the corrosion inhibitor of mannich bases of aromatic ketones

    Institute of Scientific and Technical Information of China (English)

    王霞; 白媛丽; 罗全民; 刘志辉

    2012-01-01

    37% Formaldehyde solution,acetophenone and diethylamine were chosed ultimately and these materials compounded a new type of mannich base hydrochloride acid inhibitor, and its complex research. The results showed that the best synthetic process conditions is diethylamine, formaldehyde, acetophenone molar ratio is:2:2:1 .reaction time is 8 h,reaction temperature is 80℃,,reaction system pH value is 4. Sodi-um tungstate and corrosion inhibitor have a positive synergies, potassium iodide negative synergistic effect.%以37%的甲醛溶液、苯乙酮和二乙胺为原料,合成一种新型曼尼希碱盐酸酸化缓蚀剂,并对其进行复配研究.结果表明,最佳合成条件为:二乙胺、37%甲醛溶液和苯乙酮的摩尔比为2:2:1,反应时间8h,反应温度80 ℃,pH值为4;钨酸钠和缓蚀剂有着很好的正协同效应,碘化钾与其有负协同效应.

  8. Panic Attack during Elective Gastrointestinal Endoscopy

    Directory of Open Access Journals (Sweden)

    Charalampos Mitsonis

    2011-01-01

    Full Text Available Background. Esophagogastroduodenoscopy (EGD and colonoscopy (CS can evoke anxiety, embarrassment, and discomfort. These concerns can culminate in panic attacks, which may traumatize patients and significantly decrease their compliance to the procedure. The objective of this study was to evaluate the relationship between preendoscopic anxiety and the possibility of a panic attack during an elective gastrointestinal endoscopy (EGE. Methods. The study population comprised of 79 Greek outpatients. The examination was carried out without the use of conscious sedation. Patients' anxiety levels were assessed before the procedure using the Greek version of the Spielberger State-Trait Anxiety Inventory (STAI-Y. Results. Seventy-nine patients were enrolled: 45 EGD and 34 CS. Females had higher state and trait anxiety levels than males (48.14 ± 7.94 versus 44.17 ± 7.43, <0.05; and 43.68 ± 6.95 versus 39.86 ± 7.46, <0.05. Patients who experienced panic attack had significantly higher levels of both trait and state anxiety, compared to those who were panic-free. There was no significant relationship between panic attacks and sex or type of procedure. Conclusions. Patients who experience panic attacks during endoscopic procedures appear to have significantly higher anxiety levels before the procedure. Administering the STAI questionnaire prior to the endoscopy seems to be a useful screening method for vulnerable patients.

  9. Detecting and Localizing Wireless Network Attacks Techniques

    Directory of Open Access Journals (Sweden)

    Iyad Aldasouqi

    2010-03-01

    Full Text Available In order to increase employee productivity within a feasible budget, we have to track newtechnologies, investigate and choose the best plan and implementation of these technologies.WLAN is vulnerable to malicious attacks due to their shared medium in unlicensed frequencyspectrum, thus requiring security features for a variety of applications.This paper will discuss some techniques and approaches which can help to detect, localize andidentify wireless network attacks, which present a unique set of challenges to IT and securityprofessionals. All efforts were focusing on the ability to identity based attacks in which amalicious device uses forged MAC addresses to masquerade as a specific client or to createmultiple illegitimate identities. Also, to be sure that the network is able to robustly identify eachtransmitter independently of packet contents, allowing detection of a large class of identity-basedattacks with high probability.The attacker can listen to all wireless traffic, compromise encryption and Use attenuators,amplifiers, directional antennas, software radios, but he cannot be at the location of user or at thelocation of access points. However, we have to choose the best design, implementation, andevaluation techniques in order to secure our network from attackers, where our choice willdepend on a technical implementation to mitigate the risk on the enterprise network infrastructure.

  10. Power analysis attacks revealing the secrets of smart cards

    CERN Document Server

    Mangard, Stefan; Popp, Thomas

    2008-01-01

    A comprehensive treatment of power analysis attacks and countermeasures. Based on the principle that the only way to defend against power analysis attacks is to understand them, this book explains how power analysis attacks work. It discusses simple and differential power analysis as well as advanced techniques like template attacks.

  11. Coronary Artery Dissection: Not Just a Heart Attack

    Science.gov (United States)

    ... Stroke More Coronary Artery Dissection: Not Just a Heart Attack Updated:May 24,2016 Sometimes a heart attack ... Disease Go Red For Women Types of aneurysms Heart Attack • Home • About Heart Attacks Acute Coronary Syndrome (ACS) • ...

  12. A Game Theoretic Approach to Cyber Attack Prediction

    Energy Technology Data Exchange (ETDEWEB)

    Peng Liu

    2005-11-28

    The area investigated by this project is cyber attack prediction. With a focus on correlation-based prediction, current attack prediction methodologies overlook the strategic nature of cyber attack-defense scenarios. As a result, current cyber attack prediction methodologies are very limited in predicting strategic behaviors of attackers in enforcing nontrivial cyber attacks such as DDoS attacks, and may result in low accuracy in correlation-based predictions. This project develops a game theoretic framework for cyber attack prediction, where an automatic game-theory-based attack prediction method is proposed. Being able to quantitatively predict the likelihood of (sequences of) attack actions, our attack prediction methodology can predict fine-grained strategic behaviors of attackers and may greatly improve the accuracy of correlation-based prediction. To our best knowledge, this project develops the first comprehensive framework for incentive-based modeling and inference of attack intent, objectives, and strategies; and this project develops the first method that can predict fine-grained strategic behaviors of attackers. The significance of this research and the benefit to the public can be demonstrated to certain extent by (a) the severe threat of cyber attacks to the critical infrastructures of the nation, including many infrastructures overseen by the Department of Energy, (b) the importance of cyber security to critical infrastructure protection, and (c) the importance of cyber attack prediction to achieving cyber security.

  13. Transforming Graphical System Models to Graphical Attack Models

    DEFF Research Database (Denmark)

    Ivanova, Marieta Georgieva; Probst, Christian W.; Hansen, Rene Rydhof;

    2016-01-01

    approach to transforming graphical system models to graphical attack models in the form of attack trees. Based on an asset in the model, our transformations result in an attack tree that represents attacks by all possible actors in the model, after which the actor in question has obtained the asset....

  14. Presence of C1-Inhibitor Polymers in a Subset of Patients Suffering from Hereditary Angioedema

    DEFF Research Database (Denmark)

    Elenius Madsen, Daniel; Hansen, Søren; Gram, Jørgen Brodersen; Bygum, Anette; Drouet, Christian; Sidelmann, Johannes Jakobsen

    2014-01-01

    Hereditary angioedema (HAE) is a potentially life-threatening disease caused by mutations in the gene encoding the serine protease inhibitor (serpin) C1 inhibitor (C1-inh). The mutations cause decreased functional plasma levels of C1-inh, which triggers unpredictable recurrent edema attacks...

  15. Proposed Methodology for Securing Wireless LANs from Wormhole Attack

    Directory of Open Access Journals (Sweden)

    A.K. Patel

    2010-05-01

    Full Text Available Wormhole attacks enable an attacker with limited Resources and no cryptographic material to wreak havoc on wireless networks. Initial research focused that this attack is possible only on Adhoc networks, but in present condition wormhole attack is possible on infrastructure based wireless LANs also. We propose architecture and analyze the possibility of wormhole attack along with a countermeasure to avoid such an attack. The proposed mechanism involves the shared information between communicating Access Points to prevent Rouge Access Points from masquerading as false neighbours. Our defense greatly diminishes the threat of wormhole attacks and requires no location information or clock synchronization.

  16. Inhibitors of Succinate: Quinone Reductase/Complex II Regulate Production of Mitochondrial Reactive Oxygen Species and Protect Normal Cells from Ischemic Damage but Induce Specific Cancer Cell Death

    Czech Academy of Sciences Publication Activity Database

    Ralph, S.J.; Moreno-Sanchez, R.; Neužil, Jiří; Rodriguez-Enriquez, S.

    2011-01-01

    Roč. 28, č. 11 (2011), s. 2695-2730. ISSN 0724-8741 Institutional research plan: CEZ:AV0Z50520701 Keywords : Mitocans * SDH/Complex II * mitochondrial ROS production Subject RIV: CE - Biochemistry Impact factor: 4.093, year: 2011

  17. Zinc(II) complexes with potent cyclin-dependent kinase inhibitors derived from 6-benzylaminopurine: synthesis, characterization, X-ray structures and biological activity

    Czech Academy of Sciences Publication Activity Database

    Trávníček, Zdeněk; Kryštof, Vladimír; Šipl, M.

    2006-01-01

    Roč. 100, č. 2 (2006), s. 214-225. ISSN 0162-0134 R&D Projects: GA ČR GA203/04/1168 Institutional research plan: CEZ:AV0Z50380511 Keywords : Zinc(II) complexes * 6-Benzylaminopurine derivatives * Bohemine * Olomoucine * X-ray structures Subject RIV: CA - Inorganic Chemistry Impact factor: 2.654, year: 2006

  18. Copper(II) complexes with highly water-soluble L- and D-proline-thiosemicarbazone conjugates as potential inhibitors of Topoisomerase IIα.

    Science.gov (United States)

    Bacher, Felix; Enyedy, Éva A; Nagy, Nóra V; Rockenbauer, Antal; Bognár, Gabriella M; Trondl, Robert; Novak, Maria S; Klapproth, Erik; Kiss, Tamás; Arion, Vladimir B

    2013-08-01

    Two proline-thiosemicarbazone bioconjugates with excellent aqueous solubility, namely, 3-methyl-(S)-pyrrolidine-2-carboxylate-2-formylpyridine thiosemicarbazone [L-Pro-FTSC or (S)-H2L] and 3-methyl-(R)-pyrrolidine-2-carboxylate-2-formylpyridine thiosemicarbazone [D-Pro-FTSC or (R)-H2L], have been synthesized and characterized by elemental analysis, one- and two-dimensional (1)H and (13)C NMR spectroscopy, and electrospray ionization mass spectrometry. The complexation behavior of L-Pro-FTSC with copper(II) in an aqueous solution and in a 30% (w/w) dimethyl sulfoxide/water mixture has been studied via pH potentiometry, UV-vis spectrophotometry, electron paramagnetic resonance, (1)H NMR spectroscopy, and spectrofluorimetry. By the reaction of copper(II) acetate with (S)-H2L and (R)-H2L in water, the complexes [Cu(S,R)-L] and [Cu(R,S)-L] have been synthesized and comprehensively characterized. An X-ray diffraction study of [Cu(S,R)-L] showed the formation of a square-pyramidal complex, with the bioconjugate acting as a pentadentate ligand. Both copper(II) complexes displayed antiproliferative activity in CH1 ovarian carcinoma cells and inhibited Topoisomerase IIα activity in a DNA plasmid relaxation assay. PMID:23829568

  19. Attack Prevention for Collaborative Spectrum Sensing in Cognitive Radio Networks

    CERN Document Server

    Duan, Lingjie; Huang, Jianwei; Shin, Kang G

    2011-01-01

    Collaborative spectrum sensing can significantly improve the detection performance of secondary unlicensed users (SUs). However, the performance of collaborative sensing is vulnerable to sensing data falsification attacks, where malicious SUs (attackers) submit manipulated sensing reports to mislead the fusion center's decision on spectrum occupancy. Moreover, attackers may not follow the fusion center's decision regarding their spectrum access. This paper considers a challenging attack scenario where multiple rational attackers overhear all honest SUs' sensing reports and cooperatively maximize attackers' aggregate spectrum utilization. We show that, without attack-prevention mechanisms, honest SUs are unable to transmit over the licensed spectrum, and they may further be penalized by the primary user for collisions due to attackers' aggressive transmissions. To prevent such attacks, we propose two novel attack-prevention mechanisms with direct and indirect punishments. The key idea is to identify collisions...

  20. Liability for damage caused by terrorist attacks

    International Nuclear Information System (INIS)

    After the terrorist attacks on September 11, 2001, one of the questions raised was about the potential liability of the operator of a nuclear power plant for damage sustained by a third party as a result of a comparable terrorist attack on a nuclear power plant. Internationally, this situation is regulated by the Convention on Third-Party Liability in Nuclear Power, the so-called Paris Liability Convention, of 1960, 1964, 1982. Among other things, that Convention excludes liability in cases directly resulting form 'actions of armed conflict..'. The problem arises, among other things, from the absence of an internationally acknowledged definition of terrorism or terrorist attack, and from the idea that, according to the Paris Convention, the legal entities assumed to be involved in such actions are states and weapons. National and international agreements and laws about the liability of the operator of nuclear facility for damage to third parties as a result of terrorist actions are analyzed and discussed. (orig.)

  1. Quantifying Mixed Uncertainties in Cyber Attacker Payoffs

    Energy Technology Data Exchange (ETDEWEB)

    Chatterjee, Samrat; Halappanavar, Mahantesh; Tipireddy, Ramakrishna; Oster, Matthew R.; Saha, Sudip

    2015-04-15

    Representation and propagation of uncertainty in cyber attacker payoffs is a key aspect of security games. Past research has primarily focused on representing the defender’s beliefs about attacker payoffs as point utility estimates. More recently, within the physical security domain, attacker payoff uncertainties have been represented as Uniform and Gaussian probability distributions, and intervals. Within cyber-settings, continuous probability distributions may still be appropriate for addressing statistical (aleatory) uncertainties where the defender may assume that the attacker’s payoffs differ over time. However, systematic (epistemic) uncertainties may exist, where the defender may not have sufficient knowledge or there is insufficient information about the attacker’s payoff generation mechanism. Such epistemic uncertainties are more suitably represented as probability boxes with intervals. In this study, we explore the mathematical treatment of such mixed payoff uncertainties.

  2. Counteracting Power Analysis Attacks by Masking

    Science.gov (United States)

    Oswald, Elisabeth; Mangard, Stefan

    The publication of power analysis attacks [12] has triggered a lot of research activities. On the one hand these activities have been dedicated toward the development of secure and efficient countermeasures. On the other hand also new and improved attacks have been developed. In fact, there has been a continuous arms race between designers of countermeasures and attackers. This chapter provides a brief overview of the state-of-the art in the arms race in the context of a countermeasure called masking. Masking is a popular countermeasure that has been extensively discussed in the scientific community. Numerous articles have been published that explain different types of masking and that analyze weaknesses of this countermeasure.

  3. Early Detection of SQL Injection Attacks

    Directory of Open Access Journals (Sweden)

    Hossain Shahriar

    2013-07-01

    Full Text Available SQL Injection (SQLI is a common vulnerability found in web applications.The starting point of SQLIattack is the client-side (browser. If attack inputs can be detected early at the browse side, then it could bethwarted early by not forwarding the malicious inputs to the server-side for further processing.This paperpresents a client-side approach to detect SQLI attacks1. The client-side accepts shadow SQL queries fromthe server-side and checks any deviation betweenshadow queries with dynamic queries generated withuser supplied inputs. We measure the deviation of shadow query and dynamic query based on conditionalentropy metrics and propose four metrics in this direction. We evaluate the approach with three PHPapplications containing SQLI vulnerabilities. The evaluation results indicate that our approach can detectwell-known SQLI attacks early at the client-side and impose negligible overhead.

  4. Arene ruthenium(ii) complex, a potent inhibitor against proliferation, migration and invasion of breast cancer cells, reduces stress fibers, focal adhesions and invadopodia.

    Science.gov (United States)

    Wu, Qiong; He, Jiangtu; Mei, Wenjie; Zhang, Zhao; Wu, Xiaohui; Sun, Fenyong

    2014-12-01

    Effective chemotherapy drugs for cancer that would inhibit tumor growth and suppress metastasis are currently lacking. In this study, a series of arene ruthenium complexes, [(η6-arene)Ru(H2iip)Cl]Cl (arene = p-cymene, RAWQ03; CH3C6H5, RAWQ04; and C6H6, RAWQ11), were synthesized and their inhibitory activity against tumor cells were evaluated. The results showed that the complex RAWQ11 inhibited the growth of MDA-MB-231 breast cancer cells by inducing S-phase arrest, which is closely related to the inhibition of cell mitosis-mediated cell nucleus damage. Further studies showed that RAWQ11 can inhibit the invasion and metastasis of MDA-MB-231 cells. The morphology of MDA-MB-231 cells changed, the number of focal adhesions decreased, and the stress fibers de-polymerized upon dealing with the complex RAWQ11. The FITC-gelatin assay confirmed that the formation of invadopodia in MDA-MB-231 cells was significantly blocked by RAWQ11. Furthermore, RAWQ11 can block the AKT signal pathway by upregulating the PTEN expression through binding and downregulating miR-21. These results demonstrated that this type of arene ruthenium(ii) complex can block the invadopodia formation by regulating the PTEN/AKT signal pathway mediated by miR-21 to inhibit the invasion and metastasis of breast cancer cells. Therefore, this complex can be used as a potential dual functional agent to inhibit the growth and metastasis of tumor cells. PMID:25142071

  5. A taxonomy and discussion of software attack technologies

    Science.gov (United States)

    Banks, Sheila B.; Stytz, Martin R.

    2005-03-01

    Software is a complex thing. It is not an engineering artifact that springs forth from a design by simply following software coding rules; creativity and the human element are at the heart of the process. Software development is part science, part art, and part craft. Design, architecture, and coding are equally important activities and in each of these activities, errors may be introduced that lead to security vulnerabilities. Therefore, inevitably, errors enter into the code. Some of these errors are discovered during testing; however, some are not. The best way to find security errors, whether they are introduced as part of the architecture development effort or coding effort, is to automate the security testing process to the maximum extent possible and add this class of tools to the tools available, which aids in the compilation process, testing, test analysis, and software distribution. Recent technological advances, improvements in computer-generated forces (CGFs), and results in research in information assurance and software protection indicate that we can build a semi-intelligent software security testing tool. However, before we can undertake the security testing automation effort, we must understand the scope of the required testing, the security failures that need to be uncovered during testing, and the characteristics of the failures. Therefore, we undertook the research reported in the paper, which is the development of a taxonomy and a discussion of software attacks generated from the point of view of the security tester with the goal of using the taxonomy to guide the development of the knowledge base for the automated security testing tool. The representation for attacks and threat cases yielded by this research captures the strategies, tactics, and other considerations that come into play during the planning and execution of attacks upon application software. The paper is organized as follows. Section one contains an introduction to our research

  6. Quantifying Public Response towards Islam on Twitter after Paris Attacks

    OpenAIRE

    Magdy, Walid; Darwish, Kareem; Abokhodair, Norah

    2015-01-01

    The Paris terrorist attacks occurred on November 13, 2015 prompted a massive response on social media including Twitter, with millions of posted tweets in the first few hours after the attacks. Most of the tweets were condemning the attacks and showing support to Parisians. One of the trending debates related to the attacks concerned possible association between terrorism and Islam and Muslims in general. This created a global discussion between those attacking and those defending Islam and M...

  7. Effect of migraine attacks on paracetamol absorption.

    OpenAIRE

    Tokola, R A; Neuvonen, P J

    1984-01-01

    The absorption of effervescent paracetamol (1000 mg) was investigated in nine female patients during a migraine attack and in the same patients when headache free. Migraine attack decreased (P less than 0.05) the areas under the serum paracetamol concentration-time curves (AUC) of 0-2 h, 0-4 h and 0-6 h and the peak serum concentration. The severity of nausea correlated significantly with the decrease in the AUC values. Our results support findings of delayed gastric emptying in migraine atta...

  8. Attack strategies on quantum cryptographic protocols

    International Nuclear Information System (INIS)

    Full text: Quantum key distribution (QKD) and quantum authentication (QA) have been a topic of extensive research in the last 20 years. In course of that many attacks on QKD and QA protocols have been studied. Among these, Zhang, Lee and Guo presented an attack on a QKD protocol using entanglement swapping. Based on that strategy we take a look at other protocols to inspect how much information an adversary may get if he shares entanglement with either one or both parties. We will present some protocols where an adversary can even get full information about the key using entanglement. (author)

  9. Session Initiation Protocol Attacks and Challenges

    CERN Document Server

    Keshavarz, Hassan; Noor, Rafidah Md

    2012-01-01

    In recent years, Session Initiation Protocol (SIP) has become widely used in current internet protocols. It is a text-based protocol much like Hyper Text Transport Protocol (HTTP) and Simple Mail Transport Protocol (SMTP). SIP is a strong enough signaling protocol on the internet for establishing, maintaining, and terminating session. In this paper the areas of security and attacks in SIP are discussed. We consider attacks from diverse related perspectives. The authentication schemes are compared, the representative existing solutions are highlighted, and several remaining research challenges are identified. Finally, the taxonomy of SIP threat will be presented.

  10. Fast Collision Attack on MD5

    OpenAIRE

    Stevens, Marc

    2006-01-01

    In this paper, we present an improved attack algorithm to find two-block collisions of the hash function MD5. The attack uses the same differential path of MD5 and the set of sufficient conditions that was presented by Wang et al. We present a new technique which allows us to deterministically fulfill restrictions to properly rotate the differentials in the first round. We will present a new algorithm to find the first block and we will use an algorithm of Klima to find the second block. To o...

  11. Textual Manipulation for SQL Injection Attacks

    Directory of Open Access Journals (Sweden)

    Hussein AlNabulsi

    2013-11-01

    Full Text Available SQL injection attacks try to use string or text manipulations to access illegally websites and their databases. This is since using some symbols or characters in SQL statements may trick the authentication system to incorrectly allow such SQL statements to be processed or executed. In this paper, we highlighted several examples of such text manipulations that can be successfully used in SQL injection attacks. We evaluated the usage of those strings on several websites and web pages using SNORT open source. We also conducted an extensive comparison study of some relevant papers.

  12. Defending Against Wormhole Attack in OLSR

    Institute of Scientific and Technical Information of China (English)

    HONG Liang; HONG Fan; FU Cai

    2006-01-01

    OLSR (optimal link state routing) is one of the four basic routing protocols used in mobile ad hoc Networks by the MANET working group of IETF(Internet engineering task force). OLSR, a proactive routing protocol, is based on a multipoint relaying flooding technique to reduce the number of topology broadcast. OLSR uses periodic HELLO packets to neighbor detection. As introduced in Reference [1], the wormhole attack can form a serious threat in wireless Networks, especially against many ad hoc Network routing protocols and location-based wireless security systems. Here, a trust model to handle this attack in OLSR is provided and simulated in NS2.

  13. A novel proposed network security management approach for cyber attacks

    International Nuclear Information System (INIS)

    Network security is a discipline that focuses on securing networks from unauthorized access. Given the Escalating threats of malicious cyber attacks, modern enterprises employ multiple lines of defense. A comprehensive defense strategy against such attacks should include (I) an attack detection component that deter- mines the fact that a program is compromised, (2) an attack identification and prevention component that identifies attack packets so that one can block such packets in the future and prevents the attack from further propagation. Over the last decade, a significant amount of research has been vested in the systems that can detect cyber attacks either statically at compile time or dynamically at run time, However, not much effort is spent on automated attack packet identification or attack prevention. In this paper we present a unified solution to the problems mentioned above. We implemented this solution after the forward engineering of Open Source Security Information Management (OSSIM) system called Preventive Information Security management (PrISM) system that correlates input from different sensors so that the resulting product can automatically detect any cyber attack against it and prevents by identifying the actual attack packet(s). The PrISM was always able to detect the attacks, identify the attack packets and most often prevent by blocking the attacker's IP address to continue normal execution. There is no additional run-time performance overhead for attack prevention. (author)

  14. The influence of rare earth mercaptoacetate on the initiation of corrosion on AA2024-T3 Part II: The influence of intermetallic compositions within heavily attacked sites

    International Nuclear Information System (INIS)

    Highlights: • Effect of intermetallic clustering was investigated on the surface of AA2024-T3. • Both rare earth mercaptoacetate inhibitors stifled the corrosion ring formation. • Surface area and the number of domains were critical for severely corroded sites. • Most clustered sites were not always the most severely attacked sites. - Abstract: Localised corrosion is typical on AA2024-T3 due to intermetallic particles embedded in the alloy. The effect of intermetallic compositions on corrosion are not yet fully understood. EPMA data on AA2024-T3 surfaces before and after a 16 min immersion, analyses the influence of intermetallic clustering on the severity attack at local sites. While sites with a high number of domains and a large S-phase surface area typically lead to severe attack, maximising these features did not always lead to severe corrosion attack. Cerium or praseodymium mercaptoacetate inhibited corrosion ring formation. The common trends observed from such attack sites was also discussed

  15. Managing burn victims of suicide bombing attacks: outcomes, lessons learnt, and changes made from three attacks in Indonesia

    OpenAIRE

    Chim, Harvey; Yew, Woon Si; Song, Colin

    2007-01-01

    Introduction Terror attacks in Southeast Asia were almost nonexistent until the 2002 Bali bomb blast, considered the deadliest attack in Indonesian history. Further attacks in 2003 (Jakarta), 2004 (Jakarta), and 2005 (Bali) have turned terrorist attacks into an ever-present reality. Methods The authors reviewed medical charts of victims evacuated to the Singapore General Hospital (SGH) Burns Centre during three suicide attacks involving Bali (2002 and 2005) and the Jakarta Marriott hotel (200...

  16. Cryptographic Attacks and Countermeasures - A Mathematical View

    OpenAIRE

    Canright, David; Stanica, Pantelimon

    2009-01-01

    2009 CyberSecurity Summit, Naval Postgraduate School 1st NPS Cyber Summit was held at the Naval Postgraduate School in Monterey, California on October 29, 2009. Sessions were held on the following topics: security requirements, Kerchkoffs' principle, mathematics of cybersecurity, the data encryption standard, nonlinear equations, Cyber attacks on Bluetooth EQ, Crypto properties of S-boxes.

  17. Chemical Attack of Malaysian Pozzolans Concrete

    Directory of Open Access Journals (Sweden)

    Mohd Hilton Ahmad

    2011-09-01

    Full Text Available Malaysia produces more than 10 million tonne of by-product from industrial sector per year. As the environmental impact concerns, more than half of the by-product can be recycled to be used as construction materials. One of them is pozzolan, a cement replacing material that can be used to enhance the properties of the concrete. This paper studies the chemical attack to local prozzolans concrete. The parameters studied include weight loss, length change, and residual strength of local pozzolans concrete after been exposed to severe environment. The specimen were tested under normal room temperature, exposed to magnesium sulfate, MgSO4. 2H2O where both sulfate attack and acid attack take place. Two series of pozzolans< which is Pulverized fly ash (PFA and Palm oil fuel ash (POFA were identified. Another series of admixture, Quarry Dust (QD from quarry waste that contain high amount of silica content also been carried out. Each series will study the effect of cement replacement percentage of 5%, 10% and 15%. The parameters were compared to conventional ordinary Portland cement (OPC concrete as control mix. Accelerated testing was conducted at 3, 7, 28, 56 and 90 days. The result shows that the local pozzolans concrete were found to be in good resistance against sulfate attack compared to conventional concrete. Compared to all series conducted, series of PFA replacement gave the best resistance followed by POFA and QD replacement series.

  18. Adversarial Feature Selection Against Evasion Attacks.

    Science.gov (United States)

    Zhang, Fei; Chan, Patrick P K; Biggio, Battista; Yeung, Daniel S; Roli, Fabio

    2016-03-01

    Pattern recognition and machine learning techniques have been increasingly adopted in adversarial settings such as spam, intrusion, and malware detection, although their security against well-crafted attacks that aim to evade detection by manipulating data at test time has not yet been thoroughly assessed. While previous work has been mainly focused on devising adversary-aware classification algorithms to counter evasion attempts, only few authors have considered the impact of using reduced feature sets on classifier security against the same attacks. An interesting, preliminary result is that classifier security to evasion may be even worsened by the application of feature selection. In this paper, we provide a more detailed investigation of this aspect, shedding some light on the security properties of feature selection against evasion attacks. Inspired by previous work on adversary-aware classifiers, we propose a novel adversary-aware feature selection model that can improve classifier security against evasion attacks, by incorporating specific assumptions on the adversary's data manipulation strategy. We focus on an efficient, wrapper-based implementation of our approach, and experimentally validate its soundness on different application examples, including spam and malware detection. PMID:25910268

  19. Why Does Asthma Attack Severely at Night?

    Institute of Scientific and Technical Information of China (English)

    2008-01-01

    @@ The rhythmic changes of human physiological activities by day and at night may cause regular change of the patient's condition within one day. The following is the explanation with the theory of Chinese medicine for the reason why asthma attacks severely at night.

  20. Rhode Island School Terrorist Attack Preparedness

    Science.gov (United States)

    Dube, Michael W. M.

    2012-01-01

    This study examined the state of safety and terrorist attack preparedness in Rhode Island Schools as determined by Rhode Island school leader perceptions. The study is descriptive in nature as it gathers data to describe a particular event or situation. Using a researcher generated survey based on terrorist preparedness guidelines and suggestions…

  1. Association between Terror Attacks and Suicide Attempts

    Science.gov (United States)

    Weizman, Tal; Yagil, Yaron; Schreiber, Shaul

    2009-01-01

    Based on Durkheim's "Control theory," we explored the association between frequency of terror attacks in Israel and the frequency of suicide attempts admitted to the Emergency Room of a major general hospital in Tel-Aviv (1999-2004). Analysis of the six-year study period as a whole revealed no significant correlation between the variables, with…

  2. After Heart Attack, New Threat: Heart Failure

    Science.gov (United States)

    ... nih.gov/medlineplus/news/fullstory_159007.html After Heart Attack, New Threat: Heart Failure 1 in 4 survivors develops this serious ... TUESDAY, May 24, 2016 (HealthDay News) -- Risk of heart failure appears high within a few years of ...

  3. Nonepileptic attack disorder among married women

    Directory of Open Access Journals (Sweden)

    Dhanaraj M

    2005-01-01

    Full Text Available Aim : To study the clinical features, precipitating stressful life events and prognosis of nonepileptic attack disorder (NEAD among married women. Design: Prospective cohort study with 1-year follow-up. Setting: A tertiary care teaching hospital. Subjects: Of the 1020 patients with epilepsy referred to the epilepsy clinic during 2002-2003, 30 were married women with NEAD. Materials and Methods: The diagnostic criteria for NEAD included normal EEG during ictal and post-ictal phase of the generalized ′attack.′ The data collected included clinical characteristics, semiology of the attacks, precipitating stressful events, and co-morbid psychiatric disorders. The control group included 30 age-matched married women with generalized tonic-clonic seizures. The long-term outcome and factors influencing the outcomes were analyzed. Results: The mean duration of illness was 18 months, and the pattern of the attack was ′fall and lying still′ in 53% and ′fall with generalized motor movements′ in 47%. The frequency was one or more per week in 57% and occasionally in 43%. The important stressful events were matrimonial discord following illegal relationship of the husband with another woman (c2 = 9.02, P = 0.003 and constant quarrel with other family members (c2 = 5.19, P = 0.02. The prevalence of sexual abuse was low (7%. Co-morbid psychiatric disorder was observed in 70%. At the end of 1 year, 39% were free from the attack. Resolution of the stressful life events (c2 = 4.52, P = 0.03 and lower frequency of attack at the time of reporting (c2 = 3.88, P = 0.05 correlated with good outcomes. Conclusion : Among patients with NEAD in India, the major precipitating factors were matrimonial discord following illegal relationship of the husband with another woman and constant quarrel with other family members and not sexual abuse. Women with low frequency of attack at the time of reporting and the remission of the stressful events had better outcomes.

  4. A graph based system for multi-stage attacks recognition

    Institute of Scientific and Technical Information of China (English)

    Safaa O. Al-Mamory; Zhai Jianhong; Zhang Hongli

    2008-01-01

    Building attack scenario is one of the most important aspects in network security. This paper proposed a system which collects intrusion alerts, clusters them as sub-attacks using alerts abstraction, aggregates the similar sub-attacks, and then correlates and generates correlation graphs. The scenarios were represented by alert classes instead of alerts themselves so as to reduce the required rules and have the ability of detecting new variations of attacks. The proposed system is capable of passing some of the missed attacks. To evaluate system effectiveness, it was tested with different datasets which contain multi-step attacks. Compressed and easily understandable correlation graphs which reflect attack scenarios were generated. The proposed system can correlate related alerts, uncover the attack strategies, and detect new variations of attacks.

  5. Recovery of human remains after shark attack.

    Science.gov (United States)

    Byard, Roger W; James, Ross A; Heath, Karen J

    2006-09-01

    Two cases of fatal shark attack are reported where the only tissues recovered were fragments of lung. Case 1: An 18-year-old male who was in the sea behind a boat was observed by friends to be taken by a great white shark (Carcharodon carcharias). The shark dragged him under the water and then, with a second shark, dismembered the body. Witnesses noted a large amount of blood and unrecognizable body parts coming to the surface. The only tissues recovered despite an intensive beach and sea search were 2 fragments of lung. Case 2: A 19-year-old male was attacked by a great white shark while diving. A witness saw the shark swim away with the victim's body in its mouth. Again, despite intensive beach and sea searches, the only tissue recovered was a single piece of lung, along with pieces of wetsuit and diving equipment. These cases indicate that the only tissue to escape being consumed or lost in fatal shark attacks, where there is a significant attack with dismemberment and disruption of the integrity of the body, may be lung. The buoyancy of aerated pulmonary tissue ensures that it rises quickly to the surface, where it may be recovered by searchers soon after the attack. Aeration of the lung would be in keeping with death from trauma rather than from drowning and may be a useful marker in unwitnessed deaths to separate ante- from postmortem injury, using only relatively small amounts of tissues. Early organ recovery enhances the identification of human tissues as the extent of morphologic alterations by putrefactive processes and sea scavengers will have been minimized. DNA testing is also possible on such recovered fragments, enabling confirmation of the identity of the victim. PMID:16936505

  6. New Difluoro Knoevenagel Condensates of Curcumin, Their Schiff Bases and Copper Complexes as Proteasome Inhibitors and Apoptosis Inducers in Cancer Cells

    Science.gov (United States)

    Padhye, Subhash; Yang, Huanjie; Jamadar, Abeda; Cui, Qiuzhi Cindy; Chavan, Deepak; Dominiak, Kristin; McKinney, Jaclyn; Banerjee, Sanjeev; Dou, Q. Ping; Sarkar, Fazlul H.

    2013-01-01

    Purpose Emerging evidence clearly suggests the potential chemopreventive and anti-tumor activity of a well known “natural agent” curcumin. However, studies have shown that curcumin is not readily bioavailable, and thus the tissue bioavailability of curcumin is also poor except for gastrointestinal track. Because of the potential biological activity of curcumin, many studies have attempted for making a better analog of cucumin that is equally effective or better with increased bioavailability, which was the purpose of our current study. Methods We have designed and synthesized new difluoro Knoevenagel condensates of curcumin and Schiff bases along with their copper (II) complexes and evaluated their biological activities with respect to the inhibitory effects on purified rabbit 26S proteasome, and growth inhibition and induction of apoptosis in colon and pancreatic cancer cell lines. Results All copper complexes possess distorted square planar geometries with 1:1 metal to ligand stoichiometry with reversible copper redox couple. The difluoro compound CDF exhibited inhibitory effects on purified rabbit 20S proteasome or cellular 26S proteasome, and caused both growth inhibition of cancer cell lines and induced apoptotic cell death in our preliminary assessment. Conclusion Our results suggest that our newly synthesized classes of curcumin analogs could be useful as chemopreventive and/or therapeutic agents against cancers. PMID:19421843

  7. The Rebound Attack: Cryptanalysis of Reduced Whirlpool and Grøstl

    DEFF Research Database (Denmark)

    Mendel, Florian; Rechberger, Christian; Schläffer, Martin; Thomsen, Søren Steffen

    collisions for 4.5 rounds of the 512-bit hash function Whirlpool with a complexity of 2^120 compression function evaluations and negligible memory requirements. The attack can be extended to a near-collision on 7.5 rounds of the compression function of Whirlpool and 8.5 rounds of the similar hash function...

  8. Polymorphic Attacks and Network Topology: Application of Concepts from Natural Systems

    Science.gov (United States)

    Rangan, Prahalad

    2010-01-01

    The growing complexity of interactions between computers and networks makes the subject of network security a very interesting one. As our dependence on the services provided by computing networks grows, so does our investment in such technology. In this situation, there is a greater risk of occurrence of targeted malicious attacks on computers…

  9. Alloys influence in ferritic steels with hydrogen attack

    International Nuclear Information System (INIS)

    Materials exposed to a corrosive environment and high temperatures, are associated with a decrease of their mechanical properties and embitterment.At room temperatures atomic hydrogen diffuses easily through metals structure, it accumulates in lattice defects forming molecular hydrogen and generating cracking due to internal stresses.Under high temperatures the phenomenon is more complex.The steels in these conditions present different structures of precipitates, that the change under creep conditions period.In this work it is determined the influence of Cr and V alloys, the changes of ferritic steel resistance in a corrosive environment and high temperatures.1.25 Cr 1 Mo 0.25 V and 2.25Cr 1 Mo under different loads and temperatures previously attacked by hydrogen environment.The hydrogen is induced by the electrolytic technique, optimizing the choice of temperatures, current density, electrolyte, etc. In order to control an adequate cathode charge, a follow up procedure is carried out by electronic barrier microscopy.After the attack, the material is settled at room temperatures for certain period of time, to allow the hydrogen to leave and evaluate the residual damage.Creep by torsion assays, under constant load and temperature is used as an experimental technique.With the outcome data curves are drawn in order to study the secondary creep rate, with the applied load and temperature, determining the value of stress exponent n and the activation energy Q.Comparing to equal assays to the same ferritic steels but non attacked by hydrogen, these values allows the prediction of microstructure changes present during these tests

  10. Analysis of the SYN Flood DoS Attack

    Directory of Open Access Journals (Sweden)

    Mitko Bogdanoski

    2013-06-01

    Full Text Available The paper analyzes systems vulnerability targeted by TCP (Transmission Control Protocol segments when SYN flag is ON, which gives space for a DoS (Denial of Service attack called SYN flooding attack or more often referred as a SYN flood attack. The effects of this type of attack are analyzed and presented in OPNET simulation environment. Furthermore, the paper presents two anomaly detection algorithms as an effective mechanism against this type of attack. Finally, practical approaches against SYN flood attack for Linux and Windows environment which are followed by are shown.

  11. A Survey of Mobile Ad Hoc Network Attacks

    Directory of Open Access Journals (Sweden)

    PRADIP M. JAWANDHIYA,

    2010-09-01

    Full Text Available Security is an essential requirement in mobile ad hoc network (MANETs. Compared to wired networks, MANETs are more vulnerable to security attacks due to the lack of a trusted centralized authority and limited resources. Attacks on ad hoc networks can be classified as passive and active attacks, depending on whether the normal operation of the network is disrupted or not. In this paper, we are describing the all prominent attacks described in literature in a consistent manner to provide a concise comparison on attack types. To the best of our knowledge, this is the first paper that studies all the existing attacks on MANETs.

  12. BAY 87-2243, a highly potent and selective inhibitor of hypoxia-induced gene activation has antitumor activities by inhibition of mitochondrial complex I

    International Nuclear Information System (INIS)

    The activation of the transcription factor hypoxia-inducible factor-1 (HIF-1) plays an essential role in tumor development, tumor progression, and resistance to chemo- and radiotherapy. In order to identify compounds targeting the HIF pathway, a small molecule library was screened using a luciferase-driven HIF-1 reporter cell line under hypoxia. The high-throughput screening led to the identification of a class of aminoalkyl-substituted compounds that inhibited hypoxia-induced HIF-1 target gene expression in human lung cancer cell lines at low nanomolar concentrations. Lead structure BAY 87-2243 was found to inhibit HIF-1α and HIF-2α protein accumulation under hypoxic conditions in non-small cell lung cancer (NSCLC) cell line H460 but had no effect on HIF-1α protein levels induced by the hypoxia mimetics desferrioxamine or cobalt chloride. BAY 87-2243 had no effect on HIF target gene expression levels in RCC4 cells lacking Von Hippel–Lindau (VHL) activity nor did the compound affect the activity of HIF prolyl hydroxylase-2. Antitumor activity of BAY 87-2243, suppression of HIF-1α protein levels, and reduction of HIF-1 target gene expression in vivo were demonstrated in a H460 xenograft model. BAY 87-2243 did not inhibit cell proliferation under standard conditions. However under glucose depletion, a condition favoring mitochondrial ATP generation as energy source, BAY 87-2243 inhibited cell proliferation in the nanomolar range. Further experiments revealed that BAY 87-2243 inhibits mitochondrial complex I activity but has no effect on complex III activity. Interference with mitochondrial function to reduce hypoxia-induced HIF-1 activity in tumors might be an interesting therapeutic approach to overcome chemo- and radiotherapy-resistance of hypoxic tumors

  13. Concrete under sulphate attack: an isotope study on sulphur sources.

    Science.gov (United States)

    Mittermayr, Florian; Bauer, Christoph; Klammer, Dietmar; Böttcher, Michael E; Leis, Albrecht; Escher, Peter; Dietzel, Martin

    2012-01-01

    The formation of secondary sulphate minerals such as thaumasite, ettringite and gypsum is a process causing severe damage to concrete constructions. A major key to understand the complex reactions, involving concrete deterioration is to decipher the cause of its appearance, including the sources of the involved elements. In the present study, sulphate attack on the concrete of two Austrian tunnels is investigated. The distribution of stable sulphur isotopes is successfully applied to decipher the source(s) of sulphur in the deteriorating sulphate-bearing minerals. Interestingly, δ(34)S values of sulphate in local groundwater and in the deteriorating minerals are mostly in the range from+14 to+27 ‰. These δ(34)S values match the isotope patterns of regional Permian and Triassic marine evaporites. Soot relicts from steam- and diesel-driven trains found in one of the tunnels show δ(34)S values from-3 to+5 ‰, and are therefore assumed to be of minor importance for sulphate attack on the concretes. In areas of pyrite-containing sedimentary rocks, the δ(34)S values of sulphate from damaged concrete range between-1 and+11 ‰. The latter range reflects the impact of sulphide oxidation on local groundwater sulphate. PMID:22321257

  14. Modified AODV Protocol against Blackhole Attacks in MANET

    Directory of Open Access Journals (Sweden)

    K.Rama,

    2010-12-01

    Full Text Available Mobile Adhoc Network (MANET consists of a collection of wireless mobile hosts without the required intervention of any existing infrastructure or centralized access point such as base station. The dynamic topology of MANET allows nodes to join and leave the network at any point of time. Wireless MANET is particularly vulnerabledue to its fundamental characteristics such as open medium, dynamic topology, distributed cooperation and constrained capability. So security in MANET is a complex issue. There are many routing protocols that establish the routes between the nodes in the network. The control towards the management of the nodes in the MANET is distributed. This features does not give assurance towards the security aspects of the network. There are many routing attacks caused due to lack of security. In this paper, therefore, we attempt to focus on analyzing and improving the security of one of the popularrouting protocol for MANET viz. the Adhoc On Demand Distance Vector (AODV routing protocol. Our focus specifically, is on ensuring the security against the Blackhole Attack. The proposed solution is that capable of detecting and removing black hole nodes in the MANET at the initial stage itself without any delay.

  15. Cyber-Attacks and the Risks for CERN

    CERN Multimedia

    Computer Security Team

    2013-01-01

    In the previous Bulletin, we discussed the cyber-risks for the accelerator complex. However, looking at the broader picture, the cyber-risks for CERN are much more diverse.   Attacks can not only harm the operation of accelerators or experiments, but also impact negatively on the operation of the Organization as a whole and/or its reputation. This would not only hamper and impede our work while making us looking plain stupid, but might also make funding agencies reconsider whether their money is well invested in CERN… Examples? Sure, let’s be imaginative! What would be the consequences, if: a laptop holding sensitive CERN documents is lost or stolen, and ends up on eBay? your password is compromised and your mail account misused to send nasty messages to thousands of external mail addresses? an attacker manages to add photos of naked women/men onto a prominent CERN website, and boasts about this on Twitter? confidential documents like job application forms or passwo...

  16. Cinnoline derivatives as human neutrophil elastase inhibitors.

    Science.gov (United States)

    Giovannoni, Maria Paola; Schepetkin, Igor A; Crocetti, Letizia; Ciciani, Giovanna; Cilibrizzi, Agostino; Guerrini, Gabriella; Khlebnikov, Andrei I; Quinn, Mark T; Vergelli, Claudia

    2016-08-01

    Compounds that can effectively inhibit the proteolytic activity of human neutrophil elastase (HNE) represent promising therapeutics for treatment of inflammatory diseases. We present here the synthesis, structure-activity relationship analysis, and biological evaluation of a new series of HNE inhibitors with a cinnoline scaffold. These compounds exhibited HNE inhibitory activity but had lower potency compared to N-benzoylindazoles previously reported by us. On the other hand, they exhibited increased stability in aqueous solution. The most potent compound, 18a, had a good balance between HNE inhibitory activity (IC50 value = 56 nM) and chemical stability (t1/2 = 114 min). Analysis of reaction kinetics revealed that these cinnoline derivatives were reversible competitive inhibitors of HNE. Furthermore, molecular docking studies of the active products into the HNE binding site revealed two types of HNE inhibitors: molecules with cinnolin-4(1H)-one scaffold, which were attacked by the HNE Ser195 hydroxyl group at the amido moiety, and cinnoline derivatives containing an ester function at C-4, which is the point of attack of Ser195. PMID:26194018

  17. Satellite Threat Warning and Attack Reporting

    Energy Technology Data Exchange (ETDEWEB)

    Hilland, D. [Kirkland AFB, NM (United States). Air Force Research Lab.; Phipps, G. [Sandia National Labs., Albuquerque, NM (United States). Optics & Technologies Dept.; Jingle, C.; Newton, G. [Schafer Corp., Albuquerque, NM (United States)

    1997-12-31

    The Air Force Research Laboratory`s Satellite Threat Warning and Attack Reporting (STW/AR) program will provide technologies for advanced threat warning and reporting of radio frequency (RF) and laser threats. The STW/AR program objectives are: (a) develop cost- effective technologies to detect, identify, locate, characterize, and report attacks or interference against U.S. and Allied satellites. (b) demonstrate innovative, light-weight, low-power, laser and RF sensors. The program focuses on the demonstration of RF and laser sensors. The RF sensor effort includes the investigation of interferometric antenna arrays, multi-arm spiral and butler matrix antennas, wideband receivers, adaptive processors, and improved processing algorithms. The laser sensor effort includes the investigation of alternative detectors, broadband grating and optical designs, active pixel sensing, and improved processing algorithms.

  18. GNSS-based positioning: Attacks and Countermeasures

    CERN Document Server

    Papadimitratos, P

    2010-01-01

    Increasing numbers of mobile computing devices, user-portable, or embedded in vehicles, cargo containers, or the physical space, need to be aware of their location in order to provide a wide range of commercial services. Most often, mobile devices obtain their own location with the help of Global Navigation Satellite Systems (GNSS), integrating, for example, a Global Positioning System (GPS) receiver. Nonetheless, an adversary can compromise location-aware applications by attacking the GNSS-based positioning: It can forge navigation messages and mislead the receiver into calculating a fake location. In this paper, we analyze this vulnerability and propose and evaluate the effectiveness of countermeasures. First, we consider replay attacks, which can be effective even in the presence of future cryptographic GNSS protection mechanisms. Then, we propose and analyze methods that allow GNSS receivers to detect the reception of signals generated by an adversary, and then reject fake locations calculated because of ...

  19. Two fatal tiger attacks in zoos.

    Science.gov (United States)

    Tantius, Britta; Wittschieber, Daniel; Schmidt, Sven; Rothschild, Markus A; Banaschak, Sibylle

    2016-01-01

    Two captive tiger attacks are presented that took place in Cologne and Münster zoos. Both attacks occurred when the handlers, intent on cleaning the enclosures, entered whilst the tigers accidently retained access to the location, and thus defended their territory against the perceived intruders. Both victims suffered fatal neck injuries from the bites. At Münster, colleagues managed to lure the tiger away from its victim to enable treatment, whilst the Cologne zoo tiger had to be shot in order to allow access to be gained. Whilst it was judged that human error led to the deaths of the experienced zookeepers, the investigation in Münster was closed as no third party was found to be at fault, whereas the Cologne zoo director was initially charged with being negligent. These charges were subsequently dismissed as safety regulations were found to be up to date. PMID:26115644

  20. Quantum Communication Attacks on Classical Cryptographic Protocols

    DEFF Research Database (Denmark)

    Damgård, Ivan Bjerre

    , one can show that the protocol remains secure even under such an attack. However, there are also cases where the honest players are quantum as well, even if the protocol uses classical communication. For instance, this is the case when classical multiparty computation is used as a “subroutine......” in quantum multiparty computation. Furthermore, in the future, players in a protocol may employ quantum computing simply to improve efficiency of their local computation, even if the communication is supposed to be classical. In such cases, it no longer seems clear that a quantum adversary must be limited......In the literature on cryptographic protocols, it has been studied several times what happens if a classical protocol is attacked by a quantum adversary. Usually, this is taken to mean that the adversary runs a quantum algorithm, but communicates classically with the honest players. In several cases...