Learn More
Glycosylation analysis of the flagellin from the Gram-positive species Clostridium tyrobutyricum has been supplemented. Amino acid analysis of the glycopeptides obtained after pronase digestion of flagellin indicated that O-glycosylation which was previously demonstrated after nonreductive beta-elimination, probably occurred via the hydroxyl group of(More)
Previous studies have revealed that hematological disorders associated with trichothecenes intoxication in humans could result from hematopoiesis inhibition. The most frequent and potent trichothecene mycotoxins are T-2 toxin and deoxynivalenol (DON), respectively. Apoptosis induction by these two toxins was investigated in vitro on human hematopoietic(More)
The success of a security attack crucially depends on time: the more time available to the attacker, the higher the probability of a successful attack; when given enough time, any system can be compromised. Insight in time-dependent behaviors of attacks and the evolution of the attacker's success as time progresses is therefore a key for effective(More)
Effective risk management is a key to ensure that our nuclear power plants, medical equipment, and power grids are dependable; and it is often required by law. Fault Tree Analysis (FTA) is a widely used methodology here, computing important dependability measures like system reliability. This paper presents DFTCalc, a powerful tool for FTA, providing (1)(More)
The monoclonal antibody 21E7-B12 (IgG3) can be used in a direct method of Clostridium tyrobutyricum detection based on an immunoenzymatic assay. Immunoelectron microscopy demonstrated that the 21E7-B12 antibody recognized the surface-exposed epitopes on the flagellar filaments of C. tyrobutyricum. After flagellar extraction, the purified flagellin showed an(More)
The normal procedure for bacterial colony detection requires a nitrocellulose transfer step after membrane filtration and culture to prevent the development of a high background during the immunodetection. In this paper, we describe a modification of the basic protocol that omits the transfer step and reduces the risk of background. Previous observations(More)
Effective risk management is a key to ensure that vital assets like our nuclear power plants, medical equipment, and power grids are dependable. Also, risk management is often required by law. Fault Tree Analysis (FTA) is a widely used methodology here, computing important dependability measures like system reliability and availability. This paper presents(More)
Existing penetration testing approaches assess the vulnerability of a system by determining whether certain attack paths are possible in practice. Thus, penetration testing has so far been used as a qualitative research method. To enable quantitative approaches to security risk management, including decision support based on the cost-effectiveness of(More)