Search for tag: "attack"

Strategic Mastery in Terminal: A Novel Reinforcement Learning Approach to Tower-Defense Gameplay, Shivam Kak, UG '26, Ishaan Javali, UG '26, Yagiz Devre, UG '26 (5EE515B6)

From chess to Atari to AlphaGo, performance in games has been a benchmark of performance for machine learning. Terminal is a tower-defense game where players submit algorithms that play against each…

From  Research Princeton Research Day 1 likes 27 plays

DeCenter Seminar: "Blockchain does not operate in a vacuum: an internet perspective"

From  Broadcast Broadcast Center Staff 0 likes 12 plays

OURSIP Intern - Felix Xu

New Approaches to Quaternary C-C Bond Formation via Iron Metallaphotoredox Catalysis Advised by: Prof. David W.C. MacMillan, Chemistry Andria Pace, Chemistry

From  our Undergraduate Research 0 likes 19 plays

Knot The Average Boat: Development of a Semi-Autonomous Sailing Platform, Jeb Carter, UG '23 (2985750)

The problem of autonomous sailing is a complex and challenging one. There are nearly countless possible environmental and telemetry sensors that can be implemented, each with varying challenges and…

From  Research Princeton Research Day 2 likes 55 plays

How do we know what we know? -- as a mathematical question. Designing knowledge assumptions and asymmetric encryption schemes in lattice-based cryptography., Yuxi Zheng, UG '23 (2279885)

Assumptions of various hard problems are essential in modern cryptography. There is a group of assumptions known as the “knowledge assumptions.” They assume that in order for the…

From  Research Princeton Research Day 4 likes 86 plays

Creating your Personal Risk Management Plan - Webinar

(InfoSec 201) Organizations look at their cybersecurity threats by identifying, analyzing, evaluating, and addressing risks. By assessing these risks, they can establish the likelihood and impact of…

From  Stefanie Clerkin 0 likes 47 plays

9.27.22 The Impact of the Attack in Benghazi and the War in Libya on American Domestic and Foreign Politics

From  Broadcast Broadcast Center Staff 0 likes 24 plays

Quick Tip: MFA Fatigue Attacks

This series of short videos answers frequently asked information security questions and shares insights from professionals in the field. Join us as we ask the important questions and have some fun in…

From  Stefanie Clerkin 3 likes 444 plays

SmartCookie: Distributed In-Network SYN Flooding Mitigation, Sophia Yoo, G2 (3938706)

SYN-flooding attacks, a pervasive class of DDoS attacks, target the TCP three-way handshake to exhaust server resources, leading to poor performance for legitimate clients. In this work, we present…

From  Research Princeton Research Day 0 likes 122 plays

Shuwen Deng 03.21.2022 Job Talk P.2

From  Broadcast Broadcast Center Staff 0 likes 81 plays

Shuwen Deng 03.21.2022 Job Talk P.1

From  Broadcast Broadcast Center Staff 0 likes 65 plays

The complications of telling the story of 9/11 by Clifford Chanin

From  Broadcast Broadcast Center Staff 0 likes 5 plays

Wintersession - Information Security in the News

As we enter 2022, we look back at the state of information security over the past few years. Coronavirus scams, the natural gas pipeline ransomware attack, foreign hacking groups, the SolarWinds…

From  Stefanie Clerkin 0 likes 14 plays

In Plain View - Open Source Intelligence

(InfoSec 201) Did you ever think about all of the data publicly available? What if bad actors collect this “open source intelligence” and use it to attack you or Princeton University? …

From  Stefanie Clerkin 0 likes 42 plays

Beowulf and Alien

Gina Brandolino compares Beowulf and Alien. View the full resource page here.

From  Jonathan Henry 0 likes 139 plays

Webinar: Ask the ISO

Kick back, relax, and join us for an informal, live Q & A conversation. We’ll share answers to common questions we are asked and provide time for you to ask your questions about information…

From  Stefanie Clerkin 0 likes 36 plays