Biological Approaches to Computer Security: Winter 2012: Difference between revisions

From Soma-notes
Line 22: Line 22:
     </th>
     </th>
   </tr>
   </tr>
    <tr>
      <td>
      <p>Jan. 4, 6
      </p>
      </td>
      <td>
      <p>Introduction
      </p>
      </td>
      <td>
      <p>Tierra
      </p>
      </td>
      <td>
      <p>[[BioSec: Artificial Life|Artificial Life Notes]]
      </p>
      </td>
    </tr>
     <tr>
     <tr>
       <td>
       <td>
Line 36: Line 54:
       </td>
       </td>
       <td>
       <td>
       <p>[[BioSec: Evolution|BioSec notes on Evolution]]
       <p>[[BioSec: Evolution|Evolution Notes]]
       </p>
       </p>
       </td>
       </td>
     </tr>
     </tr>
</table>
</table>

Revision as of 23:17, 7 January 2012

This is the main page for the Winter 2012 run of Carleton University's Biological Approaches to Computer Security (COMP 5900X). The instructor for this course is Anil Somayaji.

Course Outline

The course outline for this course can be found here.

Readings

Week

Topics

Readings

Notes

Jan. 4, 6

Introduction

Tierra

Artificial Life Notes

Jan. 11,13

Evolution

Darwin, The Origin of Species, 6th Ed., Chapter 1

Evolution Notes