Website of Chuck Easttom, Ph.D., D.Sc.



Dr. Easttom is involved in research in several areas. Below are some of those areas along with papers/books/patents or other work Dr. Easttom has authored in that field.
Note: some items may appear in more than one category. This is not meant to be an exhaustive list of Dr. Easttom's work, merely exemplary. For more of Dr. Easttoms work, go to Google Scholar.
Quantum Computing
  1. Easttom, C. (2022). Quantum computing and cryptography. In Modern Cryptography: Applied Mathematics for Encryption and Information Security (pp. 397-407). Cham: Springer International Publishing.
  2. Easttom, C. (2019, January). An analysis of leading lattice-based asymmetric cryptographic primitives. In 2019 IEEE 9th Annual Computing and Communication Workshop and Conference (CCWC) (pp. 0811-0818). IEEE.
  3. Easttom II, W. C. (2018). A Comparative Study of Lattice Based Algorithms for Post Quantum Computing (Doctoral dissertation, Capitol Technology University).
  4. Easttom, C. (2022, January). NTRU and LASH for a Quantum Resistant Blockchain. In 2022 IEEE 12th Annual Computing and Communication Workshop and Conference (CCWC) (pp. 0654-0658). IEEE.
  5. Easttom, C., Ibrahim, A., Chefranov, A., Alsmadi, I., & Hansen, R. (2020). Towards a deeper NTRU analysis: a multi modal analysis. International Journal on Cryptography and Information Security (IJCIS), 10(2), 11-22.
  6. Easttom, C. (2021). Quantum Computing Fundamentals. New York City, New York: Pearson Press.
  7. Dr. Easttom developed a graduate course in Quantum Computing for Vanderbilt University which he currently teaches.
  8. Dr. Easttom is a :
    • Member of IEEE P2995 - Trial-Use Standard for a Quantum Algorithm Design and Development Standards Group from 2021 to present
    • Vice Chair of IEEE P3120 - Quantum Computing Architecture Working Group
    • Member of IEEE P3155 QuSIM/WG - Programmable Quantum Simulator Working Group
    • Dr. Easttom routinely conducts workshops in quantum computing, math for quantum computing and related topics for O'Reilly Media.
Cryptography
  1. Easttom, C. (2022). Modern Cryptography: Applied Mathematics for Encryption and Information Security 3rd Edition. New York City, New York: Springer Press.
  2. 31. Easttom, C. (2020). Modern Cryptography: Applied Mathematics for Encryption and Information Security 2nd Edition. New York City, New York: Springer Press.
  3. Easttom, C. (2019, January). An analysis of leading lattice-based asymmetric cryptographic primitives. In 2019 IEEE 9th Annual Computing and Communication Workshop and Conference (CCWC) (pp. 0811-0818). IEEE.
  4. Easttom, C. (2018, January). A generalized methodology for designing non-linear elements in symmetric cryptographic primitives. In 2018 IEEE 8th Annual Computing and Communication Workshop and Conference (CCWC) (pp. 444-449). IEEE.
  5. Easttom, C. (2018, May). A study of cryptographic backdoors in cryptographic primitives. In Electrical Engineering (ICEE), Iranian Conference on (pp. 1664-1669). IEEE.
  6. Easttom, C., Ibrahim, A., Chefranov, A., Alsmadi, I., & Hansen, R. (2020). Towards a deeper NTRU analysis: a multi modal analysis. International Journal on Cryptography and Information Security (IJCIS), 10(2), 11-22.
  7. Easttom, C. (2018, May). An examination of inefficiencies in key dependent variations of the Rijndael S-Box. In Electrical Engineering (ICEE), Iranian Conference on (pp. 1658-1663). IEEE.
  8. Dr. Easttom developed a graduate course in Cryptography for Georgetown University which he currently teaches.
Cybersecurity/Cyberwarfare
  1. Easttom, C., & Butler, W. (2019, January). A modified McCumber cube as a basis for a taxonomy of cyber attacks. In 2019 IEEE 9th Annual Computing and Communication Workshop and Conference (CCWC) (pp. 0943-0949). IEEE.
  2. Easttom, C., & Mei, N. (2019, October). Mitigating implanted medical device cybersecurity risks. In 2019 IEEE 10th Annual Ubiquitous Computing, Electronics & Mobile Communication Conference (UEMCON) (pp. 0145-0148). IEEE.
  3. Easttom, C. (2019, October). SecML: a proposed modeling language for cybersecurity. In 2019 IEEE 10th Annual Ubiquitous Computing, Electronics & Mobile Communication Conference (UEMCON) (pp. 1015-1021). IEEE.
  4. Easttom, C. (2020, March). Mathematically modelling cyber-attacks utilizing engineering techniques. In 15th International Conference on Cyber Warfare and Security, BK Payne and H. Wu, Eds. Academic Conferences and Publishing International Ltd, Conference Proceedings (pp. 119-126).
  5. Pelosi, M., & Easttom, C. (2021). Identification of LSB image steganography using cover image comparisons. Journal of Digital Forensics, Security and Law, 15(2), 6.
  6. Easttom, C. (2020, January). On the application of algebraic graph theory to modeling network intrusions. In 2020 10th Annual Computing and Communication Workshop and Conference (CCWC) (pp. 0424-0430). IEEE.
  7. Easttom, C., & Butler, W. (2020, March). Applying systems engineering principles to penetration testing. In 15th International Conference on Cyber Warfare and Security, BK Payne and H. Wu, Eds. Academic Conferences and Publishing International Ltd., Conference Proceedings (pp. 127-134).
  8. Easttom, C. (2018). An examination of the operational requirements of weaponised malware. Journal of Information Warfare, 17(2), 1-15.
  9. Easttom, C. (2018, March). The role of weaponized malware in cyber conflict and espionage. In Proc. 13th Int. Conf. Cyber Warfare Secur.(ICCWS) (p. 191).
  10. Easttom, C. (2019, October). A methodological approach to weaponizing machine learning. In Proceedings of the 2019 international conference on artificial intelligence and advanced manufacturing (pp. 1-5).
  11. Easttom, C. (2021). Certified Ethical Hacker v11 Exam Cram. Pearson
  12. Easttom, C. (2019). Computer Security Fundamentals, 5th Edition. New York City, New York: Pearson Press.
  13. Easttom, C & Johnson, R. (2020). Security Policies and Implementation Issues, 3rd Edition. Jones and Bartlett.
  14. Easttom, C., & Christy, R. (2017). CompTIA Security+ Review Guide: SY0-501. Hoboken, New Jersey: Sybex Press.
  15. Dr. Easttom Created video courses for EC-Council CASE (Certified Application Security Engineer) courses for Java and .Net
  16. Dr. Easttom was a subject matter expert for the first version of the Computer Technology Industry Association (CompTIA) Server + exam creation team.
  17. Dr. Easttom workedon the Job Task Analysis Team for the Certified Ethical Hacker v8 test.
Machine Learning/AI
  1. Easttom, C. (2023). Machine Learning for Neuroscience. CRC Press.
  2. Easttom, C., & Alsmadi, I. (2022, January). A Comparitive Study of Machine Learning Algorithms for Identifying Mental States from EEG Recordings. In 2022 IEEE 12th Annual Computing and Communication Workshop and Conference (CCWC) (pp. 0644-0648). IEEE.
  3. Easttom, C., Thapa, S., & Lawson, J. (2020, January). A Comparative Study of Machine Learning Algorithms for Use in Breast Cancer Studies. In 2020 10th Annual Computing and Communication Workshop and Conference (CCWC) (pp. 0412-0416). IEEE.
  4. Easttom, C. (2019, October). Integrating Machine Learning Algorithms in the Engineering of Weaponized Malware. In ECIAIR 2019 European Conference on the Impact of Artificial Intelligence and Robotics (p. 113). Academic Conferences and publishing limited.
  5. Easttom, C. (2019, October). On the Relationship of Emergence and Non-Linear Dynamics to Machine Learning and Synthetic Consciousness. In ECIAIR 2019 European Conference on the Impact of Artificial Intelligence and Robotics (p. 122). Academic Conferences and publishing limited.
  6. Dr. Easttom is Chair of IEEE P3123 Standard for Artificial Intelligence and Machine Learning (AI/ML) Terminology and Data Formats.
Digital Forensics
  1. Easttom, C. (2021). An In-Depth Guide to Mobile Device Forensics. CRC Press.
  2. Easttom, C. (2021). Digital Forensics, Investigation, and Response, 4th Edition. Burlington Massachusetts: Jones & Bartlett.
  3. Easttom, C., & Adda, M. (2021, January). Application of the spectra of graphs in network forensics. In 2021 IEEE 11th Annual Computing and Communication Workshop and Conference (CCWC) (pp. 0846-0852). IEEE.
  4. Easttom, C., & Sanders, W. (2019, October). On the efficacy of using android debugging bridge for android device forensics. In 2019 IEEE 10th Annual Ubiquitous Computing, Electronics & Mobile Communication Conference (UEMCON) (pp. 0730-0735). IEEE.
  5. Easttom, C. (2021, February). A methodology for smart TV Forensics. In ICCWS 2021 16th International Conference on Cyber Warfare and Security (p. 65). Academic Conferences Limited.
  6. Easttom, C. (2021). A systematic framework for network forensics based on graph theory (Doctoral dissertation, University of Portsmouth).
  7. Dr. Easttom developed a graduate digital forensics course for the University of Dallas. Dr. Easttom also taught this course for the University as an adjunct professor from 2019 to 2022
  8. Dr. Easttom developed a graduate course in digital forensics for Vanderbilt University which he currently teaches.
  9. Dr. Easttom Created the EC Council advanced forensics courses for Dark Web investigations; Memory and Malware Forensics; and Cell Phone Forensics