Lecture 9: Malicious Software Wrap-up

I am a bit behind on the syllabus so, rather than starting Access Control, I finished-up the material on malicious software, including a description of a specific technique for indentifying metamorphic viruses (using Hidden Markov Models).