Follow
Chuck Easttom
Chuck Easttom
Georgetown University
Verified email at chuckeasttom.com - Homepage
Title
Cited by
Cited by
Year
Computer security fundamentals
C Easttom
Pearson IT Certification, 2019
1292019
Modern cryptography
C Easttom
Applied mathematics for encryption and information security. McGraw-Hill …, 2015
612015
Computer crime, investigation, and the law
C Easttom, J Taylor, H Hurley
Course Technology, 2011
602011
CompTIA Security+ Study Guide: Exam SY0-501
E Dulaney, C Easttom
John Wiley & Sons, 2017
502017
Security policies and implementation issues
R Johnson, C Easttom
Jones & Bartlett Learning, 2020
242020
System forensics, investigation, and response
C Easttom
Jones & Bartlett Learning, 2017
242017
The NICE cyber security framework
I Alsmadi, C Easttom
Springer International Publishing, 2020
152020
An analysis of leading lattice-based asymmetric cryptographic primitives
C Easttom
2019 IEEE 9th Annual Computing and Communication Workshop and Conference …, 2019
112019
Method and apparatus of performing data executable integrity verification
WC Easttom
US Patent 8,819,827, 2014
112014
A functional model for unifying brain computer interface terminology
C Easttom, L Bianchi, D Valeriani, CS Nam, A Hossaini, D Zapała, ...
IEEE Open Journal of Engineering in Medicine and Biology 2, 91-96, 2021
102021
A modified McCumber cube as a basis for a taxonomy of cyber attacks
C Easttom, W Butler
2019 IEEE 9th Annual Computing and Communication Workshop and Conference …, 2019
102019
A generalized methodology for designing non-linear elements in symmetric cryptographic primitives
C Easttom
2018 IEEE 8th Annual Computing and Communication Workshop and Conference …, 2018
102018
Network Defense and Countermeasures: Principles and Practices
WC Easttom II
Pearson IT Certification, 2013
102013
A Systems Approach to Indicators of Compromise Utilizing Graph Theory
C Easttom
2018 IEEE International Symposium on Technologies for Homeland Security (HST), 2018
92018
Mitigating implanted medical device cybersecurity risks
C Easttom, N Mei
2019 IEEE 10th Annual Ubiquitous Computing, Electronics & Mobile …, 2019
82019
WC (2016)
II Easttom
Computer security fundamentals, 0
8
An enhanced view of incidence functions for applying graph theory to modeling network intrusions
W Easttom, M Adda
WSEAS Transactions on Information Science and Applications 15, 102-109, 2020
72020
The role of weaponized malware in cyber conflict and espionage
C Easttom
Proc. 13th Int. Conf. Cyber Warfare Secur.(ICCWS), 191, 2018
72018
Virtual Private Networks, Authentication, and Wireless Security
W Easttom
Modern Cryptography, 299-317, 2021
62021
On the application of algebraic graph theory to modeling network intrusions
C Easttom
2020 10th Annual Computing and Communication Workshop and Conference (CCWC …, 2020
62020
The system can't perform the operation now. Try again later.
Articles 1–20