throbber
Curriculum Vitae William C. Easttom II (Chuck Easttom)
`chuckeasttom@gmail.com
`
`Education
`
`University Degrees
` B.A. Southeastern Oklahoma State University. Major Communications with
`Minors in Chemistry and Psychology. Extensive coursework in science
`(chemistry, physics, and biology) as well as specific courses in neuroscience
`(neurobiology of memory, cognitive science, etc.). Also, additional coursework in
`computer science including programming and database courses. While attending I
`was named to the National Dean’s List.
` M.Ed. Southeastern Oklahoma State University. Coursework included technology
`related courses such as digital video editing, multimedia presentations, and
`computer graphics. A statistics course was also part of the coursework. While
`attending I was named to Who’s Who in Colleges and Universities.
` M.B.A. Northcentral University major in Applied Computer Science. Extensive
`course work in graduate computer science including graduate courses in C++
`programming, C# programming, Computer Graphics, Web Programming,
`Network communication, Complex Database Management Systems, and Artificial
`Intelligence. Approximately 30 graduate hours of graduate computer science
`courses. Additionally, a doctoral level statistics course was included. A semester
`research project in electronic medical software was also part of the curriculum. I
`also took several research courses beyond the requirements for the degree.
` MSSE Master of Science in Systems Engineering. University of Texas at El
`Paso. The coursework includes studies in software & system requirements;
`system integration, verification, and validation; system architecture and design;
`and systems modeling & simulation. 4.0 GPA member of Phi Kappa Phi honor
`society. Also, a member of the Gold Key Honor society.
` D.Sc. Doctor of Science in Cyber Security from Capitol Technology University.
`The curriculum included a broad coverage of cybersecurity issues. My
`dissertation topic was “A Comparative Study of Lattice Based Algorithms for
`Post Quantum Computing”. 4.0 GPA.
` Ph.D. Doctor of Philosophy in Technology from Capitol Technology University.
`The focus of this program was on nanotechnology used in bioengineering. More
`specifically my studies focused on carbon nanotubes used in bioengineering.
`Dissertation topic “The Effects of Complexity on Carbon Nanotube Failures”. 4.0
`GPA.
` Ph.D. Doctor of Philosophy in Computer Science from University of Portsmouth
`in England. The emphasis was on computer networking and the application of
`applied mathematics. Dissertation topic “A Systematic Framework for Network
`Forensics Using Graph Theory”.
`
`Industry Certifications
`The following is a list of engineering and computer industry certifications I have earned.
`
`1
`
`CPC EXHIBIT 2014
`Apple Inc. v. CPC Patent Technologies PTY Ltd.
`IPR2022-00602
`
`Page 1 of 42
`
`

`

`Engineering Certifications
`Note: some of these appear also in computer industry certifications
`1. Associate of Systems Engineering (ASEP) from INCOSE (International Council
`on Systems Engineering) 05452.
`2. Microsoft Certified Systems Engineer (MCSE) Windows Server 2000
`Certification Number: A527-9552
`3. EC Council Certified Application Security Engineer - .Net
`4. EC Council Certified Application Security Engineer – Java
`5. CISSP- ISSEP Information Systems Security Engineering Professional #387731
`
`Hardware and Networking Related Certifications
`1. CompTIA (Computer Technology Industry Associations) A+ Certified D76DTT4107
`2. CompTIA Network + Certified COMP10163630
`3. CompTIA Server+ Certified COMP10163630
`4. CompTIA I-Net+ Certified COMP10163630
`5. CompTIA Cloud+ Certified COMP001021522764
`6. JN0-103 Juniper Networks Certified Associate, Junos JNCIA-Junos
`7. CompTIA IT Operations Specialist (CIOS) COMP10163630
`8. CompTIA Cloud Admin Professional (CCAP) COMP10163630
`9. CompTIA Network Infrastructure Professional – CNIP COMP10163630
`
`
`
`
`
`Operating System Related Certifications
`10. Microsoft Certified Trainer
`11. CompTIA Linux + Certified COMP10163630
`12. CompTIA Systems Support Specialist (CSSS) COMP10163630
`13. CompTIA Linux Network Professional – CLNP COMP10163630
`14. CompTIA Secure Infrastructure Specialist (CSIS) COMP10163630
`15. Microsoft Certified Professional (MCP) – Windows Server 2000 Professional
`Certification Number: A527-9546
`16. Microsoft Certified Systems Administrator (MCSA) Windows Server 2000
`Certification Number: A527-9556
`17. Microsoft Certified Systems Engineer (MCSE) Windows Server 2000 Certification
`Number: A527-9552
`18. Microsoft Certified Technology Specialist (MCTS) Windows Server 2008 Active
`Directory Microsoft Certification ID: 1483483
`19. Microsoft Certified Technology Specialist (MCTS) Windows 7 Microsoft
`Certification ID: 1483483
`
`2
`
`
`Page 2 of 42
`
`

`

`20. Microsoft Certified IT Professional (MCITP) Windows 7 Microsoft Certification ID:
`1483483
`21. Microsoft Certified Solutions Associate Windows 7 Microsoft Certification ID:
`1483483
`22. National Computer Science Academy Windows 8 Certification Certificate #:
`4787829
`
`Programming and Web Development Related Certifications
`23. Microsoft Certified Professional (MCP) – Visual Basic 6.0 Desktop Applications
`Microsoft Certification ID: 1483483
`24. Microsoft Certified Professional (MCP) – Visual Basic 6.0 Distributed Applications
`Microsoft Certification ID: 1483483
`25. Microsoft Certified Application Developer (MCAD) - C# Microsoft Certification ID:
`1483483
`26. Microsoft Certified Trainer (MCT 2005-2012) Microsoft Certification ID: 1483483
`27. Microsoft Certified Technology Specialist (MCTS) Visual Studio 2010 Windows
`Application Microsoft Certification ID: 1483483
`28. Microsoft Certified Technology Specialist (MCTS) Visual Studio 2010 Data Access
`Microsoft Certification ID: 1483483
`29. National Computer Science Academy HTML 5.0 Certification Certificate #:
`4788000.
`30. National Computer Science Academy ASP.Net Certification Certificate #: 4788342
`31. Certified Internet Webmaster (CIW) Associate CIW0163791
`32. EC Council Certified Application Security Engineer - .Net
`33. EC Council Certified Application Security Engineer – Java
`34. Dynamics 365 Business Central Functional Consultant Associate
`35. Microsoft Dynamics 365 Fundamentals Microsoft Certification ID: 1483483
`36. Microsoft Certified: Azure AI Fundamentals Microsoft Certification ID: 1483483
`
`
`
`
`
`Database Related Certifications
`37. Microsoft Certified Database Administrator (MCDBA) SQL Server 2000 Microsoft
`Certification ID: 1483483
`38. Microsoft Certified Technology Specialist (MCTS) Implementing SQL Server 2008
`Microsoft Certification ID: 1483483
`39. Microsoft Certified IT Professional (MCITP) SQL Server Administration Microsoft
`Certification ID: 1483483
`40. DP-203 - Data Engineering on Microsoft Azure
`Security and Forensics Related Certifications
`
`3
`
`
`Page 3 of 42
`
`

`

`41. CIW Certified Security Analyst CIW0163791
`42. EC Council Certified Ethical Hacker v5 (CEH) ECC942445
`43. EC Council Certified Hacking Forensics Investigator v4 (CHFI) ECC945708
`44. EC Council Certified Security Administrator (ECSA) ECC947248
`45. EC Council Certified Encryption Specialist (ECES)
`46. EC Council Certified Instructor
`47. CISSP – Certified Information Systems Professional #387731
`48. ISSAP – Certified Information Systems Architect #387731
`49. CCFP – Certified Cyber Forensics Professional #387731
`50. Certified Criminal Investigator (CCI) 2015-2017
`51. Forensic Examination of CCTV Digital VTR Surveillance Recording Equipment
`52. Oxygen Phone Forensics Certified
`53. Access Data Certified Examiner (ACE) 2014-2017
`54. OSForensics Certified Examiner (OSFCE)
`55. Certified Forensic Consultant (CFC) 2015-2017
`56. CompTIA Certified Advanced Security Practitioner (CASP) COMP10163630
`57. CompTIA Certified Cybersecurity Analysis (CySA+) COMP001021522764
`58. CompTIA Pentest+ COMP001021522764
`59. CompTIA Security+ COMP001021522764
`60. CompTIA Security Analytics Specialist-CSAP COMP001021522764
`61. CompTIA Secure Cloud Professional-CSCP COMP001021522764
`62. CompTIA Network Vulnerability Assessment Professional-CNVP
`COMP001021522764
`63. CompTIA Security Infrastructure Expert -CSIE COMP001021522764
`64. CompTIA Security Analytics Expert-CSAE COMP001021522764
`65. CompTIA Security Network Professional – CNSP
`66. JN0-230 – Juniper Security Associate (JNCIA-SEC)
`67. JN0-334 – Juniper Security Specialist (JNCIS-SEC)
`68. JN0-635 – Juniper Security, Professional (JNCIP-SEC)
`69. CISSP- ISSEP Information Systems Security Engineering Professional #387731
`70. Certified Cloud Security Professional (CCSP) #387731
`71. SC-300 - Microsoft Identity and Access Administrator
`
`
`
`Software Certifications
`72. National Computer Science Academy Microsoft Word 2013 Certification Certificate
`#: 5078016
`
`4
`
`
`Page 4 of 42
`
`

`

`
`
`
`
`
`
`73. National Computer Science Academy Microsoft Word 2000 Certification Certificate
`#: 5078187
`
`Licenses
`Texas State Licensed Private Investigator. Registration Number 827827. Associated with
`Allegiant Investigations & Security License Number: A18596
`
`Publications
`Books
`1.
`Easttom, C. (2003). Moving from Windows to Linux. Newton Center,
`MA: Charles River Learning. 1st Edition, Charles River Media.
`2.
`Easttom, C. & Hoff, B. (2006). Moving from Windows to Linux, 2nd Ed.
`Newton Center, MA: Charles River Learning. 1st Edition, Charles River Media.
`3.
`Easttom, C. (2003). Programming Fundamentals in C++. Newton Center,
`MA: Charles River Learning. 1st Edition, Charles River Media.
`4.
`Easttom C. (2002). JFC and Swing with JBuilder 8.0. Plano, Texas:
`WordWare Publishing.
`5.
`Easttom, C. (2002). JBuilder 7.0 EJB Programming. Plano, Texas:
`WordWare Publishing.
`6.
`Easttom, C. (2001). Beginning JavaScript, 1st Edition. Plano, Texas:
`WordWare Publishing.
`7.
`Easttom, C. (2002). Beginning VB.Net. Plano, Texas: WordWare
`Publishing.
`8.
`Easttom, C. (2001). Advanced JavaScript, 2nd Edition. Plano, Texas:
`Wordware Publishing.
`9.
`Easttom, C. (2005). Introduction to Computer Security. New York City,
`New York: Pearson Press.
`10.
`Easttom, C. (2006). Network Defense and Countermeasures. New York
`City, New York: Pearson Press.
`11.
`Easttom, C. (2005). Advanced JavaScript, 3rd Edition. Plano, Texas:
`Wordware Publishing.
`12.
`Easttom, C. & Taylor, J. (2010). Computer Crime, Investigation, and the
`Law. Boston, Massachusetts: Cengage Learning.
`13.
`Easttom, C. (2013). Essential Linux Administration: A Comprehensive
`Guide for Beginners. Boston, Massachusetts: Cengage Learning.
`14.
`Easttom, C. (2011). Introduction to Computer Security, 2nd Edition. New
`York City, New York: Pearson Press.
`15.
`Easttom, C. (2012). Network Defense and Countermeasures, 2nd Edition.
`New York City, New York: Pearson Press.
`
`5
`
`
`Page 5 of 42
`
`

`

`16.
`Easttom, C. (2013). System Forensics, Investigation, and Response, 2nd
`Edition. Burlington Massachusetts: Jones & Bartlett.
`17.
`Easttom, C. (2014). CCFP Certified Cyber Forensics Professional All-in-
`One Exam Guide. New York City, New York: McGraw-Hill Publishing.
`18.
`Easttom, C. & Dulaney, E. (2015). CompTIA Security+ Study Guide:
`SY0-401. Hoboken, New Jersey: Sybex Press.
`19.
`Easttom, C. (2015). Modern Cryptography: Applied Mathematics for
`Encryption and Information Security. New York City, New York: McGraw-Hill
`Publishing.
`20.
`Easttom, C. (2016). Computer Security Fundamentals, 3rd Edition. New
`York City, New York: Pearson Press.
`21.
`Easttom, C. (2017). System Forensics, Investigation, and Response, 3rd
`Edition. Burlington Massachusetts: Jones & Bartlett.
`22.
`Easttom, C. & Dulaney, E. (2017). CompTIA Security+ Study Guide:
`SY0-501. Hoboken, New Jersey: Sybex Press.
`23.
`Easttom, C. (2018). Penetration Testing Fundamentals: A Hands-on Guide
`to Reliable Security Audits. New York City, New York: Pearson Press.
`24.
`Easttom, C., & Christy, R. (2017). CompTIA Security+ Review Guide:
`SY0-501. Hoboken, New Jersey: Sybex Press.
`25.
`Easttom, C. & Roberts, R. (2018). Networking Fundamentals, 3rd Edition.
`Goodheart-Wilcox Publishing.
`26.
`Easttom, C. (2018). Network Defense and Countermeasures, 3rd Edition.
`New York City, New York: Pearson Press.
`27.
`Easttom, C. (2019). Computer Security Fundamentals, 4th Edition. New
`York City, New York: Pearson Press.
`28.
`Easttom, C & Johnson, R. (2020). Security Policies and Implementation
`Issues, 3rd Edition. Jones and Bartlett.
`29.
`Alsmadi, I., Easttom, C., Tawalbeh, L. (2020). NICE Cyber Security
`Framework Cyber Security Management. Springer Press.
`30.
`Easttom, C. (2020). Modern Cryptography: Applied Mathematics for
`Encryption and Information Security 2nd Edition. New York City, New York:
`Springer Press.
`31.
`Easttom, C. (2021). Digital Forensics, Investigation, and Response, 4th
`Edition. Burlington Massachusetts: Jones & Bartlett.
`32.
`Easttom, C. (2021). Quantum Computing Fundamentals. New York City,
`New York: Pearson Press.
`33.
`Easttom, C. (2021). An In-Depth Guide to Mobile Device Forensics. CRC
`Press.
`34.
`Press.
`35.
`
`Easttom, C. (2022). Networking Fundamentals, 4th Edition. Goodheart-
`
`Easttom, C. (2021). Certified Ethical Hacker v11 Exam Cram. Pearson
`
`6
`
`
`Page 6 of 42
`
`

`

`Wilcox Publishing.
`36.
`Easttom, C. (2022). Modern Cryptography: Applied Mathematics for
`Encryption and Information Security 3rd Edition. New York City, New York:
`Springer Press.
`37.
`Easttom, C. (2023). Machine Learning for Neuroscience. CRC Press (In
`progress).
`38.
`Easttom, C. (2019). Computer Security Fundamentals, 5th Edition. New
`York City, New York: Pearson Press.
`
`
`
`Papers, presentations, & articles.
`1. Easttom, C. (2010). RSA and its Challenges. EC Council White Paper.
`2. Easttom, C. (2010). Finding Large Prime Numbers. EC Council White Paper
`3. Easttom, C. (2010). A Method for Finding Large Prime Numbers. Haking
`Magazine. Hands-On Cryptography Issue.
`4. Easttom, C. (2014). A method for finding large prime numbers. Open-Source
`Article published by Academia.edu 2014.
`5. Easttom, C. (2011). The RSA Algorithm - The ups and Downs. CryptoMagazine.
`6. Easttom, C. (2011). Feistel Ciphers - An Overview. Presentation at Cast Security
`Conference. Washington, D.C.
`7. Easttom, C. (2011). Steganography- History and Modern Applications.
`Presentation at Takedown Security Conference.
`8. Easttom, C. (2012). Problems with RSA. Presentation at Takedown Security
`Conference – Dallas, TX.
`9. Easttom, C. (2013). Cryptanalysis. Presentation at Takedown Security
`Conference. Huntsville, Alabama.
`10. Easttom, C. (2014). An Overview of Cryptographic S-Boxes used in Block
`Ciphers. Research Gate. DOI RG.2.2.14084.94088.
`11. Easttom, C. (2014). Cryptographic Backdoors. Presentation at ISC2 Security
`Congress. Atlanta, Georgia.
`12. Easttom, C. (2014). Cryptographic Backdoors. Presentation at University of
`Texas Dallas ACM Chapter Conference.
`13. Easttom, C. (2014). Windows Registry Forensics. Research Gate. DOI
`RG.2.2.29603.86561
`14. Easttom, C. (2014). Artificial Intelligence, Fuzzy Logic, Neural Networks and
`Fuzzy Neural Networks and their impact on Electronic Medical Records.
`Academia.edu.
`15. Easttom, C. (2014). A Basic Overview of Electro-Magnetic Interference.
`Academia.edu.
`16. Easttom, C. (2014). An Overview of Targeted Malware. Academia.edu.
`17. Easttom C. (2014). An Introduction to Mobile Forensics. Academia.edu.
`
`7
`
`
`Page 7 of 42
`
`

`

`18. Easttom, C. (2015). Cryptographic Backdoors. Academia.edu.
`19. Easttom, C. (2015). The History of Computer Crime in America. Academia.edu.
`20. Easttom, C. (2015). Spyware Techniques. Academia.edu.
`21. Easttom, C. (2015). Recovering Deleted Files from NTFS. Academia.edu.
`22. Easttom, C. (2015). Multi-dimensional analysis of cyber-forensic evidence.
`Academia.edu.
`23. Easttom, C. (2016). Spyware coding techniques. Journal of Information Security
`Science & Digital Forensics (HJISSDF), 1 (1)
`24. Easttom, C. (2016). Cryptographic Backdoors – an introduction. Journal of
`Information Security Science & Digital Forensics (HJISSDF), 1 (1)
`25. Easttom, C. (2016). A Look at Spyware Techniques. 2600 Magazine, 33(3).
`Autumn issue 2016.
`26. Easttom, C. (2016). Multi-Dimensional Analysis of Digital Forensic Evidence.
`Forensic Examiner Journal, 25 (4).
`27. Easttom, C. (2016). Applying Graph Theory to Evidence Evaluation. Research
`Gate DOI: RG.2.2.23391.0528
`28. Easttom, C. (2017). An Overview of Pseudo Random Number Generators.
`Research Gate. DOI: RG.2.2.13941.58087
`29. Easttom, C. (2017). A Model for Penetration Testing. Research Gate. DOI:
`RG.2.2.36221.15844
`30. Easttom, C. (2017). The RSA Algorithm Explored. International Journal of
`Innovative Research in Information Security. (IJIRIS). 4(1).
`31. Easttom, C. (2017). Utilizing Graph Theory to Model Forensic Examination.
`International Journal of Innovative Research in Information Security (IJIRIS),
`4(2).
`32. Easttom, C. (2017). Applying Graph Theory to Modeling Investigations. IOSR
`Journal of Mathematics (IOSR-JM) 13,2 PP 47-51. doi:10.9790/5728-130205475
`33. Easttom, C. (2017). Enhancing SQL Injection with Stored Procedures. 2600
`Magazine. 34(3).
`34. Easttom, C. (2017). An Overview of Key Exchange Protocols. IOSR Journal of
`Mathematics (IOSR-JM). 13(4). DOI: 10.9790/5728-1304021618.
`35. Easttom, C. (2017). An Overview of Quantum Cryptography with Lattice Based
`Cryptography. IOSR Journal of Mathematics, 13(6).
`36. Easttom, C. (2018). A Generalized Methodology for Designing Non-Linear
`Elements in Symmetric Cryptographic Primitives. In Computing and
`Communication Workshop and Conference (CCWC), 2018 IEEE 8th Annual.
`IEEE.
`37. Easttom, C. (2018). The role of weaponized malware in cyber conflict and
`espionage. In 13th International Conference on Cyber Warfare and Security
`ICCWS, 2018.
`38. Easttom, C. (2018) An Overview of Cryptographic Backdoors. Journal of
`
`8
`
`
`Page 8 of 42
`
`

`

`Information System Security, 13 (3), 177-185.
`39. Easttom, C. (2018). The Daubert Standard as a Framework for Digital Forensics.
`Digital Forensics Magazine, 35.
`40. Easttom, C. (2018, May). An Examination of Inefficiencies in Key Dependent
`Variations of the Rijndael S-Box. In Electrical Engineering (ICEE), Iranian
`Conference on (pp. 1658-1663). IEEE.
`41. Easttom, C. (2018, May). A Study of Cryptographic Backdoors in Cryptographic
`Primitives. In Electrical Engineering (ICEE), Iranian Conference on (pp. 1664-
`1669). IEEE.
`42. Easttom, C. (2018). Bluetooth Hacking 101. 2600 Magazine 35(1).
`43. Easttom (2018). An Examination of the Operational Requirements of Weaponized
`Malware. Journal of Information Warfare 17 (2).
`44. Easttom, C. (2018). A Method for Using Historical GPS Phone Records. Digital
`Forensics Magazine, 36.
`45. Easttom, C. (2018). A Systems Approach to Indicators of Compromise Utilizing
`Graph Theory. 2018 IEEE International Symposium on Technologies for
`Homeland Security.
`46. Easttom, C. (2018). How to model digital forensics investigations with graph
`theory. Digital Forensics Magazine, 37.
`47. Easttom, C. (2019). Conducting Investigations on the Dark Web. Journal of
`Information Warfare 18 (1).
`48. Easttom, C. (2019). An Analysis of Leading Lattice-Based Asymmetric
`Cryptographic Primitives. 2019 IEEE 9th Annual Computing and Communication
`Conference.
`49. Easttom, C., Butler, W. (2019). A Modified McCumber Cube as a Basis for a
`Taxonomy of Cyber Attack. 2019 IEEE 9th Annual Computing and
`Communication Conference.
`50. Alsmadi, I, Easttom, C. (2019). The Analysis of Sub-Communities Behavior in
`Social Networks. American Journal of Science and Engineering, 1(1).
`51. Easttom, C. (2019). Integrating Machine Learning algorithms in the Engineering
`of Weaponized Malware. European Conference on the Impact of Artificial
`Intelligence and Robotics, Oxford University, England.
`52. Easttom C. (2019). On the relationship of emergence and non-linear dynamics to
`machine learning and synthetic consciousness. European Conference on the
`Impact of Artificial Intelligence and Robotics, Oxford University, England.
`53. Easttom, C. (2019). A Methodological Approach to Weaponizing Machine
`Learning. 4th International Conference on Computer Science and Information
`Engineering in Beijing China.
`54. Easttom, C. (2019). On the Application of the Complexity Zeta Function to
`Quantify Complexity in Bioengineering Systems. 4th International Conference on
`Computer Science and Information Engineering in Beijing China.
`
`9
`
`
`Page 9 of 42
`
`

`

`55. Alsmadi, I, Easttom, C. (2019). Using Maximum Weighted Cliques in the
`Detection of Sub-Communities’ behaviors in OSNs. Proceedings of the Future
`Technologies Conference 2019.
`56. Easttom, C. (2019). SecML: A Proposed Modeling Language for Cybersecurity.
`IEEE 10th Annual Computing and Communication Conference UEMCON.
`57. Easttom, C., Mei, N. (2019). Mitigating Implanted Medical Device Cybersecurity
`Risks. IEEE 10th Annual Computing and Communication Conference UEMCON.
`58. Easttom, C., Sanders, W. (2019). On the Efficacy of Using Android Debugging
`Bridge for Android Device Forensics. IEEE 10th Annual Computing and
`Communication Conference UEMCON.
`59. Easttom, C. (2020). Mathematically modeling cyber-attacks utilizing engineering
`techniques 15th International Conference on Cyber Warfare and Security ICCWS
`60. Easttom, C., Butler, W. (2020). Applying systems engineering principles to
`penetration testing. 15th International Conference on Cyber Warfare and Security
`ICCWS
`61. Easttom, C. (2020). On the Application of Algebraic Graph Theory to Modeling
`Network Intrusions. 2020 IEEE 10th Annual Computing and Communication
`Conference.
`62. Easttom, C., Thapa, S., Lawson, J. (2020). A Comparative Study of Machine
`Learning Algorithms for Use in Breast Cancer Studies. 2020 IEEE 10th Annual
`Computing and Communication Conference.
`63. Easttom, C. (2020). On the Application of the Complexity Zeta Function to
`Modelling Complexity and Emergence in Neuro-Engineering. 2020 IEEE 10th
`Annual Computing and Communication Conference.
`64. Easttom, C. (2020). A professional Engineering Approach to Penetration Testing.
`PenTest Magazine, March 2020.
`65. Easttom, C. Adda, M. (2020). An Enhanced View of Incidence Functions for
`Applying Graph Theory to Modeling Network Intrusions. WSEAS Transactions
`on Information Science and Applications. DOI: 10.37394/23209.2020.17.12
`66. Easttom, C., Ibrahim, A, Chefronov, C., Alsmadi, I., Hanson, R. (2020). Towards
`a deeper NTRU analysis: a multi modal analysis. International Journal on
`Cryptography and Information Security (IJCIS). 10(2).
`67. Easttom, C. Adda, M. (2020) The Creation of Network Intrusion Fingerprints by
`Graph Homomorphism. WSEAS Transactions on Information Science and
`Applications. 17(2020). DOI: 10.37394/23209.2020.17.15
`68. Easttom, C. (2021). Mathematically modelling victim selection in cybercrimes.
`16th International Conference on Cyber Warfare and Security - ICCWS 2021
`69. Easttom, C. (2021). A methodology for smart TV Forensics. 16th International
`Conference on Cyber Warfare and Security - ICCWS 2021
`70. Easttom C. (2021). On the Use of the SSIM Algorithm for Detecting Intellectual
`Property Copying in Web Design. IEEE 11th Annual Computing and
`Communication Conference.
`71. Easttom, C., Adda, M. (2021). Application of the Spectra of Graphs in Network
`
`10
`
`
`Page 10 of 42
`
`

`

`Forensics. IEEE 11th Annual Computing and Communication Conference.
`72. Pelosi, M., & Easttom, C. (2021). Identification of LSB image Steganography
`using Cover Image Comparisons. Journal of Digital Forensics, Security and Law,
`15(2), 6.
`73. Easttom, C., Butler, W. (2021). The Iran-Saudi Cyber Conflict. International
`Journal of Cyber Warfare and Terrorism (IJCWT)
`74. Easttom, C., Bianch, L, Valeriani, D., Nam, C., Hossaini, A., Zapala, D., Roman-
`Gonzalez, A., Singh, A., Antonietti, A., Sahonero-Alverez, G., Balachandran, P.,
`(2021). A Functional Model for Unifying Brain Computer Interface Terminology.
`IEEE Open Journal of Engineering in Medicine and Biology.
`75. Easttom, C. (2021, October). Applying Mathematics and Engineering Techniques
`to Cyber Security. In Actas del Congreso Internacional de Ingeniería de Sistemas
`(pp. e5575-e5575).
`76. Easttom, C., Bianchi, L., Valeriani, D., Nam, C. S., Hossaini, A., Zapała, D., ... &
`Balachandran, P. (2021). A functional BCI model by the P2731 working group:
`control interface. Brain-Computer Interfaces, 8(4), 154-160.
`77. Easttom, C., Alsmadi, I (2022).A Comparative Study of Machine Learning
`Algorithms for Identifying Mental States from EEG Recordings. IEEE 12th
`Annual Computing and Communication Conference.
`78. Easttom, C. (2022). NTRU & LASH Implemented for Quantum Resistant
`Blockchain. IEEE 12th Annual Computing and Communication Conference.
`
`Patents
`
`1. U.S. Patent No. 8,527,779 B1 Method and apparatus of performing
`distributed steganography of a data message.
`2. U.S. Patent No. 8,713,067 Stable File System
`3. U.S. Patent No. 8,819,827 B1 Method and apparatus of performing data
`executable integrity verification.
`4. U.S. Patent No. 8,825,845 B1 Managing a network element operating on a
`network.
`5. U.S. Patent No. 8,825,810 B1 Domain name service based remote
`programming objects.
`6. U.S. Patent No. 8,984,639 Method and apparatus of performing
`data executable integrity verification.
`7. U.S. Patent No. 9,405,907 Method and apparatus of performing data
`executable integrity verification (a continuation patent of '639)
`8. US Patent No. 9,313,167 Domain name service based remote
`programming objects.
`9. US Patent No. 9,619,656 Method and apparatus of performing distributed
`steganography of a data message (continuation patent of 8,527,779 B1)
`10. US Patent No. 9,686,227 Domain Name Service based remote
`programming objects (continuation patent of U.S. Pat. No. 9,313,167)
`11. US Patent No. 9,755,887 Managing a network element operating on a
`network.
`
`
`
`
`
`11
`
`
`Page 11 of 42
`
`

`

`12. US Patent No. 9,754,108 Method and apparatus of performing data
`executable integrity verification.
`13. US Patent No. 9,753,957 System and method for document tracking
`14. US Patent No. 9,984,229 Method and apparatus providing a multiple
`source evidence application trust model.
`15. US Patent No. 10,122,573 Managing a network element operating
`on a network.
`16. US Patent No. 10,242,188 Method and apparatus of performing
`data executable integrity verification.
`17. US Patent No. 10,360,354 Method and apparatus of performing
`distributed steganography of a data message. A continuation patent of
`U.S. Pat. No. 9,619,656.
`18. U.S. Patent No. 10,469,441 Domain name service based remote
`programming objects. A continuation patent of U.S. Patent 9,686,227.
`19. U.S. Patent No. 10,467,208 System and method for document
`tracking. A continuation patent of U.S. Patent 9,753,957.
`20. US Patent No. 10,621,149 Stable File System. A continuation patent of
`U.S. Pat. No. 8,713,067.
`21. U.S. Patent No. 10,635,815 Method and apparatus of performing
`data executable integrity verification.
`22. U.S. Patent No. 10,708,118 Managing a network element operating
`on a network.
`23. U.S. Patent No. 11,080,396 Secure Downloads
`24. U.S. Patent No. 11,165,629 Managing a network element operating
`on a network
`25. U.S. Patent No. 11,204,999 Method and apparatus of performing
`data executable integrity verification
`
`Standards and Certification Creation
`
`1. Chair of IEEE P3123 Standard for Artificial Intelligence and Machine Learning
`(AI/ML) Terminology and Data Formats.
`2. Vice Chair of IEEE P23026 - Systems and Software Engineering -- Engineering
`and Management of Websites for Systems, Software, and Services Information
`3. Member of IEEE Software & Systems Engineering Standards Committee.
`Working on the DevOps 2675 standards group 2017 to 2019.
`4. Member of the IEEE Engineering in Medicine and Biology Standards Committee.
`Standard for a Unified Terminology for Brain-Computer Interfaces P2731 from
`2020 to present. I am chairing one of the subgroups.
`5. Member of IEEE P2995 - Trial-Use Standard for a Quantum Algorithm Design
`and Development Standards Group from 2021 to present
`6. Vice Chair of IEEE P3120 - Quantum Computing Architecture Working Group
`7. Member of IEEE P3155 QuSIM/WG - Programmable Quantum Simulator Working Group
`8. Member of IEEE Artificial Intelligence Standards Group from 2021 to present.
`
`12
`
`
`
`
`
`
`Page 12 of 42
`
`

`

`1. Editor in Chief for the American Journal of Science and Engineering 2017 to 2022
`2. Editorial board for the Journal Artificial Intelligence in Medical Imaging
`3. Editorial Review Board for International Journal of Cyber Warfare and
`Terrorism (IJCWT)
`4. Reviewer for Journal of Modern Mechanical Engineering and Technology – EBM
`5. Reviewer for scientific papers submitted to IEEE Security & Privacy and the
`IEEE Open Access Journal.
`6. Reviewer for the International Journal of Network Security (IJNS) 2018-2019
`7. Reviewer for the International Journal of Computer Science and Security (IJCSS)
`2018-2019
`8. Reviewer for the Journal of Information Warfare (JIW) for 2019
`9. Reviewer for scientific papers submitted to Digital Forensics magazine for 2016
`to 2018.
`10. Editorial board member for the year 2016 for Journal of Information Security
`Science & Digital Forensics.
`11. Editorial board for the year 2016 member for The Forensic Examiner.
`12. Subject matter expert for the Computer Technology Industry Association
`(CompTIA) Server + exam creation team. I was part of the team that helped
`create the CompTIA Server+ certification test.
`13. Subject matter expert for the Computer Technology Industry Association
`(CompTIA) Linux+ exam review team. I was part of the team that helped create
`the CompTIA Linux+ certification test.
`14. Subject matter expert for the Computer Technology Industry Association
`(CompTIA) Security+ exam Job Task Analysis team. I was part of the team that
`helped create the CompTIA Security+ certification test.
`15. Subject matter expert for the Computer Technology Industry Association
`(CompTIA) Certified Technical Trainer exam revision team.
`16. Created the EC Council Certified Encryption Specialist course and certification
`test. Then revised the course and certification in 2017.
`17. Created the EC Council CAST Advanced Encryption course.
`18. Created the EC Council advanced forensics courses for Dark Web investigations;
`Memory and Malware Forensics; and Cell Phone Forensics.
`19. Created the EC Council IoT and IoT security courses.
`20. Worked on the Job Task Analysis Team for the Certified Ethical Hacker v8 test.
`21. Created the video courses for EC-Council CASE (Certified Application Security
`Engineer) courses for Java and .Net.
`22. Member of the advisory board for Embry Riddle University cyber security
`program within the Homeland Security degree program 2016-2018.
`23. Created the OSCFE (OS Forensics Certified Forensic Examiner) course and test.
`24. Advisory board committee for your DOE- National Nuclear Security
`
`13
`
`
`Page 13 of 42
`
`

`

`
`
`
`
`
`
`
`
`Administration (NNSA)’s solicitation, “Minority Serving Institution Partnership
`Program (MSIPP), title TAMUK Cybersecurity Minor / Certificate Program for
`DOE / NNSA Workforce. Texas A&M University Kingsville.
`
`Professional Awards and Memberships
`
`1. Distinguished Speaker of the Association of Computing Machinery (2017 to
`2020)
`2. Distinguished Visitor of the IEEE Computer Society (for the term of 1 January
`2020 through 31 December 2022)
`3. Senior Member of the IEEE (Institute of Electronics and Electrical Engineers)
`#92862378
`4. Senior Member of the ACM (Association of Computing Machinery) #0447967
`5. Member of the ACM Special Interest Group on Artificial Intelligence
`6. Member of the International Association of Cryptological Research (IACR)
`7. Member of the ACM Special Interest Group on Security, Audit and Control
`8. Member of the IEEE Nanotechnology Society
`9. Member of the IEEE Engineering in Medicine and Biology Society
`10. Member of the International Council of Systems Engineers (INCOSE) # 275062
`11. Affiliate Member of the National Academy of Forensic Engineers
`12. Member of the American Physical Society (APS). Member of both the Quantum
`Information and Nuclear Physics divisions
`13. Member of the Association for the Advancement of Artificial Intelligence
`14. Associate Member of the American Academy of Forensic Sciences (2015 to
`2018)
`15. Member of InfraGard (FBI-Civilian group for cyber security) 2013- 2019
`16. 1992-1993 National Deans List
`17. Who's Who in American Colleges and Universities 1998

This document is available on Docket Alarm but you must sign up to view it.


Or .

Accessing this document will incur an additional charge of $.

After purchase, you can access this document again without charge.

Accept $ Charge
throbber

Still Working On It

This document is taking longer than usual to download. This can happen if we need to contact the court directly to obtain the document and their servers are running slowly.

Give it another minute or two to complete, and then try the refresh button.

throbber

A few More Minutes ... Still Working

It can take up to 5 minutes for us to download a document if the court servers are running slowly.

Thank you for your continued patience.

This document could not be displayed.

We could not find this document within its docket. Please go back to the docket page and check the link. If that does not work, go back to the docket and refresh it to pull the newest information.

Your account does not support viewing this document.

You need a Paid Account to view this document. Click here to change your account type.

Your account does not support viewing this document.

Set your membership status to view this document.

With a Docket Alarm membership, you'll get a whole lot more, including:

  • Up-to-date information for this case.
  • Email alerts whenever there is an update.
  • Full text search for other cases.
  • Get email alerts whenever a new case matches your search.

Become a Member

One Moment Please

The filing “” is large (MB) and is being downloaded.

Please refresh this page in a few minutes to see if the filing has been downloaded. The filing will also be emailed to you when the download completes.

Your document is on its way!

If you do not receive the document in five minutes, contact support at support@docketalarm.com.

Sealed Document

We are unable to display this document, it may be under a court ordered seal.

If you have proper credentials to access the file, you may proceed directly to the court's system using your government issued username and password.


Access Government Site

We are redirecting you
to a mobile optimized page.





Document Unreadable or Corrupt

Refresh this Document
Go to the Docket

We are unable to display this document.

Refresh this Document
Go to the Docket