Nitin Anand

Learn More
Evaluation of computing system security requires knowledge of the vulnerabilities present in the system and of potential attacks against the system. Vulnerabilities can be classified based on their location as application vulnerabil-ities, network vulnerabilities, or host vulnerabilities. This paper describes Ferret, a new software tool for checking host(More)
OBJECTIVE To explore the presentation behaviours and pathways to detection of adults who first presented to UK hospital eye services with severe glaucoma. DESIGN Semistructured interviews, based on models of diagnostic delay, to obtain a descriptive self-reported account of when and how participants' glaucoma was detected. RESULTS 11 patients(More)
PURPOSE To report long-term follow-up of zonulo-hyaloido-vitrectomy (ZHV) via anterior approach for pseudophakic malignant glaucoma refractory to medical treatment. DESIGN Noncomparative case-series. MATERIALS AND METHODS Medical records of 9 patients who sought treatment for aqueous humor misdirection refractory to medical treatment were reviewed. All(More)
PURPOSE To report the comparative efficacy and safety of intraoperative 5-fluorouracil (5-FU) or mitomycin C (MMC) in primary trabeculectomy in Nigeria. MATERIALS AND METHODS Retrospective chart review of patients undergoing primary antimetabolite trabeculectomy in Lagos, Nigeria between 1996 and 2003. We included 129 patients (132 eyes) of the 210(More)
This is a case report highlighting testicular semi-noma as a rare cause of Horner's syndrome. Introduction Horner's syndrome, first described in 1869 by a Swiss ophthalmologist, is a characteristic triad of features that results from an interruption of the sympathetic pathway. The ophthalmic manifestations arise due to paralysis of the sympathetically(More)
  • 1