Chondroitin sulfate-mediated albumin corona nanoparticles were readily prepared without any chemical reaction,and their active tumor targeting and therapeutic effects were examined.Negatively charged chondroitin sulfa...Chondroitin sulfate-mediated albumin corona nanoparticles were readily prepared without any chemical reaction,and their active tumor targeting and therapeutic effects were examined.Negatively charged chondroitin sulfate(CS)and positively charged doxorubicin(DOX)self-assembled into nanoparticles(CS-DOX-NPs)via electrostatic interactions.Bovine serum albumin(BSA)was then adsorbed on the surface of CS-DOX-NPs to form albumin corona nanoparticles(BC-DOX-NPs)protected from endogenous proteins.Due to the dual effect of BSA and CS,BC-DOX-NPs interacted with the gp60,SPARC and CD44 receptors on tumor cells,facilitating their rapid and efficient transcytosis and improving their accumulation and uptake within tumor tissues.The simultaneous presence of BSA and CS also allowed BC-DOX-NPs to target CD44 efficiently,leading to greater cellular uptake and cytotoxicity against 4 T1 cells than CS-DOX-NPs or free DOX.Intravenous injection of BCDOX-NPs into orthotopic 4 T1 tumor-bearing mice led to greater drug accumulation at the tumor site than with CS-DOX-NPs or free DOX,resulting in significant inhibition of tumor growth and lower exposure of major organs to the drug.展开更多
During system development,implementation and operation,vulnerability database technique is necessary to system security;there are many vulnerability databases but a lack of quality standardization and general evaluati...During system development,implementation and operation,vulnerability database technique is necessary to system security;there are many vulnerability databases but a lack of quality standardization and general evaluation method are needed.this paper summarized current international popular vulnerability databases,systematically introduced the present situation of current vulnerability databases,and found the problems of vulnerability database technology,extracted common metrics by analyzing vulnerability data of current popular vulnerability databases,introduced 4 measure indexes:the number scale of vulnerabilities,the independence level,the standardization degree and the integrity of vulnerability description,proposed a method for vulnerability database quantitative evaluation using SCAP protocol and corresponding standard,analyzed a large number of vulnerabilities in current popular vulnerability database,quantitative evaluated vulnerability database by the law of normal distribution,the experimental results show this method has strong versatility and science,and it is beneficial to improve the quality and standardization construction for vulnerability database development.展开更多
Vulnerability technology is the basic of network security technology,vulnerability quantitative grading methods,such as CVSS,WIVSS,ICVSS,provide a reference to vulnerability management,but the problems of ignoring the...Vulnerability technology is the basic of network security technology,vulnerability quantitative grading methods,such as CVSS,WIVSS,ICVSS,provide a reference to vulnerability management,but the problems of ignoring the risk elevation caused by a group of vulnerabilities and low accuracy of exploitable level evaluation exist in current vulnerability quantitative grading methods.To solve problems above in current network security quantitative evaluation methods,this paper verified the high relevance degree between type and exploitable score of vulnerability,proposed a new vulnerability quantitative grading method ICVSS,ICVSS can explore attack path using continuity level defined by privilege,add vulnerability type to measure indexes of exploitable metrics and use Analytic Hierarchy Process(AHP)to quantify the influence of vulnerability type on exploitable level.Compared with CVSS and WIVSS,ICVSS is proved that it can discover attack path consist of a sequence of vulnerabilities for network security situation evaluation,and has more accuracy and stability.展开更多
基金financially supported by grants from the National Natural Science Foundation of China(No.81673359)Sichuan Major Science and Technology Project on Biotechnology and Medicine(No.2018SZDZX0018)。
文摘Chondroitin sulfate-mediated albumin corona nanoparticles were readily prepared without any chemical reaction,and their active tumor targeting and therapeutic effects were examined.Negatively charged chondroitin sulfate(CS)and positively charged doxorubicin(DOX)self-assembled into nanoparticles(CS-DOX-NPs)via electrostatic interactions.Bovine serum albumin(BSA)was then adsorbed on the surface of CS-DOX-NPs to form albumin corona nanoparticles(BC-DOX-NPs)protected from endogenous proteins.Due to the dual effect of BSA and CS,BC-DOX-NPs interacted with the gp60,SPARC and CD44 receptors on tumor cells,facilitating their rapid and efficient transcytosis and improving their accumulation and uptake within tumor tissues.The simultaneous presence of BSA and CS also allowed BC-DOX-NPs to target CD44 efficiently,leading to greater cellular uptake and cytotoxicity against 4 T1 cells than CS-DOX-NPs or free DOX.Intravenous injection of BCDOX-NPs into orthotopic 4 T1 tumor-bearing mice led to greater drug accumulation at the tumor site than with CS-DOX-NPs or free DOX,resulting in significant inhibition of tumor growth and lower exposure of major organs to the drug.
基金This work is supported by the National Key R&D Program of China under Grants 2017YFB 0802300The National Natural Science Fund(No.0901065614001).
文摘During system development,implementation and operation,vulnerability database technique is necessary to system security;there are many vulnerability databases but a lack of quality standardization and general evaluation method are needed.this paper summarized current international popular vulnerability databases,systematically introduced the present situation of current vulnerability databases,and found the problems of vulnerability database technology,extracted common metrics by analyzing vulnerability data of current popular vulnerability databases,introduced 4 measure indexes:the number scale of vulnerabilities,the independence level,the standardization degree and the integrity of vulnerability description,proposed a method for vulnerability database quantitative evaluation using SCAP protocol and corresponding standard,analyzed a large number of vulnerabilities in current popular vulnerability database,quantitative evaluated vulnerability database by the law of normal distribution,the experimental results show this method has strong versatility and science,and it is beneficial to improve the quality and standardization construction for vulnerability database development.
文摘Vulnerability technology is the basic of network security technology,vulnerability quantitative grading methods,such as CVSS,WIVSS,ICVSS,provide a reference to vulnerability management,but the problems of ignoring the risk elevation caused by a group of vulnerabilities and low accuracy of exploitable level evaluation exist in current vulnerability quantitative grading methods.To solve problems above in current network security quantitative evaluation methods,this paper verified the high relevance degree between type and exploitable score of vulnerability,proposed a new vulnerability quantitative grading method ICVSS,ICVSS can explore attack path using continuity level defined by privilege,add vulnerability type to measure indexes of exploitable metrics and use Analytic Hierarchy Process(AHP)to quantify the influence of vulnerability type on exploitable level.Compared with CVSS and WIVSS,ICVSS is proved that it can discover attack path consist of a sequence of vulnerabilities for network security situation evaluation,and has more accuracy and stability.