Search for tag: "attack"

Strategic Mastery in Terminal: A Novel Reinforcement Learning Approach to Tower-Defense Gameplay, Shivam Kak, UG '26, Ishaan Javali, UG '26, Yagiz Devre, UG '26 (5EE515B6)

From chess to Atari to AlphaGo, performance in games has been a benchmark of performance for machine learning. Terminal is a tower-defense game where players submit algorithms that play against each…

+19 More
From  Research Princeton Research Day 1 likes 27 plays

DeCenter Seminar: "Blockchain does not operate in a vacuum: an internet perspective"

+23 More
From  Broadcast Broadcast Center Staff 0 likes 13 plays

OURSIP Intern - Felix Xu

New Approaches to Quaternary C-C Bond Formation via Iron Metallaphotoredox Catalysis Advised by: Prof. David W.C. MacMillan, Chemistry Andria Pace, Chemistry

+19 More
From  our Undergraduate Research 0 likes 30 plays

Knot The Average Boat: Development of a Semi-Autonomous Sailing Platform, Jeb Carter, UG '23 (2985750)

The problem of autonomous sailing is a complex and challenging one. There are nearly countless possible environmental and telemetry sensors that can be implemented, each with varying challenges and…

+25 More
From  Research Princeton Research Day 2 likes 55 plays

How do we know what we know? -- as a mathematical question. Designing knowledge assumptions and asymmetric encryption schemes in lattice-based cryptography., Yuxi Zheng, UG '23 (2279885)

Assumptions of various hard problems are essential in modern cryptography. There is a group of assumptions known as the “knowledge assumptions.” They assume that in order for the…

+28 More
From  Research Princeton Research Day 4 likes 87 plays

Creating your Personal Risk Management Plan - Webinar

(InfoSec 201) Organizations look at their cybersecurity threats by identifying, analyzing, evaluating, and addressing risks. By assessing these risks, they can establish the likelihood and impact of…

From  Stefanie Clerkin 0 likes 49 plays

9.27.22 The Impact of the Attack in Benghazi and the War in Libya on American Domestic and Foreign Politics

+19 More
From  Broadcast Broadcast Center Staff 0 likes 26 plays

Quick Tip: MFA Fatigue Attacks

This series of short videos answers frequently asked information security questions and shares insights from professionals in the field. Join us as we ask the important questions and have some fun in…

From  Stefanie Clerkin 3 likes 451 plays

SmartCookie: Distributed In-Network SYN Flooding Mitigation, Sophia Yoo, G2 (3938706)

SYN-flooding attacks, a pervasive class of DDoS attacks, target the TCP three-way handshake to exhaust server resources, leading to poor performance for legitimate clients. In this work, we present…

+19 More
From  Research Princeton Research Day 0 likes 122 plays

Shuwen Deng 03.21.2022 Job Talk P.2

+19 More
From  Broadcast Broadcast Center Staff 0 likes 81 plays

Shuwen Deng 03.21.2022 Job Talk P.1

+19 More
From  Broadcast Broadcast Center Staff 0 likes 68 plays

The complications of telling the story of 9/11 by Clifford Chanin

+19 More
From  Broadcast Broadcast Center Staff 0 likes 5 plays

Wintersession - Information Security in the News

As we enter 2022, we look back at the state of information security over the past few years. Coronavirus scams, the natural gas pipeline ransomware attack, foreign hacking groups, the SolarWinds…

From  Stefanie Clerkin 0 likes 14 plays

In Plain View - Open Source Intelligence

(InfoSec 201) Did you ever think about all of the data publicly available? What if bad actors collect this “open source intelligence” and use it to attack you or Princeton University? …

From  Stefanie Clerkin 0 likes 42 plays

Beowulf and Alien

Gina Brandolino compares Beowulf and Alien. View the full resource page here.

+24 More
From  Jonathan Henry 0 likes 147 plays

Webinar: Ask the ISO

Kick back, relax, and join us for an informal, live Q & A conversation. We’ll share answers to common questions we are asked and provide time for you to ask your questions about information…

+21 More
From  Stefanie Clerkin 0 likes 40 plays