Picture for Christopher Redino

Christopher Redino

Leveraging Reinforcement Learning in Red Teaming for Advanced Ransomware Attack Simulations

Add code
Jun 25, 2024
Viaarxiv icon

Discovering Command and Control (C2) Channels on Tor and Public Networks Using Reinforcement Learning

Add code
Feb 14, 2024
Viaarxiv icon

Discovering Command and Control Channels Using Reinforcement Learning

Add code
Jan 13, 2024
Viaarxiv icon

FedBayes: A Zero-Trust Federated Learning Aggregation to Defend Against Adversarial Attacks

Add code
Dec 04, 2023
Viaarxiv icon

Exposing Surveillance Detection Routes via Reinforcement Learning, Attack Graphs, and Cyber Terrain

Add code
Nov 06, 2022
Viaarxiv icon

Zero Day Threat Detection Using Metric Learning Autoencoders

Add code
Nov 01, 2022
Viaarxiv icon

Anomaly Detection via Federated Learning

Add code
Oct 12, 2022
Figure 1 for Anomaly Detection via Federated Learning
Figure 2 for Anomaly Detection via Federated Learning
Figure 3 for Anomaly Detection via Federated Learning
Figure 4 for Anomaly Detection via Federated Learning
Viaarxiv icon

Lateral Movement Detection Using User Behavioral Analysis

Add code
Aug 29, 2022
Figure 1 for Lateral Movement Detection Using User Behavioral Analysis
Figure 2 for Lateral Movement Detection Using User Behavioral Analysis
Figure 3 for Lateral Movement Detection Using User Behavioral Analysis
Figure 4 for Lateral Movement Detection Using User Behavioral Analysis
Viaarxiv icon

Zero Day Threat Detection Using Graph and Flow Based Security Telemetry

Add code
May 04, 2022
Figure 1 for Zero Day Threat Detection Using Graph and Flow Based Security Telemetry
Figure 2 for Zero Day Threat Detection Using Graph and Flow Based Security Telemetry
Figure 3 for Zero Day Threat Detection Using Graph and Flow Based Security Telemetry
Figure 4 for Zero Day Threat Detection Using Graph and Flow Based Security Telemetry
Viaarxiv icon

Discovering Exfiltration Paths Using Reinforcement Learning with Attack Graphs

Add code
Jan 28, 2022
Figure 1 for Discovering Exfiltration Paths Using Reinforcement Learning with Attack Graphs
Figure 2 for Discovering Exfiltration Paths Using Reinforcement Learning with Attack Graphs
Figure 3 for Discovering Exfiltration Paths Using Reinforcement Learning with Attack Graphs
Figure 4 for Discovering Exfiltration Paths Using Reinforcement Learning with Attack Graphs
Viaarxiv icon