Learn More
| This paper presents a new approach to representing and detecting computer penetrations in real-time. The approach, called state transition analysis, models penetrations as a series of state changes that lead from an initial secure state to a target compromised state. State transition diagrams, the graphical representation of penetrations, identify(More)
iii This page is intentionally left blank iv c Copyright b y Koral Ilgun 1992 v This page is intentionally left blank vi ABSTRACT Ustat A Real-time Intrusion Detection System for UNIX by Koral Ilgun This thesis presents the design and implementation of a real-time intrusion detection tool called Ustat, a State Transition Analysis Tool for UNIX. The original(More)
BACKGROUND/AIMS Gallbladder emptying abnormalities are common in patients with diabetes mellitus, and it has been hypothesized that they contribute to the increased incidence of gallbladder stones and biliary pain observed in these patients. Cisapride is a drug that exerts a prokinetic effect in both animals and humans. Recently, we demonstrated that(More)
  • 1