-
1.
公开(公告)号:US20120309750A1
公开(公告)日:2012-12-06
申请号:US13579507
申请日:2011-02-17
申请人: Jae-Hoon Kang , Hong-Sub Lee , Jin-Sun Kwon , Joon-Tae Park , Chang-Sung Hong , Dong-Hyung Sin , Soo-Jung Hong , An-Na Moon , Jin-Ah Jeong , Sung-Wook Kwon
发明人: Jae-Hoon Kang , Hong-Sub Lee , Jin-Sun Kwon , Joon-Tae Park , Chang-Sung Hong , Dong-Hyung Sin , Soo-Jung Hong , An-Na Moon , Jin-Ah Jeong , Sung-Wook Kwon
IPC分类号: C07D413/14 , C07D413/04 , A61P35/00 , C07D417/14 , A61K31/541 , A61K31/5377 , A61K31/422
CPC分类号: C07D261/18 , A61K31/422 , A61K31/5377 , C07D403/04 , C07D409/04 , C07D413/04 , C07D413/14
摘要: Disclosed are a novel 5-membered heterocycle derivatives of Formula I, a tautomer, pharmaceutically acceptable salt, prodrug thereof and a pharmaceutical use thereof. The 5-membered heterocycle derivatives of Formula I, a tautomer, pharmaceutically acceptable salt, prodrug thereof and compositions containing them are useful for treating a tumor.
摘要翻译: 公开了式I的新的5元杂环衍生物,其互变异构体,药学上可接受的盐,前药及其药学用途。 式I的5元杂环衍生物,互变异构体,药学上可接受的盐,前药以及含有它们的组合物可用于治疗肿瘤。
-
2.
公开(公告)号:US20050144480A1
公开(公告)日:2005-06-30
申请号:US11009207
申请日:2004-12-10
申请人: Young Tae Kim , Ho Jae Lee , Chung Sup Choi , Kang Shin Lee , Hong Sub Lee
发明人: Young Tae Kim , Ho Jae Lee , Chung Sup Choi , Kang Shin Lee , Hong Sub Lee
CPC分类号: H04L63/1433 , G06N7/005
摘要: The present invention relates to a method of risk analysis in an automatic intrusion response system that provides computer-related security in a large scale dynamic network environment, comprising: (a) classifying intrusion detection information by using IDMEF data model; (b) establishing a risk assessment knowledge base; (c) learning rules of said knowledge base; and (d) assessing the risk level of an external attack based upon said knowledge base. Said risk level is determined by parameters such as intrusion detection information, weakness information, network bandwidth, system performance and importance, and frequency of attacks, etc.
摘要翻译: 本发明涉及一种在大规模动态网络环境中提供计算机相关安全性的自动入侵应答系统中的风险分析方法,包括:(a)通过使用IDMEF数据模型对入侵检测信息进行分类; (b)建立风险评估知识库; (c)知识库的学习规则; 和(d)根据所述知识库评估外部攻击的风险等级。 所述风险等级由诸如入侵检测信息,弱点信息,网络带宽,系统性能和重要性以及攻击频率等参数确定。
-