Professional Documents
Culture Documents
CSC602.6:- Examine
malicious code using System Security:-Buffer Overflow, malicious Programs: Worms and Viruses, SQL
system security concepts injection
•Example Problems.
CSC604.3: Apply an •Uninformed Search Methods: Breadth First Search (BFS), Depth First Search
appropriate informed / (DFS), Depth Limited Search, Depth First Iterative Deepening (DFID), Informed
uninformed / heuristic Search Methods: Greedy best first Search, A* Search, Memory bounded heuristic
searching technique for Search.
solving given problem. •Local Search Algorithms and Optimization Problems: Hill climbing search
Simulated annealing, Genetic algorithms.