This paper presents a secure communication protocol model-EABM, by which network security communication can be realized easily and efficiently. First, the paper gives a thorough analysis of the protocol system, system...This paper presents a secure communication protocol model-EABM, by which network security communication can be realized easily and efficiently. First, the paper gives a thorough analysis of the protocol system, systematic construction and state transition of EABM. Then , it describes the channels and the process of state transition of EABM in terms of ESTELLE. At last, it offers a verification of the accuracy of the EABM model.展开更多
AIM: To evaluate the efflicacy and tolerability of an extended treatment protocol and to determine the predictors of sustained virological response (SVR) after liver transplantation (LT).METHODS: Between August 2005 a...AIM: To evaluate the efflicacy and tolerability of an extended treatment protocol and to determine the predictors of sustained virological response (SVR) after liver transplantation (LT).METHODS: Between August 2005 and November 2008, patients with recurrent hepatitis C virus (HCV) after LT were selected for treatment if liver biopsy showed at least grade 2 inflammation and/or stage 2 flibrosis. All patients were to receive pegylated interferon (PEG)/regimens combining ribavirin (RBV) for an additional 48 wk after HCV undetectability.RESULTS: Extended protocol treatment was initiated in thirty patients. Overall, 73% had end of treatmentresponse and 60% had SVR. Nineteen patients completed treatment per protocol, of them, sixteen (84%) had end of treatment response, and fourteen (74%) achieved SVR. Both early virological response and 24-week virological response were individually associated with SVR but this association was not signif icant on multivariate analysis. Eleven patients (37%) discontinued therapy due to adverse effects. Cytopenias were the most common and most severe adverse effect, and required frquent growth factor use, dose adjustments and treatment cessations. The risk of rejection was not increased.CONCLUSION: Recurrent HCV after LT can be safely treated with extended virological responseguided therpy using PEG/RBV, but requires close monitoring for treatment-related adverse effects, particularly cytopenias.展开更多
Network protocols are divided into stateless and stateful. Stateful network protocols have complex communication interactions and state transitions. However, the existing network protocol fuzzing does not support stat...Network protocols are divided into stateless and stateful. Stateful network protocols have complex communication interactions and state transitions. However, the existing network protocol fuzzing does not support state transitions very well. This paper focuses on this issue and proposes the Semi-valid Fuzzing for the Stateful Network Protocol (SFSNP). The SFSNP analyzes protocol interactions and builds an extended finite state machine with a path marker for the network protocol; then it obtains test sequences of the extended finite state machine, and further performs the mutation operation using the semi-valid algorithm for each state transition in the test sequences; finally, it obtains fuzzing sequences. Moreover, because different test sequences may have the same state transitions, the SFSNP uses the state transition marking algorithm to reduce redundant test cases. By using the stateful rule tree of the protocol, the SFSNP extracts the constraints in the protocol specifications to construct semi-valid fuzz testing cases within the sub-protocol domain, and finally forms fuzzing sequences. Experimental results indicate that the SFSNP is reasonably effective at reducing the quantity of generated test cases and improving the quality of fuzz testing cases. The SFSNP can reduce redundancy and shorten testing time.展开更多
目的构建脑卒中偏瘫患者中医延续护理方案,为脑卒中偏瘫患者中医延续护理实践提供参考。方法在文献分析的基础上,采用德尔菲法对20名专家进行2轮函询。结果2轮专家函询问卷回收率分别为100%和95%。最终构建了含6个一级条目,20个二级条目...目的构建脑卒中偏瘫患者中医延续护理方案,为脑卒中偏瘫患者中医延续护理实践提供参考。方法在文献分析的基础上,采用德尔菲法对20名专家进行2轮函询。结果2轮专家函询问卷回收率分别为100%和95%。最终构建了含6个一级条目,20个二级条目,52个三级条目的脑卒中偏瘫患者中医特色延续护理方案,权威系数分别为0.860和0.900,Kendall s W分别为0.280和0.319,P<0.01。结论本研究构建的脑卒中偏瘫患者中医特色延续护理方案,结果可靠、科学,具有一定的可行性。展开更多
This paper proposes an improved non-repudiation protocol after pointing out two attacks on an existing non-repudiation protocol. To analyze the improved protocol, it also proposes an extension of Kailar logic. Using t...This paper proposes an improved non-repudiation protocol after pointing out two attacks on an existing non-repudiation protocol. To analyze the improved protocol, it also proposes an extension of Kailar logic. Using the extended Kailar logic, the security analysis of the improved prototocol has been presented. Key words non-repudiation protocol - extended Kailar logic - converse assumption procedure CLC number TP 393. 08 Foundation item: Supported by the National Natural Science Foundation of China (90104005) and the Doctoral Science Foundation of Ministry of Education (20020486046)Biography: Li Li(1976-), female, Ph. D candidate, research direction: network security and formal analysis of security protocol.展开更多
Over time, the world has transformed digitally and there is total dependence on the internet. Many more gadgets are continuously interconnected in the internet ecosystem. This fact has made the Internet a global infor...Over time, the world has transformed digitally and there is total dependence on the internet. Many more gadgets are continuously interconnected in the internet ecosystem. This fact has made the Internet a global information source for every being. Despite all this, attacker knowledge by cybercriminals has advanced and resulted in different attack methodologies on the internet and its data stores. This paper will discuss the origin and significance of Denial of Service (DoS) and Distributed Denial of Service (DDoS). These kinds of attacks remain the most effective methods used by the bad guys to cause substantial damage in terms of operational, reputational, and financial damage to organizations globally. These kinds of attacks have hindered network performance and availability. The victim’s network is flooded with massive illegal traffic hence, denying genuine traffic from passing through for authorized users. The paper will explore detection mechanisms, and mitigation techniques for this network threat.展开更多
文摘This paper presents a secure communication protocol model-EABM, by which network security communication can be realized easily and efficiently. First, the paper gives a thorough analysis of the protocol system, systematic construction and state transition of EABM. Then , it describes the channels and the process of state transition of EABM in terms of ESTELLE. At last, it offers a verification of the accuracy of the EABM model.
文摘AIM: To evaluate the efflicacy and tolerability of an extended treatment protocol and to determine the predictors of sustained virological response (SVR) after liver transplantation (LT).METHODS: Between August 2005 and November 2008, patients with recurrent hepatitis C virus (HCV) after LT were selected for treatment if liver biopsy showed at least grade 2 inflammation and/or stage 2 flibrosis. All patients were to receive pegylated interferon (PEG)/regimens combining ribavirin (RBV) for an additional 48 wk after HCV undetectability.RESULTS: Extended protocol treatment was initiated in thirty patients. Overall, 73% had end of treatmentresponse and 60% had SVR. Nineteen patients completed treatment per protocol, of them, sixteen (84%) had end of treatment response, and fourteen (74%) achieved SVR. Both early virological response and 24-week virological response were individually associated with SVR but this association was not signif icant on multivariate analysis. Eleven patients (37%) discontinued therapy due to adverse effects. Cytopenias were the most common and most severe adverse effect, and required frquent growth factor use, dose adjustments and treatment cessations. The risk of rejection was not increased.CONCLUSION: Recurrent HCV after LT can be safely treated with extended virological responseguided therpy using PEG/RBV, but requires close monitoring for treatment-related adverse effects, particularly cytopenias.
基金supported by the National Key R&D Program of China(No.2016YFB0800700)
文摘Network protocols are divided into stateless and stateful. Stateful network protocols have complex communication interactions and state transitions. However, the existing network protocol fuzzing does not support state transitions very well. This paper focuses on this issue and proposes the Semi-valid Fuzzing for the Stateful Network Protocol (SFSNP). The SFSNP analyzes protocol interactions and builds an extended finite state machine with a path marker for the network protocol; then it obtains test sequences of the extended finite state machine, and further performs the mutation operation using the semi-valid algorithm for each state transition in the test sequences; finally, it obtains fuzzing sequences. Moreover, because different test sequences may have the same state transitions, the SFSNP uses the state transition marking algorithm to reduce redundant test cases. By using the stateful rule tree of the protocol, the SFSNP extracts the constraints in the protocol specifications to construct semi-valid fuzz testing cases within the sub-protocol domain, and finally forms fuzzing sequences. Experimental results indicate that the SFSNP is reasonably effective at reducing the quantity of generated test cases and improving the quality of fuzz testing cases. The SFSNP can reduce redundancy and shorten testing time.
文摘目的构建脑卒中偏瘫患者中医延续护理方案,为脑卒中偏瘫患者中医延续护理实践提供参考。方法在文献分析的基础上,采用德尔菲法对20名专家进行2轮函询。结果2轮专家函询问卷回收率分别为100%和95%。最终构建了含6个一级条目,20个二级条目,52个三级条目的脑卒中偏瘫患者中医特色延续护理方案,权威系数分别为0.860和0.900,Kendall s W分别为0.280和0.319,P<0.01。结论本研究构建的脑卒中偏瘫患者中医特色延续护理方案,结果可靠、科学,具有一定的可行性。
文摘This paper proposes an improved non-repudiation protocol after pointing out two attacks on an existing non-repudiation protocol. To analyze the improved protocol, it also proposes an extension of Kailar logic. Using the extended Kailar logic, the security analysis of the improved prototocol has been presented. Key words non-repudiation protocol - extended Kailar logic - converse assumption procedure CLC number TP 393. 08 Foundation item: Supported by the National Natural Science Foundation of China (90104005) and the Doctoral Science Foundation of Ministry of Education (20020486046)Biography: Li Li(1976-), female, Ph. D candidate, research direction: network security and formal analysis of security protocol.
文摘Over time, the world has transformed digitally and there is total dependence on the internet. Many more gadgets are continuously interconnected in the internet ecosystem. This fact has made the Internet a global information source for every being. Despite all this, attacker knowledge by cybercriminals has advanced and resulted in different attack methodologies on the internet and its data stores. This paper will discuss the origin and significance of Denial of Service (DoS) and Distributed Denial of Service (DDoS). These kinds of attacks remain the most effective methods used by the bad guys to cause substantial damage in terms of operational, reputational, and financial damage to organizations globally. These kinds of attacks have hindered network performance and availability. The victim’s network is flooded with massive illegal traffic hence, denying genuine traffic from passing through for authorized users. The paper will explore detection mechanisms, and mitigation techniques for this network threat.