diff --git a/PhD/seminar/images/wein_1.svg b/PhD/seminar/images/wein_1.svg
new file mode 100644
index 0000000..78eb0ee
--- /dev/null
+++ b/PhD/seminar/images/wein_1.svg
@@ -0,0 +1,96 @@
+
+
+
+
diff --git a/PhD/seminar/images/wein_2.svg b/PhD/seminar/images/wein_2.svg
new file mode 100644
index 0000000..76be605
--- /dev/null
+++ b/PhD/seminar/images/wein_2.svg
@@ -0,0 +1,150 @@
+
+
+
+
diff --git a/PhD/seminar/images/wein_3.svg b/PhD/seminar/images/wein_3.svg
new file mode 100644
index 0000000..44eede4
--- /dev/null
+++ b/PhD/seminar/images/wein_3.svg
@@ -0,0 +1,166 @@
+
+
+
+
diff --git a/PhD/seminar/seminar.typ b/PhD/seminar/seminar.typ
index 4ae6855..3a34a76 100644
--- a/PhD/seminar/seminar.typ
+++ b/PhD/seminar/seminar.typ
@@ -37,11 +37,17 @@ Listed by Red Canary:
#uncover(2)[#align(center)[#text(fill:red, weight:"bold")[All Host-Based Methods!]]]
]
+#slide(title:"State of the IDS")[
+ #align(center)[You would not blindly trust the saying of a hostage, they might be speaking under threat]
+]
+
#slide(title:"Process List Verification")[
// We can't stop using the process list, so let's try to verify it
// Power as a trusted source of information
-#align(center)[#image("images/wein.svg", height:100%)]
-// add wein images that shows where other solutions are and show that with the right analysis tools, power side-channel is at the center.
+#only(1)[#align(center)[#image("images/wein_1.svg", height:100%)]]
+#only(2)[#align(center)[#image("images/wein_2.svg", height:100%)]]
+#only(3)[#align(center)[#image("images/wein_3.svg", height:100%)]]
+
]
#slide(title:"Power Side-Channel")[