Attack Mechanism
نویسندگان
چکیده
The attack mechanism of complement (1) has been defined as those complement proteins the binding of which to the target membrane is necessary for the production of membrane damage. I t is distinguished from the recognition and activation mechanisms of complement which, although capable of attaching to the target cell, may act from the fluid phase or from the surface of another cell. Earlier work (2) demonstrated that the attack mechanism is comprised of five different components, namely C5,1 C6, C7, C8, and C9. The present study was designed to obtain information which pertains to the molecular arrangement of these five proteins on a membrane under attack by complement. The accumulated evidence strongly suggests that the membrane-bound attack mechanism consists of a compact decamolecular assemblage with a total molecular weight of approximately 1 million. Previous investigations have shown a requirement of protein binding to the target cell for expression of hemolytic activity for C5 (3-5), C6 (6, 7), 2 C8(8), and C9 (9). They have also pointed out a functional interdependence between C5, C6, and C7 (3), particularly in the formation of ECS, 6, 73 (2, 6). In addition, these three proteins were found to have an affinity for each other in free solution, enabling them to enter into reversible protein-protein interactions (3).2 Such interaction has recently been demonstrated to occur also between C8 and C9. 4 Thus information published to date raised
منابع مشابه
A Mechanism for Detecting and Identifying DoS attack in VANET
VANET (Vehicular Ad-hoc Network) which is a hy- brid network (combination of infrastructure and infra- structure-less networks) is an emergent technology with promising future as well as great challenges especially in security. By the other hand this type of network is very sensible to safety problem. This paper focuses on a new mechanism for DoS (denial of service) attacks on the physical and ...
متن کاملAnomaly-based Web Attack Detection: The Application of Deep Neural Network Seq2Seq With Attention Mechanism
Today, the use of the Internet and Internet sites has been an integrated part of the people’s lives, and most activities and important data are in the Internet websites. Thus, attempts to intrude into these websites have grown exponentially. Intrusion detection systems (IDS) of web attacks are an approach to protect users. But, these systems are suffering from such drawbacks as low accuracy in ...
متن کاملA Mechanism for Detecting and Identifying DoS attack in VANET
VANET (Vehicular Ad-hoc Network) which is a hy- brid network (combination of infrastructure and infra- structure-less networks) is an emergent technology with promising future as well as great challenges especially in security. By the other hand this type of network is very sensible to safety problem. This paper focuses on a new mechanism for DoS (denial of service) attacks on the physical and ...
متن کاملTime and Space Complexity Reduction of a Cryptanalysis Algorithm
Binary Decision Diagram (in short BDD) is an efficient data structure which has been used widely in computer science and engineering. BDD-based attack in key stream cryptanalysis is one of the best forms of attack in its category. In this paper, we propose a new key stream attack which is based on ZDD(Zero-suppressed BDD). We show how a ZDD-based key stream attack is more efficient in time and ...
متن کاملAn Experimental and Theoretical Investigation of Corrosion Mechanism in a Metallic Stack
This paper presents an experimental and theoretical investigation of the causes of corrosion of stack in a cement plant. In this paper, information related to metallic stack failures are given in the form of a case study in Neka Cement Plant, Mazandaran, Iran. Heavy corrosion attacks were observed on the samples of stack. The failure can be caused by one or more modes such as overheating, stres...
متن کاملTime and Space Complexity Reduction of a Cryptanalysis Algorithm
Binary Decision Diagram (in short BDD) is an efficient data structure which has been used widely in computer science and engineering. BDD-based attack in key stream cryptanalysis is one of the best forms of attack in its category. In this paper, we propose a new key stream attack which is based on ZDD(Zero-suppressed BDD). We show how a ZDD-based key stream attack is more efficient in time and ...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
عنوان ژورنال:
دوره شماره
صفحات -
تاریخ انتشار 2003