Learn More
Alzheimer's amyloid precursor protein (APP), the precursor of beta-amyloid (Abeta), is an integral membrane protein with a receptor-like structure. We recently demonstrated that the mature APP (mAPP; N- and O-glycosylated form) is phosphorylated at Thr668 (numbering for APP695 isoform), specifically in neurons. Phosphorylation of mAPP appears to occur(More)
The most major threat of Android users is malware infection via Android application markets. In case of the Android Market, as security inspections are not applied for many users have uploaded applications. Therefore, malwares, e.g., Geimini and Droid Dream will attempt to leak personal information, getting root privilege, and abuse functions of the smart(More)
To realize the provision of secure Android applications, this paper proposes an application development and management system, or ADMS for short, that is operated and maintained by application developers and the market manager. ADMS requires (i) Android OS to be equipped with a "security manager", (ii) all application developers to embed a code for event(More)
Recently, there are many denial-of-service (DoS) attacks by computer viruses or botnet. DoS attacks to Web services are called HTTP-GET flood attack and threats of them increase day by day. In this type of attacks, malicious clients send a large number of HTTP-GET requests to the target Web server automatically. Since these HTTP-GET requests have legitimate(More)
Amyloid precursor-like proteins (APLPs), APLP1 and APLP2, are members of a gene family which include the Alzheimer beta-amyloid precursor protein (APP). APLP1, APLP2, and APP contain highly homologous amino acid sequences, especially in their cytoplasmic domains, although APLPs lack the beta-amyloid domain derived by proteolytic processing from APP. APP is(More)
Monitoring a process and its file I/O behaviors is important for security inspection for a data center server against intrusions, malware infection and information leakage. In the case of the Linux kernel 2.6, a set of hook functions called the Linux Security Module (LSM) has been implemented in order to monitor and control the system calls. By using the(More)
An authentication technique is an important issue for a wireless ad hoc network that is composed with unknown nodes. The self-organized public key management scheme that each node creates and manages certificates by itself has been proposed for the network that does not connect to the Internet with a certificate authority. However, it needs large time and(More)
An authentication technology such as public key infrastructure (PKI) is used for a server authentication. However, it does not certificate a status of a server side security countermeasures, e.g., a configuration and operating condition of a firewall (FW), a virus detection system (VDS) and an intrusion detection system (IDS). When a client machine(More)
  • 1