In a paper presented at the 2016 ACM Conference on Computer and Communications Security on Oct. 27, researchers describe a system called PREDATOR that distinguishes between legitimate and malicious purchasers of new websites. The system yields important insights into how those two groups behave differently online even before the malicious users have done anything obviously bad or harmful. These early signs can help security professionals take preemptive measures.
Citing concerns about security and accuracy, Professor of Computer Science Andrew Appel urged Congress during a House subcommittee hearing on Wednesday to eliminate "touchscreen" voting machines after this November's election.
In the summer of 2015, a freak cold front swept across the Andes and poured rain that triggered flash floods across parts of Peru and northern Chile. The floodwaters overflowed streambeds and sent mudslides roaring through rural communities. In the aftermath, the Chilean government estimated that more than 27,000 people were displaced.
Despite ample evidence that Atlantic hurricanes are getting stronger, Princeton University-led research found that people's view of future storm threat is based on their hurricane experience, gender and political affiliation. This could affect how policymakers and scientists communicate the increasing deadliness of hurricanes as a result of climate change.
Researchers have found that the "Great Firewall" technology that controls internet traffic entering and leaving China is not merely an apparatus that statically blocks traffic. It also actively sends probes to other machines that are connected to the internet, preemptively searching for internet infrastructure and services that seek to circumvent its defenses.
A smartphone application that alerts drivers to local road hazards could help avoid accidents and be a step towards improving transportation policy, Princeton University professor Garnet Chan told an audience during the hackathon sponsored by the Center for Information Technology Policy (CITP) and Code for Princeton on February 27 and 28.
A team led by Princeton computer scientist Andrew Appel won a $10 million grant to exterminate software "bugs," the maddening but unintended programming errors that can open our lives to hackers and thieves and disrupt critical tasks such as tracking and tabulating election returns.
Researchers at Princeton University's Edge Lab are leading a global effort -- with scientists and business leaders at ARM, Cisco, Dell, Intel and Microsoft -- to develop an important new mobile technology: fog networks.
Five Princeton University graduate students in computer science and one in environmental engineering have been awarded prestigious fellowships from the Siebel Scholars Foundation, a program that promotes leadership, academic achievement and the collaborative search for solutions to the world's most critical issues.
Researchers at Princeton and MIT have used computer models to show that severe tropical cyclones could hit a number of coastal cities worldwide that are widely seen as unthreatened by such powerful storms.
Even as Iran and six global powers negotiated a nuclear accord this summer, Princeton researchers were looking at how to reduce nuclear risks beyond the 10-year horizon of many of the pact’s key provisions.
Edward Felten, a Princeton University computer scientist who is a leading expert on computer security, has been named U.S. Deputy Chief Technology Officer in the White House's Office of Science and Technology Policy (OSTP).
Big Data continues to transform the way we live and work, altering the relationships between government, citizens, businesses and consumers. But does it come at a cost?
Professor Alain Kornhauser has been working with New Jersey legislators to make the state more welcoming to automated vehicle technology. Proponents want to change regulations to ease its introduction and support companies that are developing the technology.
Computer scientists have developed a method to cut dramatically the time needed to find patterns in large collections of information such as social networks.