期刊文献+
共找到4篇文章
< 1 >
每页显示 20 50 100
Melatonin combined with exercise cannot alleviate cerebral injury in a rat model of focal cerebral ischemia/reperfusion injury 被引量:2
1
作者 Seunghoon lee Jinhee Shin +8 位作者 minkyung lee Yunkyung Hong Sang-Kil lee Youngjeon lee Tserentogtokh Lkhagvasuren Dong-Wook Kim Young-Ae Yang Kyu-Tae Chang Yonggeun Hong 《Neural Regeneration Research》 SCIE CAS CSCD 2012年第13期993-999,共7页
Previous studies have demonstrated that melatonin combined with exercise can alleviate secondary damage after spinal cord injury in rats. Therefore, it is hypothesized that melatonin combined with exercise can also al... Previous studies have demonstrated that melatonin combined with exercise can alleviate secondary damage after spinal cord injury in rats. Therefore, it is hypothesized that melatonin combined with exercise can also alleviate ischemic brain damage. In this study, adult rats were subjected to right middle cerebral artery occlusion after receiving 10 mg/kg melatonin or vehicle subcutaneously twice daily for 14 days. Forced exercise using an animal treadmill was performed at 20 m/min for 30 minutes per day for 6 days prior to middle cerebral artery occlusion. After middle cerebral artery occlusion, each rat received melatonin combined with exercise, melatonin or exercise alone equally for 7 days until sacrifice. Interestingly, rats receiving melatonin combined with exercise exhibited more severe neurological deficits than those receiving melatonin or exercise alone. Hypoxia-inducible factor la mRNA in the brain tissue was upregulated in rats receiving melatonin combined with exercise. Similarly, microtubule associated protein-2 mRNA expression was significantly upregulated in rats receiving melatonin alone. Chondroitin sulfate proteoglycan 4 (NG2) mRNA expression was significantly decreased in rats receiving melatonin combined with exercise as well as in rats receiving exercise alone. Furthermore, neural cell loss in the primary motor cortex was significantly reduced in rats receiving melatonin or exercise alone, but the change was not observed in rats receiving melatonin combined with exercise. These findings suggest that excessive intervention with melatonin, exercise or their combination may lead to negative effects on ischemia/reperfusion-induced brain damage. 展开更多
关键词 wfocal cerebral ischemiaJreperfusion MELATONIN EXERCISE neurological function brain tissue loss microtubule associated protein-2 chondroitin sulfate proteoglycan 4 NG2 hypoxia-inducible factor1 alpha neural regeneration
下载PDF
Detection Technique of Software-Induced Rowhammer Attacks 被引量:1
2
作者 minkyung lee Jin Kwak 《Computers, Materials & Continua》 SCIE EI 2021年第4期349-367,共19页
Side-channel attacks have recently progressed into software-induced attacks.In particular,a rowhammer attack,which exploits the characteristics of dynamic random access memory(DRAM),can quickly and continuously access... Side-channel attacks have recently progressed into software-induced attacks.In particular,a rowhammer attack,which exploits the characteristics of dynamic random access memory(DRAM),can quickly and continuously access the cells as the cell density of DRAM increases,thereby generating a disturbance error affecting the neighboring cells,resulting in bit flips.Although a rowhammer attack is a highly sophisticated attack in which disturbance errors are deliberately generated into data bits,it has been reported that it can be exploited on various platforms such as mobile devices,web browsers,and virtual machines.Furthermore,there have been studies on bypassing the defense measures of DRAM manufacturers and the like to respond to rowhammer attacks.A rowhammer attack can control user access and compromise the integrity of sensitive data with attacks such as a privilege escalation and an alteration of the encryption keys.In an attempt to mitigate a rowhammer attack,various hardware-and software-based mitigation techniques are being studied,but there are limitations in that the research methods do not detect the rowhammer attack in advance,causing overhead or degradation of the system performance.Therefore,in this study,a rowhammer attack detection technique is proposed by extracting common features of rowhammer attack files through a static analysis of rowhammer attack codes. 展开更多
关键词 Rowhammer attack static analysis detecting technique side-channel attack bit flip
下载PDF
Middle cerebral artery occlusion methods in rat versus mouse model of transient focal cerebral ischemic stroke 被引量:1
3
作者 Seunghoon lee minkyung lee +5 位作者 Yunkyung Hong Jinyoung Won Youngjeon lee Sung-Goo Kang Kyu-Tae Chang Yonggeun Hong 《Neural Regeneration Research》 SCIE CAS CSCD 2014年第7期757-758,共2页
Experimental stroke research commonly employs focal cerebral ischemic rat models (Bederson et al., 1986a; Longa et al., 1989). In human patients, ischemic stroke typically results from thrombotic or embolic occlusio... Experimental stroke research commonly employs focal cerebral ischemic rat models (Bederson et al., 1986a; Longa et al., 1989). In human patients, ischemic stroke typically results from thrombotic or embolic occlusion of a major cerebral artery, usually the mid- dle cerebral artery (MCA). Experimental focal cerebral ischemia models have been employed to mimic human stroke (Durukan and Tatlisumak, 2007). Rodent models of focal cerebral ischemia that do not require craniotomy have been developed using intraluminal suture occlusion of the MCA (MCA occlusion, MCAO) (Rosamond et al., 2008). Furthermore, mouse MCAO models have been wide- ly used and extended to genetic studies of cell death or recovery mechanisms (Liu and McCullough, 2011). Genetically engineered mouse stroke models are particularly useful for evaluation of isch- emic pathophysiology and the design of new prophylactic, neuro- protective, and therapeutic agents and interventions (Armstead et al., 2010). During the past two decades, MCAO surgical techniques have been developed that do not reveal surgical techniques for mouse MCAO model engineering. Therefore, we compared MCAO surgical methods in rats and mice. 展开更多
关键词 MCAO CCA Middle cerebral artery occlusion methods in rat versus mouse model of transient focal cerebral ischemic stroke
下载PDF
Novel Architecture of Security Orchestration, Automation and Response in Internet of Blended Environment
4
作者 minkyung lee Julian Jang-Jaccard Jin Kwak 《Computers, Materials & Continua》 SCIE EI 2022年第10期199-223,共25页
New technologies that take advantage of the emergence of massive Internet of Things(IoT)and a hyper-connected network environment have rapidly increased in recent years.These technologies are used in diverse environme... New technologies that take advantage of the emergence of massive Internet of Things(IoT)and a hyper-connected network environment have rapidly increased in recent years.These technologies are used in diverse environments,such as smart factories,digital healthcare,and smart grids,with increased security concerns.We intend to operate Security Orchestration,Automation and Response(SOAR)in various environments through new concept definitions as the need to detect and respond automatically to rapidly increasing security incidents without the intervention of security personnel has emerged.To facilitate the understanding of the security concern involved in this newly emerging area,we offer the definition of Internet of Blended Environment(IoBE)where various convergence environments are interconnected and the data analyzed in automation.We define Blended Threat(BT)as a security threat that exploits security vulnerabilities through various attack surfaces in the IoBE.We propose a novel SOAR-CUBE architecture to respond to security incidents with minimal human intervention by automating the BT response process.The Security Orchestration,Automation,and Response(SOAR)part of our architecture is used to link heterogeneous security technologies and the threat intelligence function that collects threat data and performs a correlation analysis of the data.SOAR is operated under Collaborative Units of Blended Environment(CUBE)which facilitates dynamic exchanges of data according to the environment applied to the IoBE by distributing and deploying security technologies for each BT type and dynamically combining them according to the cyber kill chain stage to minimize the damage and respond efficiently to BT. 展开更多
关键词 Blended threat(BT) collaborative units for blended environment(CUBE) internet of blended environment(IoBE) security orchestration automation and response(SOAR)
下载PDF
上一页 1 下一页 到第
使用帮助 返回顶部