diff --git a/PhD/seminar/images/equation.svg b/PhD/seminar/images/equation.svg
new file mode 100644
index 0000000..ebbdd10
--- /dev/null
+++ b/PhD/seminar/images/equation.svg
@@ -0,0 +1,281 @@
+
+
+
+
diff --git a/PhD/seminar/images/equation_1.svg b/PhD/seminar/images/equation_1.svg
new file mode 100644
index 0000000..0f1f184
--- /dev/null
+++ b/PhD/seminar/images/equation_1.svg
@@ -0,0 +1,51 @@
+
+
+
+
diff --git a/PhD/seminar/images/equation_2.svg b/PhD/seminar/images/equation_2.svg
new file mode 100644
index 0000000..41e37e6
--- /dev/null
+++ b/PhD/seminar/images/equation_2.svg
@@ -0,0 +1,100 @@
+
+
+
+
diff --git a/PhD/seminar/seminar.typ b/PhD/seminar/seminar.typ
index d8d824a..3bcd37d 100644
--- a/PhD/seminar/seminar.typ
+++ b/PhD/seminar/seminar.typ
@@ -53,7 +53,15 @@ Listed by Red Canary:
]
#slide(title:"State of the IDS")[
- #align(center)[You would not blindly trust the saying of a hostage, they might be speaking under threat]
+ #align(center)[
+You would not blindly trust the saying of a hostage, they might be speaking under threat.
+
+#uncover(2)[
+#sym.arrow
+
+You should not trust data comming from a the device to protect, it might have been tampered with.
+]
+]
]
#slide(title:"Process List Verification")[
@@ -87,10 +95,22 @@ Power is:
#slide(title:"Problem Statement")[
]
+
+#slide(title: "Input Data - Power")[
+]
+
+#slide(title: "Input Data - Processes")[
+]
+
+#slide(title: "Process List")[
+
+]
+
+
#slide(title:"Proposed Approach")[
-// Proposed approach
-//
-]
+#only(1)[#align(center)[#image("images/equation_1.svg", width:100%)]]
+#only(2)[#align(center)[#image("images/equation_2.svg", width:100%)]]
+]
#slide(title:"Evaluation")[
]