Search for tag: "attack"

Strategic Mastery in Terminal: A Novel Reinforcement Learning Approach to Tower-Defense Gameplay, Shivam Kak, UG '26, Ishaan Javali, UG '26, Yagiz Devre, UG '26 (5EE515B6)

From chess to Atari to AlphaGo, performance in…

+19 More
From  Research Princeton Research Day 1 likes 33 plays

DeCenter Seminar: "Blockchain does not operate in a vacuum: an internet perspective"

+23 More
From  Broadcast Broadcast Center Staff 0 likes 13 plays

OURSIP Intern - Felix Xu

New Approaches to Quaternary C-C Bond Formation…

+19 More
From  our Undergraduate Research 0 likes 43 plays

Knot The Average Boat: Development of a Semi-Autonomous Sailing Platform, Jeb Carter, UG '23 (2985750)

The problem of autonomous sailing is a complex…

+25 More
From  Research Princeton Research Day 2 likes 55 plays

How do we know what we know? -- as a mathematical question. Designing knowledge assumptions and asymmetric encryption schemes in lattice-based cryptography., Yuxi Zheng, UG '23 (2279885)

Assumptions of various hard problems are…

+28 More
From  Research Princeton Research Day 4 likes 89 plays

Creating your Personal Risk Management Plan - Webinar

(InfoSec 201) Organizations look at their…

From  Stefanie Clerkin 0 likes 53 plays

9.27.22 The Impact of the Attack in Benghazi and the War in Libya on American Domestic and Foreign Politics

+19 More
From  Broadcast Broadcast Center Staff 0 likes 26 plays

Quick Tip: MFA Fatigue Attacks

This series of short videos answers frequently…

From  Stefanie Clerkin 3 likes 511 plays

SmartCookie: Distributed In-Network SYN Flooding Mitigation, Sophia Yoo, G2 (3938706)

SYN-flooding attacks, a pervasive class of DDoS…

+19 More
From  Research Princeton Research Day 0 likes 128 plays

The complications of telling the story of 9/11 by Clifford Chanin

+19 More
From  Broadcast Broadcast Center Staff 0 likes 5 plays

Wintersession - Information Security in the News

As we enter 2022, we look back at the state of…

From  Stefanie Clerkin 0 likes 14 plays

In Plain View - Open Source Intelligence

(InfoSec 201) Did you ever think about all of the…

From  Stefanie Clerkin 0 likes 42 plays

Beowulf and Alien

Gina Brandolino compares Beowulf and Alien. View…

+24 More
From  Jonathan Henry 0 likes 154 plays

Webinar: Ask the ISO

Kick back, relax, and join us for an informal,…

+21 More
From  Stefanie Clerkin 0 likes 41 plays

CITP Seminar: Shaanan Cohney - Leaving Randomness to Chance: Standards Shortcomings and Buried Backdoors in Random Number Generators

Security is too important to leave to chance. …

From  CI Center for Information Technology Policy 0 likes 15 plays

Webinar: Spotting and Preventing Social Engineering Attacks

(InfoSec 101) Millions of dollars are lost every…

+21 More
From  Tara Schaufler 0 likes 71 plays