Learn More
Long electropherotype with Subgroup I specificity is a common feature of animal rotaviruses. In an epidemic of infantile gastroenteritis in Manipur, India, long but SG I strains predominated in the outbreak in the year 1987–88. One such strain isolated from that region, following the outbreak had G9P [19] specificity. As this is a rare combination, the gene(More)
A porcine Group A rotavirus strain (RU172) was detected and molecularly characterized during a surveillance study conducted for rotavirus infection in a pig farm located in a suburban area of Kolkata City, India. The G12 genotype specificity of RU172 was revealed by PCR-based genotyping assays following addition of a G12 type-specific primer (designed in(More)
Molecular characterization of two porcine group A rotavirus strains (HP113 and HP140), detected from eastern India, revealed a VP7 closely related to those of human G6P[14] strains, VP4 with a borderline P[13] genotype, and VP6 related to bovine and human SGI strains rather than porcine SGI and/or SGII group A rotaviruses. Both strains had NSP4 and NSP5 of(More)
In today's large and complex network scenario vulnerability scanners play a major role from security perspective by proactively identifying the known security problems or vulnerabilities that exists across a typical organizational network. Identifying vulnerabilities before they can be exploited by malicious user often helps to test, maintain, and assess(More)
In today's large complex enterprise network, security is a challenging task for most of the administrators. The typical means by which an attacker breaks into a network is through a series of exploits, where each exploit in the series satisfies the precondition for subsequent exploits and makes a causal relationship among them. Such a series of exploits(More)
In today's large complex organizational network, security is a challenging task for most of the administrators. The typical means by which an attacker breaks into a network is through a series of exploits, where each exploit in the series satisfies the pre-condition for subsequent exploits and makes a causal relationship among them. Such a series of(More)
  • 1