Search for tag: "attack"
Strategic Mastery in Terminal: A Novel Reinforcement Learning Approach to Tower-Defense Gameplay, Shivam Kak, UG '26, Ishaan Javali, UG '26, Yagiz Devre, UG '26 (5EE515B6)From chess to Atari to AlphaGo, performance in games has been a benchmark of performance for machine learning. Terminal is a tower-defense game where players submit algorithms that play against each…
From Research Princeton Research Day
1 likes
27 plays
|
|
OURSIP Intern - Felix XuNew Approaches to Quaternary C-C Bond Formation via Iron Metallaphotoredox Catalysis Advised by: Prof. David W.C. MacMillan, Chemistry Andria Pace, Chemistry
From our Undergraduate Research
0 likes
30 plays
|
|
Knot The Average Boat: Development of a Semi-Autonomous Sailing Platform, Jeb Carter, UG '23 (2985750)The problem of autonomous sailing is a complex and challenging one. There are nearly countless possible environmental and telemetry sensors that can be implemented, each with varying challenges and…
From Research Princeton Research Day
2 likes
55 plays
|
|
How do we know what we know? -- as a mathematical question. Designing knowledge assumptions and asymmetric encryption schemes in lattice-based cryptography., Yuxi Zheng, UG '23 (2279885)Assumptions of various hard problems are essential in modern cryptography. There is a group of assumptions known as the “knowledge assumptions.” They assume that in order for the…
From Research Princeton Research Day
4 likes
87 plays
|
|
Creating your Personal Risk Management Plan - Webinar(InfoSec 201) Organizations look at their cybersecurity threats by identifying, analyzing, evaluating, and addressing risks. By assessing these risks, they can establish the likelihood and impact of…
From Stefanie Clerkin
0 likes
49 plays
|
|
Quick Tip: MFA Fatigue AttacksThis series of short videos answers frequently asked information security questions and shares insights from professionals in the field. Join us as we ask the important questions and have some fun in…
From Stefanie Clerkin
3 likes
451 plays
|
|
SmartCookie: Distributed In-Network SYN Flooding Mitigation, Sophia Yoo, G2 (3938706)SYN-flooding attacks, a pervasive class of DDoS attacks, target the TCP three-way handshake to exhaust server resources, leading to poor performance for legitimate clients. In this work, we present…
From Research Princeton Research Day
0 likes
122 plays
|
|
Wintersession - Information Security in the NewsAs we enter 2022, we look back at the state of information security over the past few years. Coronavirus scams, the natural gas pipeline ransomware attack, foreign hacking groups, the SolarWinds…
From Stefanie Clerkin
0 likes
14 plays
|
|
In Plain View - Open Source Intelligence(InfoSec 201) Did you ever think about all of the data publicly available? What if bad actors collect this “open source intelligence” and use it to attack you or Princeton University? …
From Stefanie Clerkin
0 likes
42 plays
|
|
Beowulf and AlienGina Brandolino compares Beowulf and Alien. View the full resource page here.
From Jonathan Henry
0 likes
147 plays
|
|
Webinar: Ask the ISOKick back, relax, and join us for an informal, live Q & A conversation. We’ll share answers to common questions we are asked and provide time for you to ask your questions about information…
From Stefanie Clerkin
0 likes
40 plays
|