Computer security fundamentals C Easttom Pearson IT Certification, 2019 | 129 | 2019 |
Modern cryptography C Easttom Applied mathematics for encryption and information security. McGraw-Hill …, 2015 | 61 | 2015 |
Computer crime, investigation, and the law C Easttom, J Taylor, H Hurley Course Technology, 2011 | 60 | 2011 |
CompTIA Security+ Study Guide: Exam SY0-501 E Dulaney, C Easttom John Wiley & Sons, 2017 | 50 | 2017 |
Security policies and implementation issues R Johnson, C Easttom Jones & Bartlett Learning, 2020 | 24 | 2020 |
System forensics, investigation, and response C Easttom Jones & Bartlett Learning, 2017 | 24 | 2017 |
The NICE cyber security framework I Alsmadi, C Easttom Springer International Publishing, 2020 | 15 | 2020 |
An analysis of leading lattice-based asymmetric cryptographic primitives C Easttom 2019 IEEE 9th Annual Computing and Communication Workshop and Conference …, 2019 | 11 | 2019 |
Method and apparatus of performing data executable integrity verification WC Easttom US Patent 8,819,827, 2014 | 11 | 2014 |
A functional model for unifying brain computer interface terminology C Easttom, L Bianchi, D Valeriani, CS Nam, A Hossaini, D Zapała, ... IEEE Open Journal of Engineering in Medicine and Biology 2, 91-96, 2021 | 10 | 2021 |
A modified McCumber cube as a basis for a taxonomy of cyber attacks C Easttom, W Butler 2019 IEEE 9th Annual Computing and Communication Workshop and Conference …, 2019 | 10 | 2019 |
A generalized methodology for designing non-linear elements in symmetric cryptographic primitives C Easttom 2018 IEEE 8th Annual Computing and Communication Workshop and Conference …, 2018 | 10 | 2018 |
Network Defense and Countermeasures: Principles and Practices WC Easttom II Pearson IT Certification, 2013 | 10 | 2013 |
A Systems Approach to Indicators of Compromise Utilizing Graph Theory C Easttom 2018 IEEE International Symposium on Technologies for Homeland Security (HST), 2018 | 9 | 2018 |
Mitigating implanted medical device cybersecurity risks C Easttom, N Mei 2019 IEEE 10th Annual Ubiquitous Computing, Electronics & Mobile …, 2019 | 8 | 2019 |
WC (2016) II Easttom Computer security fundamentals, 0 | 8 | |
An enhanced view of incidence functions for applying graph theory to modeling network intrusions W Easttom, M Adda WSEAS Transactions on Information Science and Applications 15, 102-109, 2020 | 7 | 2020 |
The role of weaponized malware in cyber conflict and espionage C Easttom Proc. 13th Int. Conf. Cyber Warfare Secur.(ICCWS), 191, 2018 | 7 | 2018 |
Virtual Private Networks, Authentication, and Wireless Security W Easttom Modern Cryptography, 299-317, 2021 | 6 | 2021 |
On the application of algebraic graph theory to modeling network intrusions C Easttom 2020 10th Annual Computing and Communication Workshop and Conference (CCWC …, 2020 | 6 | 2020 |