|1||6/11/2008||Introduction||Presentation of workshop's goals, methodologies and requirements.
Overview of the suggested projects and introduction to the topics covered in them.
|2||13/11/2008||Invited Talk||Code-based Intrusion Detection for Linux by Ohad Ben-Cohen.||Class|
|3||20/11/2008||Approval||Group formation and project selection.||By email or individual meeting|
|4||27/11/2008||Work plan||Groups present a working plan. Project should be well defined at this point, maybe with some mock-up screenshots.||Class|
|6||11/12/2008||Discussion 1/4||Groups present their progress in class.||Class|
|8||25/12/2008||Discussion 2/4||Groups present their progress in class.||Class|
|10||8/1/2009||Discussion 3/4||Groups present their progress in class.||Class|
|12||22/1/2009||Discussion 4/4||Groups present their progress in class.||Class|
|13||29/1/2009||Presentation||Projects presented in for last-minute feedback.||Class|
|*||5/2/2009||Submission Deadline||Projects presented to Oded and Rani for grading.||Individual meeting|