RISS 학술연구정보서비스

검색
다국어 입력

http://chineseinput.net/에서 pinyin(병음)방식으로 중국어를 변환할 수 있습니다.

변환된 중국어를 복사하여 사용하시면 됩니다.

예시)
  • 中文 을 입력하시려면 zhongwen을 입력하시고 space를누르시면됩니다.
  • 北京 을 입력하시려면 beijing을 입력하시고 space를 누르시면 됩니다.
닫기
    인기검색어 순위 펼치기

    RISS 인기검색어

      검색결과 좁혀 보기

      선택해제
      • 좁혀본 항목 보기순서

        • 원문유무
        • 원문제공처
          펼치기
        • 등재정보
          펼치기
        • 학술지명
          펼치기
        • 주제분류
          펼치기
        • 발행연도
          펼치기
        • 작성언어
        • 저자
          펼치기

      오늘 본 자료

      • 오늘 본 자료가 없습니다.
      더보기
      • 무료
      • 기관 내 무료
      • 유료
      • Is the Tumor Infiltrating Natural Killer Cell (NK-TILs) Count in Infiltrating Ductal Carcinoma of Breast Prognostically Significant?

        Rathore, Ankita Singh,Goel, Madhu Mati,Makker, Annu,Kumar, Sandeep,Srivastava, Anand Narain Asian Pacific Journal of Cancer Prevention 2014 Asian Pacific journal of cancer prevention Vol.15 No.8

        Purpose: The aim of this study was to investigate the prognostic significance of the CD56+NK-TIL count in infiltrating ductal carcinoma (IDC) of breast. Material and Methods: Immunohistochemistry (IHC) was performed using antibodies specific for CD56 on formalin-fixed and paraffin-embedded tissue sections of 175 infiltrating ductal carcinomas (IDC) of breast. Distribution of intratumoral and stromal CD56+NK-TILs was assessed semi-quantitatively. Results: A low intratumoral CD56+count showed significant and inverse associations with tumor grade, stage, and lymph node status, whereas it had significant and direct association with response to treatment indicating good prognosis. These patients had better survival (${\chi}^2$=4.80, p<0.05) and 0.52 fold lower death rate (HR=0.52, 95% CI=0.28-0.93) as compared to patients with high CD56+ intratumoral count. The association of survival was insignificant with low CD56 stromal count as compared to high CD56 stromal count (${\chi}^2$=1.60, p>0.05). Conclusion: To conclude, although NK-TIL count appeared as a significant predictor of prognosis, it alone may not be sufficient for predicting the outcome considering the fact that there exists a crosstalk between NK-TILs and the other immune infiltrating TILs.

      • SCOPUSKCI등재
      • KCI등재

        Distal Aortic Remodeling after Type A Dissection Repair: An Ongoing Mirage

        Rathore Kaushalendra Singh 대한흉부외과학회 2021 Journal of Chest Surgery (J Chest Surg) Vol.54 No.6

        Remodeling is a commonly encountered term in the field of cardiothoracic surgery that is often used to describe various pathophysiological changes in the dimension, structure, and function of various cardiac chambers, including the aorta. Stanford type A or DeBakey type 1 aortic dissection (TAAD) is a perplexing pathologic condition that can present sur- gical teams with the need to navigate a maze of complex decision-making. Ascending or hemi-arch replacement leaves behind a significant amount of distal diseased aortic tissue, which might have a persistent false lumen or primary or secondary intimal tears (or com- munications between lumina), which can lead to dilatation of the aortic arch. Unfavorable aortic remodeling is a major cause of distal aortic deterioration after the index surgery. Cardiac surgeons are aware of post-surgical cardiac chamber remodeling, but the concept of distal aortic remodeling is still idealized. The contemporary literature from established aortic centers supports aggressive management of the residual aortic pathology during the index surgery, and with continuing technical advancements, endovascular stenting options are readily available for patients with TAAD or for complicated type B aortic dissec- tion cases. This review discusses the pathophysiology and treatment options for favorable distal aortic remodeling, as well as its impact on mid- to long-term outcomes following TAAD repair.

      • SCISCIESCOPUS

        Dual-color imaging of cytosolic and mitochondrial zinc ions in live tissues with two-photon fluorescent probes

        Rathore, Kailash,Lim, Chang Su,Lee, Young,Cho, Bong Rae The Royal Society of Chemistry 2014 Organic & Biomolecular Chemistry Vol.12 No.21

        <P>We report two-photon probes for Zn<SUP>2+</SUP> ions that can simultaneously detect cytosolic and mitochondrial Zn<SUP>2+</SUP> ions in live cells and living tissues at 115 mm depth by dual-color TPM imaging with minimum interference from other biologically relevant species.</P> <P>Graphic Abstract</P><P>We have developed TP probes for [Zn<SUP>2+</SUP>]<SUB>cyto</SUB> and [Zn<SUP>2+</SUP>]<SUB>mito</SUB>, which emit TPEF at widely-separated wavelength regions. The new probes can simultaneously detect [Zn<SUP>2+</SUP>]<SUB>cyto</SUB> and [Zn<SUP>2+</SUP>]<SUB>mito</SUB> in live cells, as well as in living tissues by dual-color TPM imaging. <IMG SRC='http://pubs.rsc.org/services/images/RSCpubs.ePlatform.Service.FreeContent.ImageService.svc/ImageService/image/GA?id=c4ob00101j'> </P>

      • SCISCIESCOPUS

        Social network security: Issues, challenges, threats, and solutions

        Rathore, S.,Sharma, P.K.,Loia, V.,Jeong, Y.S.,Park, J.H. Elsevier science 2017 Information sciences Vol.421 No.-

        <P>Social networks are very popular in today's world. Millions of people use various forms of social networks as they allow individuals to connect with friends and family, and share private information. However, issues related to maintaining the privacy and security of a user's information can occur, especially when the user's uploaded content is multimedia, such as photos, videos, and audios. Uploaded multimedia content carries information that can be transmitted virally and almost instantaneously within a social networking site and beyond. In this paper, we present a comprehensive survey of different security and privacy threats that target every user of social networking sites. In addition, we separately focus on various threats that arise due to the sharing of multimedia content within a social networking site. We also discuss current state-of- the-art defense solutions that can protect social network users from these threats. We then present future direction and discuss some easy-to-apply response techniques to achieve the goal of a trustworthy and secure social network ecosystem. (C) 2017 Elsevier Inc. All rights reserved.</P>

      • SCOPUSKCI등재

        XSSClassifier: An Efficient XSS Attack Detection Approach Based on Machine Learning Classifier on SNSs

        Rathore, Shailendra,Sharma, Pradip Kumar,Park, Jong Hyuk Korea Information Processing Society 2017 Journal of information processing systems Vol.13 No.4

        Social networking services (SNSs) such as Twitter, MySpace, and Facebook have become progressively significant with its billions of users. Still, alongside this increase is an increase in security threats such as cross-site scripting (XSS) threat. Recently, a few approaches have been proposed to detect an XSS attack on SNSs. Due to the certain recent features of SNSs webpages such as JavaScript and AJAX, however, the existing approaches are not efficient in combating XSS attack on SNSs. In this paper, we propose a machine learning-based approach to detecting XSS attack on SNSs. In our approach, the detection of XSS attack is performed based on three features: URLs, webpage, and SNSs. A dataset is prepared by collecting 1,000 SNSs webpages and extracting the features from these webpages. Ten different machine learning classifiers are used on a prepared dataset to classify webpages into two categories: XSS or non-XSS. To validate the efficiency of the proposed approach, we evaluated and compared it with other existing approaches. The evaluation results show that our approach attains better performance in the SNS environment, recording the highest accuracy of 0.972 and lowest false positive rate of 0.87.

      • SCIESCOPUS
      • Real-time secure communication for Smart City in high-speed Big Data environment

        Rathore, M. Mazhar,Paul, Anand,Ahmad, Awais,Chilamkurti, Naveen,Hong, Won-Hwa,Seo, HyunCheol Elsevier 2018 Future generation computer systems Vol.83 No.-

        <P><B>Abstract</B></P> <P>The recent development in the technology brings the concept of Smart City that is achieved through real-time city related intelligent decisions by analyzing the data harvested from various smart systems in the city using millions of sensors and devices connected over the Internet, termed as Internet of Things (IoT). These devices generate the overwhelming volume of high-speed streaming data, termed as Big Data. However, the generation of city data at a remote location and then transmitting it to central city servers for analysis purpose raises the concerns of security and privacy. On the other hand, providing security to such Big Data streaming requires a high-speed security system that can work in a real-time environment without providing any delay that may slow down the overall performance of the Smart City System. To overthrown these challenges, in this paper, we proposed an efficient and real-time Smart City security system by providing strong intrusion detection at intelligent city building (ICB) and also a security protocol to protect the communication between the remote smart system(RSS)/User and the city analysis building, i.e., ICB. The proposed communication security protocol consists of various phases, i.e., registration phase, session key exchange phase, session key revocation phase, and data transmission phases from RSS to ICB as well as from User to ICB. Vast security analyses are performed to evaluate the credibility of the system. The proposed system is also evaluated on efficiency in terms of computation cost and throughput of overall functions used in the system. The system’s evaluation and the comparative study with existing system show that the prosed system is secure, more efficient, and able to work in a real-time, high-speed Smart City environment.</P> <P><B>Highlights</B></P> <P> <UL> <LI> This paper presents a system architecture that integrate Smart City with technical network. </LI> <LI> A Novel notion of Smart-City Network is defined by Communication Security. </LI> <LI> Intelligent Smart Building Architecture with Remote Smart System. </LI> <LI> The system is also implemented of Smart City Decision are done on top of Hadoop parallel nodes. </LI> </UL> </P>

      • SCIESCOPUS

        BlockSecIoTNet: Blockchain-based decentralized security architecture for IoT network

        Rathore, Shailendra,Wook Kwon, Byung,Park, Jong Hyuk Academic Press 2019 Journal of network and computer applications Vol.143 No.-

        <P><B>Abstract</B></P> <P>The exponential growth of the use of insecure stationary and portable devices in the Internet of Things (IoT) network of the smart city has made the security of the smart city against cyber-attacks a vital issue. Various mechanisms for detecting security attacks that rely on centralized and distributed architectures have already been proposed, but they tend to be inefficient due to such problems as storage constraints, the high cost of computation, high latency, and a single point of failure. Moreover, existing security mechanisms are faced with the issue of monitoring and collecting historic data throughout the entire IoT network of the smart city in order to deliver optimal security and defense against cyberattacks. To address the current challenges, this paper proposes a decentralized security architecture based on Software Defined Networking (SDN) coupled with a blockchain technology for IoT network in the smart city that relies on the three core technologies of SDN, Blockchain, and Fog and mobile edge computing in order to detect attacks in the IoT network more effectively. Thus, in the proposed architecture, SDN is liable to continuous monitoring and analysis of traffic data in the entire IoT network in order to provide an optimal attack detection model; Blockchain delivers decentralized attack detection to mitigate the “single point of failure” problem inherent to the existing architecture; and Fog and mobile edge computing supports attack detection at the fog node and, subsequently, attack mitigation at the edge node, thus enabling early detection and mitigation with lesser storage constraints, cheaper computation, and low latency. To validate the performance of the proposed architecture, it was subjected to an experimental evaluation, the results of which show that it outperforms both centralized and distributed architectures in terms of accuracy and detection time.</P>

      연관 검색어 추천

      이 검색어로 많이 본 자료

      활용도 높은 자료

      해외이동버튼