Biological Approaches to Computer Security: Winter 2012: Difference between revisions
Line 22: | Line 22: | ||
</th> | </th> | ||
</tr> | </tr> | ||
<tr> | |||
<td> | |||
<p>Jan. 4, 6 | |||
</p> | |||
</td> | |||
<td> | |||
<p>Introduction | |||
</p> | |||
</td> | |||
<td> | |||
<p>Tierra | |||
</p> | |||
</td> | |||
<td> | |||
<p>[[BioSec: Artificial Life|Artificial Life Notes]] | |||
</p> | |||
</td> | |||
</tr> | |||
<tr> | <tr> | ||
<td> | <td> | ||
Line 36: | Line 54: | ||
</td> | </td> | ||
<td> | <td> | ||
<p>[[BioSec: Evolution| | <p>[[BioSec: Evolution|Evolution Notes]] | ||
</p> | </p> | ||
</td> | </td> | ||
</tr> | </tr> | ||
</table> | </table> |
Revision as of 23:17, 7 January 2012
This is the main page for the Winter 2012 run of Carleton University's Biological Approaches to Computer Security (COMP 5900X). The instructor for this course is Anil Somayaji.
Course Outline
The course outline for this course can be found here.
Readings
Week |
Topics |
Readings |
Notes |
---|---|---|---|
Jan. 4, 6 |
Introduction |
Tierra |
|
Jan. 11,13 |
Evolution |
Darwin, The Origin of Species, 6th Ed., Chapter 1 |