Lecture 9: Malicious Software Wrap-up
I am a bit behind on the syllabus so, rather than starting Access Control, I finished-up the material on malicious software, including a description of a specific technique for indentifying metamorphic viruses (using Hidden Markov Models).
- Lecture 9 Notes (to appear)