Objective:To evaluate the effect of ethanolic extract of Phyllanthus niruri.Linn(Euphorbiaceae) on experimentally induced burn wound model in rats and to evaluate whether it reverses the wound healing in steroid suppr...Objective:To evaluate the effect of ethanolic extract of Phyllanthus niruri.Linn(Euphorbiaceae) on experimentally induced burn wound model in rats and to evaluate whether it reverses the wound healing in steroid suppressed rats.Methods:Two models including burn wound model and dexamethasone suppressed bum wound model were used in the study.The formulations of ethanolic extract of Phyllanthus niruri were prepared in gum acacia at 8%and in ointment base at 10%and were administered orally(400 mg/kg) and externally respectively.The parameters studied were the wound contraction and the period of epithelialisation.Results:In bum wound model,oral and topical administration of Phyllanthus niruri did not show any significant effects in wound contraction and period of epithelialisation when compared to control.In dexamethasone suppressed burn wound model,wound contraction rate was increased significantly by topical(P 【 0.001) and oral(P 【 0.001) administrations of Phyllanthus niruri by about 47.57%and 26.16% respectively.Topical administration has shown significant(P 【 0.05) enhancement of wound contraction than oral dosage form.Dexamethasone depressed epithelialisation period was reversed significanUy by topical(P 【 0.0001) and oral(P 【0.001) administrations of Phyllanthus niruri by about 32.5%and 21.3%respectively.Conclusions:Both topical and oral administrations of ethanolic extract of Phyllanthus niruri are found to reverse dexamethasone suppressed burn wound healing.展开更多
With the evolution of cybersecurity countermeasures,the threat landscape has also evolved,especially in malware from traditional file-based malware to sophisticated and multifarious fileless malware.Fileless malware d...With the evolution of cybersecurity countermeasures,the threat landscape has also evolved,especially in malware from traditional file-based malware to sophisticated and multifarious fileless malware.Fileless malware does not use traditional executables to carry-out its activities.So,it does not use the file system,thereby evading signature-based detection system.The fileless malware attack is catastrophic for any enterprise because of its persistence,and power to evade any anti-virus solutions.The malware leverages the power of operating systems,trusted tools to accomplish its malicious intent.To analyze such malware,security professionals use forensic tools to trace the attacker,whereas the attacker might use anti-forensics tools to erase their traces.This survey makes a comprehensive analysis of fileless malware and their detection techniques that are available in the literature.We present a process model to handle fileless malware attacks in the incident response process.In the end,the specific research gaps present in the proposed process model are identified,and associated challenges are highlighted.展开更多
With the evolution of cybersecurity countermeasures,the threat landscape has also evolved,especially in malware from traditional file-based malware to sophisticated and multifarious fileless malware.Fileless malware d...With the evolution of cybersecurity countermeasures,the threat landscape has also evolved,especially in malware from traditional file-based malware to sophisticated and multifarious fileless malware.Fileless malware does not use traditional executables to carry-out its activities.So,it does not use the file system,thereby evading signature-based detection system.The fileless malware attack is catastrophic for any enterprise because of its persistence,and power to evade any anti-virus solutions.The malware leverages the power of operating systems,trusted tools to accomplish its malicious intent.To analyze such malware,security professionals use forensic tools to trace the attacker,whereas the attacker might use anti-forensics tools to erase their traces.This survey makes a comprehensive analysis of fileless malware and their detection techniques that are available in the literature.We present a process model to handle fileless malware attacks in the incident response process.In the end,the specific research gaps present in the proposed process model are identified,and associated challenges are highlighted.展开更多
文摘Objective:To evaluate the effect of ethanolic extract of Phyllanthus niruri.Linn(Euphorbiaceae) on experimentally induced burn wound model in rats and to evaluate whether it reverses the wound healing in steroid suppressed rats.Methods:Two models including burn wound model and dexamethasone suppressed bum wound model were used in the study.The formulations of ethanolic extract of Phyllanthus niruri were prepared in gum acacia at 8%and in ointment base at 10%and were administered orally(400 mg/kg) and externally respectively.The parameters studied were the wound contraction and the period of epithelialisation.Results:In bum wound model,oral and topical administration of Phyllanthus niruri did not show any significant effects in wound contraction and period of epithelialisation when compared to control.In dexamethasone suppressed burn wound model,wound contraction rate was increased significantly by topical(P 【 0.001) and oral(P 【 0.001) administrations of Phyllanthus niruri by about 47.57%and 26.16% respectively.Topical administration has shown significant(P 【 0.05) enhancement of wound contraction than oral dosage form.Dexamethasone depressed epithelialisation period was reversed significanUy by topical(P 【 0.0001) and oral(P 【0.001) administrations of Phyllanthus niruri by about 32.5%and 21.3%respectively.Conclusions:Both topical and oral administrations of ethanolic extract of Phyllanthus niruri are found to reverse dexamethasone suppressed burn wound healing.
文摘With the evolution of cybersecurity countermeasures,the threat landscape has also evolved,especially in malware from traditional file-based malware to sophisticated and multifarious fileless malware.Fileless malware does not use traditional executables to carry-out its activities.So,it does not use the file system,thereby evading signature-based detection system.The fileless malware attack is catastrophic for any enterprise because of its persistence,and power to evade any anti-virus solutions.The malware leverages the power of operating systems,trusted tools to accomplish its malicious intent.To analyze such malware,security professionals use forensic tools to trace the attacker,whereas the attacker might use anti-forensics tools to erase their traces.This survey makes a comprehensive analysis of fileless malware and their detection techniques that are available in the literature.We present a process model to handle fileless malware attacks in the incident response process.In the end,the specific research gaps present in the proposed process model are identified,and associated challenges are highlighted.
文摘With the evolution of cybersecurity countermeasures,the threat landscape has also evolved,especially in malware from traditional file-based malware to sophisticated and multifarious fileless malware.Fileless malware does not use traditional executables to carry-out its activities.So,it does not use the file system,thereby evading signature-based detection system.The fileless malware attack is catastrophic for any enterprise because of its persistence,and power to evade any anti-virus solutions.The malware leverages the power of operating systems,trusted tools to accomplish its malicious intent.To analyze such malware,security professionals use forensic tools to trace the attacker,whereas the attacker might use anti-forensics tools to erase their traces.This survey makes a comprehensive analysis of fileless malware and their detection techniques that are available in the literature.We present a process model to handle fileless malware attacks in the incident response process.In the end,the specific research gaps present in the proposed process model are identified,and associated challenges are highlighted.