Follow
Chuck Easttom
Chuck Easttom
Georgetown University and Vanderbilt University
Verified email at chuckeasttom.com - Homepage
Title
Cited by
Cited by
Year
Computer security fundamentals
C Easttom
Pearson IT certification, 2019
1572019
Modern cryptography: applied mathematics for encryption and information security
W Easttom
Springer Nature, 2022
1052022
Computer crime, investigation, and the law
C Easttom, J Taylor, H Hurley
Course Technology, 2011
622011
CompTIA Security+ Study Guide: Exam SY0-501
E Dulaney, C Easttom
John Wiley & Sons, 2017
542017
Security policies and implementation issues
R Johnson, C Easttom
Jones & Bartlett Learning, 2020
372020
System forensics, investigation, and response
C Easttom
Jones & Bartlett Learning, 2017
332017
The NICE cyber security framework
I Alsmadi, C Easttom
Springer International Publishing, 2020
282020
A modified McCumber cube as a basis for a taxonomy of cyber attacks
C Easttom, W Butler
2019 IEEE 9th Annual Computing and Communication Workshop and Conference …, 2019
182019
Quantum computing and cryptography
C Easttom
Modern Cryptography: Applied Mathematics for Encryption and Information …, 2022
172022
An analysis of leading lattice-based asymmetric cryptographic primitives
C Easttom
2019 IEEE 9th Annual Computing and Communication Workshop and Conference …, 2019
172019
Virtual private networks, authentication, and wireless security
C Easttom
Modern Cryptography: Applied Mathematics for Encryption and Information …, 2022
142022
A functional model for unifying brain computer interface terminology
C Easttom, L Bianchi, D Valeriani, CS Nam, A Hossaini, D Zapała, ...
IEEE Open Journal of Engineering in Medicine and Biology 2, 91-96, 2021
142021
Mitigating implanted medical device cybersecurity risks
C Easttom, N Mei
2019 IEEE 10th Annual Ubiquitous Computing, Electronics & Mobile …, 2019
132019
Network Defense and Countermeasures: Principles and Practices
C Easttom
Pearson Education, 2013
132013
Computer Crime
C Easttom, J Taylor, H Hurley
Investigation and the Law, Course Technology, 2011
132011
Method and apparatus of performing data executable integrity verification
WC Easttom
US Patent 8,819,827, 2014
122014
An In-Depth Guide to Mobile Device Forensics
C Easttom
CRC Press, 2021
112021
Quantum Computing Fundamentals
C Easttom
112021
Network Defense and Countermeasures
C Easttom
Prentice Hall, 2005
112005
Conducting investigations on the Dark Web
C Easttom
Journal of Information Warfare 17 (4), 26-37, 2018
102018
The system can't perform the operation now. Try again later.
Articles 1–20