From: John Young <jya@pipeline.com>
To: cypherpunks@toad.com
Message Hash: 8465e66b6b83793de0d08a03d5ed43b35480e1c5c9e361e2867087f5fae2cae8
Message ID: <199511260016.TAA27186@pipe4.nyc.pipeline.com>
Reply To: N/A
UTC Datetime: 1995-11-26 00:26:54 UTC
Raw Date: Sun, 26 Nov 1995 08:26:54 +0800
From: John Young <jya@pipeline.com>
Date: Sun, 26 Nov 1995 08:26:54 +0800
To: cypherpunks@toad.com
Subject: AI and Author-ID Security
Message-ID: <199511260016.TAA27186@pipe4.nyc.pipeline.com>
MIME-Version: 1.0
Content-Type: text/plain
The AI and author-ID security programs covered in the Nov
17 Science article are described in detail at:
<http://www.cs.purdue.edu/coast/coast.html>
Active Defense of a Computer System Using Autonomous Agents
Mark Crosbie and E. H. Spafford; Department of
Computer Sciences, Purdue University; CSD-TR-95-008;
1995.
Defending a Computer System Using Autonomous Agents
Mark Crosbie and E. H. Spafford; Department of Computer
Sciences, Purdue University; CSD-TR-95-022; 1995.
Authorship Analysis: Identifying the Author of a Program
Ivan Krsul; Department of Computer Sciences, Purdue
University; MS Thesis; CSD-TR-94-030; 1994.
Return to November 1995
Return to “John Young <jya@pipeline.com>”
1995-11-26 (Sun, 26 Nov 1995 08:26:54 +0800) - AI and Author-ID Security - John Young <jya@pipeline.com>