Search for tag: "attack"

SmartCookie: Distributed In-Network SYN Flooding Mitigation, Sophia Yoo, G2 (3938706)

SYN-flooding attacks, a pervasive class of DDoS attacks, target the TCP three-way handshake to exhaust server resources, leading to poor performance for legitimate clients. In this work, we present…

From  Research Princeton Research Day 0 likes 69 plays

Shuwen Deng 03.21.2022 Job Talk P.2

From  Broadcast Broadcast Center Staff 0 likes 38 plays

Shuwen Deng 03.21.2022 Job Talk P.1

From  Broadcast Broadcast Center Staff 0 likes 18 plays

The complications of telling the story of 9-11 by Clifford Chanin_1

From  Broadcast Broadcast Center Staff 0 likes 2 plays

Wintersession - Information Security in the News

As we enter 2022, we look back at the state of information security over the past few years. Coronavirus scams, the natural gas pipeline ransomware attack, foreign hacking groups, the SolarWinds…

From  Stefanie Clerkin 0 likes 12 plays

In Plain View - Open Source Intelligence

(InfoSec 201) Did you ever think about all of the data publicly available? What if bad actors collect this “open source intelligence” and use it to attack you or Princeton University? …

From  Stefanie Clerkin 0 likes 40 plays

Beowulf and Alien

Gina Brandolino compares Beowulf and Alien. View the full resource page here.

From  Jonathan Henry 0 likes 84 plays

Webinar: Ask the ISO

Kick back, relax, and join us for an informal, live Q & A conversation. We’ll share answers to common questions we are asked and provide time for you to ask your questions about information…

From  Stefanie Clerkin 0 likes 20 plays

CITP Seminar: Shaanan Cohney - Leaving Randomness to Chance: Standards Shortcomings and Buried Backdoors in Random Number Generators

Security is too important to leave to chance. Security by design is often touted as the solution, but when your system is broken before you design it—something has gone very, very wrong.Secure…

From  CI Center for Information Technology Policy 0 likes 13 plays

Webinar: Spotting and Preventing Social Engineering Attacks

(InfoSec 101) Millions of dollars are lost every year due to scams. But why would anyone willingly give away their personal information? Social engineering is the art of influencing a person to make…

From  Tara Schaufler 0 likes 52 plays

Mexico's 2018 Elections: Elections and Criminal Violence in Mexico: The Elephant in the Room

Guillermo Trejo, Associate Professor of Political Science and Faculty Fellow at the Kellogg Institute for International Studies, University of Notre Dame

From  PL Latin American Studies 0 likes 2 plays