`chuckeasttom@gmail.com
`
`Education
`
`University Degrees
` B.A. Southeastern Oklahoma State University. Major Communications with
`Minors in Chemistry and Psychology. Extensive coursework in science
`(chemistry, physics, and biology) as well as specific courses in neuroscience
`(neurobiology of memory, cognitive science, etc.). Also, additional coursework in
`computer science including programming and database courses. While attending I
`was named to the National Dean’s List.
` M.Ed. Southeastern Oklahoma State University. Coursework included technology
`related courses such as digital video editing, multimedia presentations, and
`computer graphics. A statistics course was also part of the coursework. While
`attending I was named to Who’s Who in Colleges and Universities.
` M.B.A. Northcentral University major in Applied Computer Science. Extensive
`course work in graduate computer science including graduate courses in C++
`programming, C# programming, Computer Graphics, Web Programming,
`Network communication, Complex Database Management Systems, and Artificial
`Intelligence. Approximately 30 graduate hours of graduate computer science
`courses. Additionally, a doctoral level statistics course was included. A semester
`research project in electronic medical software was also part of the curriculum. I
`also took several research courses beyond the requirements for the degree.
` MSSE Master of Science in Systems Engineering. University of Texas at El
`Paso. The coursework includes studies in software & system requirements;
`system integration, verification, and validation; system architecture and design;
`and systems modeling & simulation. 4.0 GPA member of Phi Kappa Phi honor
`society. Also, a member of the Gold Key Honor society.
` D.Sc. Doctor of Science in Cyber Security from Capitol Technology University.
`The curriculum included a broad coverage of cybersecurity issues. My
`dissertation topic was “A Comparative Study of Lattice Based Algorithms for
`Post Quantum Computing”. 4.0 GPA.
` Ph.D. Doctor of Philosophy in Technology from Capitol Technology University.
`The focus of this program was on nanotechnology used in bioengineering. More
`specifically my studies focused on carbon nanotubes used in bioengineering.
`Dissertation topic “The Effects of Complexity on Carbon Nanotube Failures”. 4.0
`GPA.
` Ph.D. Doctor of Philosophy in Computer Science from University of Portsmouth
`in England. The emphasis was on computer networking and the application of
`applied mathematics. Dissertation topic “A Systematic Framework for Network
`Forensics Using Graph Theory”.
`
`Industry Certifications
`The following is a list of engineering and computer industry certifications I have earned.
`
`1
`
`CPC EXHIBIT 2014
`Apple Inc. v. CPC Patent Technologies PTY Ltd.
`IPR2022-00602
`
`Page 1 of 42
`
`
`
`Engineering Certifications
`Note: some of these appear also in computer industry certifications
`1. Associate of Systems Engineering (ASEP) from INCOSE (International Council
`on Systems Engineering) 05452.
`2. Microsoft Certified Systems Engineer (MCSE) Windows Server 2000
`Certification Number: A527-9552
`3. EC Council Certified Application Security Engineer - .Net
`4. EC Council Certified Application Security Engineer – Java
`5. CISSP- ISSEP Information Systems Security Engineering Professional #387731
`
`Hardware and Networking Related Certifications
`1. CompTIA (Computer Technology Industry Associations) A+ Certified D76DTT4107
`2. CompTIA Network + Certified COMP10163630
`3. CompTIA Server+ Certified COMP10163630
`4. CompTIA I-Net+ Certified COMP10163630
`5. CompTIA Cloud+ Certified COMP001021522764
`6. JN0-103 Juniper Networks Certified Associate, Junos JNCIA-Junos
`7. CompTIA IT Operations Specialist (CIOS) COMP10163630
`8. CompTIA Cloud Admin Professional (CCAP) COMP10163630
`9. CompTIA Network Infrastructure Professional – CNIP COMP10163630
`
`
`
`
`
`Operating System Related Certifications
`10. Microsoft Certified Trainer
`11. CompTIA Linux + Certified COMP10163630
`12. CompTIA Systems Support Specialist (CSSS) COMP10163630
`13. CompTIA Linux Network Professional – CLNP COMP10163630
`14. CompTIA Secure Infrastructure Specialist (CSIS) COMP10163630
`15. Microsoft Certified Professional (MCP) – Windows Server 2000 Professional
`Certification Number: A527-9546
`16. Microsoft Certified Systems Administrator (MCSA) Windows Server 2000
`Certification Number: A527-9556
`17. Microsoft Certified Systems Engineer (MCSE) Windows Server 2000 Certification
`Number: A527-9552
`18. Microsoft Certified Technology Specialist (MCTS) Windows Server 2008 Active
`Directory Microsoft Certification ID: 1483483
`19. Microsoft Certified Technology Specialist (MCTS) Windows 7 Microsoft
`Certification ID: 1483483
`
`2
`
`
`Page 2 of 42
`
`
`
`20. Microsoft Certified IT Professional (MCITP) Windows 7 Microsoft Certification ID:
`1483483
`21. Microsoft Certified Solutions Associate Windows 7 Microsoft Certification ID:
`1483483
`22. National Computer Science Academy Windows 8 Certification Certificate #:
`4787829
`
`Programming and Web Development Related Certifications
`23. Microsoft Certified Professional (MCP) – Visual Basic 6.0 Desktop Applications
`Microsoft Certification ID: 1483483
`24. Microsoft Certified Professional (MCP) – Visual Basic 6.0 Distributed Applications
`Microsoft Certification ID: 1483483
`25. Microsoft Certified Application Developer (MCAD) - C# Microsoft Certification ID:
`1483483
`26. Microsoft Certified Trainer (MCT 2005-2012) Microsoft Certification ID: 1483483
`27. Microsoft Certified Technology Specialist (MCTS) Visual Studio 2010 Windows
`Application Microsoft Certification ID: 1483483
`28. Microsoft Certified Technology Specialist (MCTS) Visual Studio 2010 Data Access
`Microsoft Certification ID: 1483483
`29. National Computer Science Academy HTML 5.0 Certification Certificate #:
`4788000.
`30. National Computer Science Academy ASP.Net Certification Certificate #: 4788342
`31. Certified Internet Webmaster (CIW) Associate CIW0163791
`32. EC Council Certified Application Security Engineer - .Net
`33. EC Council Certified Application Security Engineer – Java
`34. Dynamics 365 Business Central Functional Consultant Associate
`35. Microsoft Dynamics 365 Fundamentals Microsoft Certification ID: 1483483
`36. Microsoft Certified: Azure AI Fundamentals Microsoft Certification ID: 1483483
`
`
`
`
`
`Database Related Certifications
`37. Microsoft Certified Database Administrator (MCDBA) SQL Server 2000 Microsoft
`Certification ID: 1483483
`38. Microsoft Certified Technology Specialist (MCTS) Implementing SQL Server 2008
`Microsoft Certification ID: 1483483
`39. Microsoft Certified IT Professional (MCITP) SQL Server Administration Microsoft
`Certification ID: 1483483
`40. DP-203 - Data Engineering on Microsoft Azure
`Security and Forensics Related Certifications
`
`3
`
`
`Page 3 of 42
`
`
`
`41. CIW Certified Security Analyst CIW0163791
`42. EC Council Certified Ethical Hacker v5 (CEH) ECC942445
`43. EC Council Certified Hacking Forensics Investigator v4 (CHFI) ECC945708
`44. EC Council Certified Security Administrator (ECSA) ECC947248
`45. EC Council Certified Encryption Specialist (ECES)
`46. EC Council Certified Instructor
`47. CISSP – Certified Information Systems Professional #387731
`48. ISSAP – Certified Information Systems Architect #387731
`49. CCFP – Certified Cyber Forensics Professional #387731
`50. Certified Criminal Investigator (CCI) 2015-2017
`51. Forensic Examination of CCTV Digital VTR Surveillance Recording Equipment
`52. Oxygen Phone Forensics Certified
`53. Access Data Certified Examiner (ACE) 2014-2017
`54. OSForensics Certified Examiner (OSFCE)
`55. Certified Forensic Consultant (CFC) 2015-2017
`56. CompTIA Certified Advanced Security Practitioner (CASP) COMP10163630
`57. CompTIA Certified Cybersecurity Analysis (CySA+) COMP001021522764
`58. CompTIA Pentest+ COMP001021522764
`59. CompTIA Security+ COMP001021522764
`60. CompTIA Security Analytics Specialist-CSAP COMP001021522764
`61. CompTIA Secure Cloud Professional-CSCP COMP001021522764
`62. CompTIA Network Vulnerability Assessment Professional-CNVP
`COMP001021522764
`63. CompTIA Security Infrastructure Expert -CSIE COMP001021522764
`64. CompTIA Security Analytics Expert-CSAE COMP001021522764
`65. CompTIA Security Network Professional – CNSP
`66. JN0-230 – Juniper Security Associate (JNCIA-SEC)
`67. JN0-334 – Juniper Security Specialist (JNCIS-SEC)
`68. JN0-635 – Juniper Security, Professional (JNCIP-SEC)
`69. CISSP- ISSEP Information Systems Security Engineering Professional #387731
`70. Certified Cloud Security Professional (CCSP) #387731
`71. SC-300 - Microsoft Identity and Access Administrator
`
`
`
`Software Certifications
`72. National Computer Science Academy Microsoft Word 2013 Certification Certificate
`#: 5078016
`
`4
`
`
`Page 4 of 42
`
`
`
`
`
`
`
`
`
`73. National Computer Science Academy Microsoft Word 2000 Certification Certificate
`#: 5078187
`
`Licenses
`Texas State Licensed Private Investigator. Registration Number 827827. Associated with
`Allegiant Investigations & Security License Number: A18596
`
`Publications
`Books
`1.
`Easttom, C. (2003). Moving from Windows to Linux. Newton Center,
`MA: Charles River Learning. 1st Edition, Charles River Media.
`2.
`Easttom, C. & Hoff, B. (2006). Moving from Windows to Linux, 2nd Ed.
`Newton Center, MA: Charles River Learning. 1st Edition, Charles River Media.
`3.
`Easttom, C. (2003). Programming Fundamentals in C++. Newton Center,
`MA: Charles River Learning. 1st Edition, Charles River Media.
`4.
`Easttom C. (2002). JFC and Swing with JBuilder 8.0. Plano, Texas:
`WordWare Publishing.
`5.
`Easttom, C. (2002). JBuilder 7.0 EJB Programming. Plano, Texas:
`WordWare Publishing.
`6.
`Easttom, C. (2001). Beginning JavaScript, 1st Edition. Plano, Texas:
`WordWare Publishing.
`7.
`Easttom, C. (2002). Beginning VB.Net. Plano, Texas: WordWare
`Publishing.
`8.
`Easttom, C. (2001). Advanced JavaScript, 2nd Edition. Plano, Texas:
`Wordware Publishing.
`9.
`Easttom, C. (2005). Introduction to Computer Security. New York City,
`New York: Pearson Press.
`10.
`Easttom, C. (2006). Network Defense and Countermeasures. New York
`City, New York: Pearson Press.
`11.
`Easttom, C. (2005). Advanced JavaScript, 3rd Edition. Plano, Texas:
`Wordware Publishing.
`12.
`Easttom, C. & Taylor, J. (2010). Computer Crime, Investigation, and the
`Law. Boston, Massachusetts: Cengage Learning.
`13.
`Easttom, C. (2013). Essential Linux Administration: A Comprehensive
`Guide for Beginners. Boston, Massachusetts: Cengage Learning.
`14.
`Easttom, C. (2011). Introduction to Computer Security, 2nd Edition. New
`York City, New York: Pearson Press.
`15.
`Easttom, C. (2012). Network Defense and Countermeasures, 2nd Edition.
`New York City, New York: Pearson Press.
`
`5
`
`
`Page 5 of 42
`
`
`
`16.
`Easttom, C. (2013). System Forensics, Investigation, and Response, 2nd
`Edition. Burlington Massachusetts: Jones & Bartlett.
`17.
`Easttom, C. (2014). CCFP Certified Cyber Forensics Professional All-in-
`One Exam Guide. New York City, New York: McGraw-Hill Publishing.
`18.
`Easttom, C. & Dulaney, E. (2015). CompTIA Security+ Study Guide:
`SY0-401. Hoboken, New Jersey: Sybex Press.
`19.
`Easttom, C. (2015). Modern Cryptography: Applied Mathematics for
`Encryption and Information Security. New York City, New York: McGraw-Hill
`Publishing.
`20.
`Easttom, C. (2016). Computer Security Fundamentals, 3rd Edition. New
`York City, New York: Pearson Press.
`21.
`Easttom, C. (2017). System Forensics, Investigation, and Response, 3rd
`Edition. Burlington Massachusetts: Jones & Bartlett.
`22.
`Easttom, C. & Dulaney, E. (2017). CompTIA Security+ Study Guide:
`SY0-501. Hoboken, New Jersey: Sybex Press.
`23.
`Easttom, C. (2018). Penetration Testing Fundamentals: A Hands-on Guide
`to Reliable Security Audits. New York City, New York: Pearson Press.
`24.
`Easttom, C., & Christy, R. (2017). CompTIA Security+ Review Guide:
`SY0-501. Hoboken, New Jersey: Sybex Press.
`25.
`Easttom, C. & Roberts, R. (2018). Networking Fundamentals, 3rd Edition.
`Goodheart-Wilcox Publishing.
`26.
`Easttom, C. (2018). Network Defense and Countermeasures, 3rd Edition.
`New York City, New York: Pearson Press.
`27.
`Easttom, C. (2019). Computer Security Fundamentals, 4th Edition. New
`York City, New York: Pearson Press.
`28.
`Easttom, C & Johnson, R. (2020). Security Policies and Implementation
`Issues, 3rd Edition. Jones and Bartlett.
`29.
`Alsmadi, I., Easttom, C., Tawalbeh, L. (2020). NICE Cyber Security
`Framework Cyber Security Management. Springer Press.
`30.
`Easttom, C. (2020). Modern Cryptography: Applied Mathematics for
`Encryption and Information Security 2nd Edition. New York City, New York:
`Springer Press.
`31.
`Easttom, C. (2021). Digital Forensics, Investigation, and Response, 4th
`Edition. Burlington Massachusetts: Jones & Bartlett.
`32.
`Easttom, C. (2021). Quantum Computing Fundamentals. New York City,
`New York: Pearson Press.
`33.
`Easttom, C. (2021). An In-Depth Guide to Mobile Device Forensics. CRC
`Press.
`34.
`Press.
`35.
`
`Easttom, C. (2022). Networking Fundamentals, 4th Edition. Goodheart-
`
`Easttom, C. (2021). Certified Ethical Hacker v11 Exam Cram. Pearson
`
`6
`
`
`Page 6 of 42
`
`
`
`Wilcox Publishing.
`36.
`Easttom, C. (2022). Modern Cryptography: Applied Mathematics for
`Encryption and Information Security 3rd Edition. New York City, New York:
`Springer Press.
`37.
`Easttom, C. (2023). Machine Learning for Neuroscience. CRC Press (In
`progress).
`38.
`Easttom, C. (2019). Computer Security Fundamentals, 5th Edition. New
`York City, New York: Pearson Press.
`
`
`
`Papers, presentations, & articles.
`1. Easttom, C. (2010). RSA and its Challenges. EC Council White Paper.
`2. Easttom, C. (2010). Finding Large Prime Numbers. EC Council White Paper
`3. Easttom, C. (2010). A Method for Finding Large Prime Numbers. Haking
`Magazine. Hands-On Cryptography Issue.
`4. Easttom, C. (2014). A method for finding large prime numbers. Open-Source
`Article published by Academia.edu 2014.
`5. Easttom, C. (2011). The RSA Algorithm - The ups and Downs. CryptoMagazine.
`6. Easttom, C. (2011). Feistel Ciphers - An Overview. Presentation at Cast Security
`Conference. Washington, D.C.
`7. Easttom, C. (2011). Steganography- History and Modern Applications.
`Presentation at Takedown Security Conference.
`8. Easttom, C. (2012). Problems with RSA. Presentation at Takedown Security
`Conference – Dallas, TX.
`9. Easttom, C. (2013). Cryptanalysis. Presentation at Takedown Security
`Conference. Huntsville, Alabama.
`10. Easttom, C. (2014). An Overview of Cryptographic S-Boxes used in Block
`Ciphers. Research Gate. DOI RG.2.2.14084.94088.
`11. Easttom, C. (2014). Cryptographic Backdoors. Presentation at ISC2 Security
`Congress. Atlanta, Georgia.
`12. Easttom, C. (2014). Cryptographic Backdoors. Presentation at University of
`Texas Dallas ACM Chapter Conference.
`13. Easttom, C. (2014). Windows Registry Forensics. Research Gate. DOI
`RG.2.2.29603.86561
`14. Easttom, C. (2014). Artificial Intelligence, Fuzzy Logic, Neural Networks and
`Fuzzy Neural Networks and their impact on Electronic Medical Records.
`Academia.edu.
`15. Easttom, C. (2014). A Basic Overview of Electro-Magnetic Interference.
`Academia.edu.
`16. Easttom, C. (2014). An Overview of Targeted Malware. Academia.edu.
`17. Easttom C. (2014). An Introduction to Mobile Forensics. Academia.edu.
`
`7
`
`
`Page 7 of 42
`
`
`
`18. Easttom, C. (2015). Cryptographic Backdoors. Academia.edu.
`19. Easttom, C. (2015). The History of Computer Crime in America. Academia.edu.
`20. Easttom, C. (2015). Spyware Techniques. Academia.edu.
`21. Easttom, C. (2015). Recovering Deleted Files from NTFS. Academia.edu.
`22. Easttom, C. (2015). Multi-dimensional analysis of cyber-forensic evidence.
`Academia.edu.
`23. Easttom, C. (2016). Spyware coding techniques. Journal of Information Security
`Science & Digital Forensics (HJISSDF), 1 (1)
`24. Easttom, C. (2016). Cryptographic Backdoors – an introduction. Journal of
`Information Security Science & Digital Forensics (HJISSDF), 1 (1)
`25. Easttom, C. (2016). A Look at Spyware Techniques. 2600 Magazine, 33(3).
`Autumn issue 2016.
`26. Easttom, C. (2016). Multi-Dimensional Analysis of Digital Forensic Evidence.
`Forensic Examiner Journal, 25 (4).
`27. Easttom, C. (2016). Applying Graph Theory to Evidence Evaluation. Research
`Gate DOI: RG.2.2.23391.0528
`28. Easttom, C. (2017). An Overview of Pseudo Random Number Generators.
`Research Gate. DOI: RG.2.2.13941.58087
`29. Easttom, C. (2017). A Model for Penetration Testing. Research Gate. DOI:
`RG.2.2.36221.15844
`30. Easttom, C. (2017). The RSA Algorithm Explored. International Journal of
`Innovative Research in Information Security. (IJIRIS). 4(1).
`31. Easttom, C. (2017). Utilizing Graph Theory to Model Forensic Examination.
`International Journal of Innovative Research in Information Security (IJIRIS),
`4(2).
`32. Easttom, C. (2017). Applying Graph Theory to Modeling Investigations. IOSR
`Journal of Mathematics (IOSR-JM) 13,2 PP 47-51. doi:10.9790/5728-130205475
`33. Easttom, C. (2017). Enhancing SQL Injection with Stored Procedures. 2600
`Magazine. 34(3).
`34. Easttom, C. (2017). An Overview of Key Exchange Protocols. IOSR Journal of
`Mathematics (IOSR-JM). 13(4). DOI: 10.9790/5728-1304021618.
`35. Easttom, C. (2017). An Overview of Quantum Cryptography with Lattice Based
`Cryptography. IOSR Journal of Mathematics, 13(6).
`36. Easttom, C. (2018). A Generalized Methodology for Designing Non-Linear
`Elements in Symmetric Cryptographic Primitives. In Computing and
`Communication Workshop and Conference (CCWC), 2018 IEEE 8th Annual.
`IEEE.
`37. Easttom, C. (2018). The role of weaponized malware in cyber conflict and
`espionage. In 13th International Conference on Cyber Warfare and Security
`ICCWS, 2018.
`38. Easttom, C. (2018) An Overview of Cryptographic Backdoors. Journal of
`
`8
`
`
`Page 8 of 42
`
`
`
`Information System Security, 13 (3), 177-185.
`39. Easttom, C. (2018). The Daubert Standard as a Framework for Digital Forensics.
`Digital Forensics Magazine, 35.
`40. Easttom, C. (2018, May). An Examination of Inefficiencies in Key Dependent
`Variations of the Rijndael S-Box. In Electrical Engineering (ICEE), Iranian
`Conference on (pp. 1658-1663). IEEE.
`41. Easttom, C. (2018, May). A Study of Cryptographic Backdoors in Cryptographic
`Primitives. In Electrical Engineering (ICEE), Iranian Conference on (pp. 1664-
`1669). IEEE.
`42. Easttom, C. (2018). Bluetooth Hacking 101. 2600 Magazine 35(1).
`43. Easttom (2018). An Examination of the Operational Requirements of Weaponized
`Malware. Journal of Information Warfare 17 (2).
`44. Easttom, C. (2018). A Method for Using Historical GPS Phone Records. Digital
`Forensics Magazine, 36.
`45. Easttom, C. (2018). A Systems Approach to Indicators of Compromise Utilizing
`Graph Theory. 2018 IEEE International Symposium on Technologies for
`Homeland Security.
`46. Easttom, C. (2018). How to model digital forensics investigations with graph
`theory. Digital Forensics Magazine, 37.
`47. Easttom, C. (2019). Conducting Investigations on the Dark Web. Journal of
`Information Warfare 18 (1).
`48. Easttom, C. (2019). An Analysis of Leading Lattice-Based Asymmetric
`Cryptographic Primitives. 2019 IEEE 9th Annual Computing and Communication
`Conference.
`49. Easttom, C., Butler, W. (2019). A Modified McCumber Cube as a Basis for a
`Taxonomy of Cyber Attack. 2019 IEEE 9th Annual Computing and
`Communication Conference.
`50. Alsmadi, I, Easttom, C. (2019). The Analysis of Sub-Communities Behavior in
`Social Networks. American Journal of Science and Engineering, 1(1).
`51. Easttom, C. (2019). Integrating Machine Learning algorithms in the Engineering
`of Weaponized Malware. European Conference on the Impact of Artificial
`Intelligence and Robotics, Oxford University, England.
`52. Easttom C. (2019). On the relationship of emergence and non-linear dynamics to
`machine learning and synthetic consciousness. European Conference on the
`Impact of Artificial Intelligence and Robotics, Oxford University, England.
`53. Easttom, C. (2019). A Methodological Approach to Weaponizing Machine
`Learning. 4th International Conference on Computer Science and Information
`Engineering in Beijing China.
`54. Easttom, C. (2019). On the Application of the Complexity Zeta Function to
`Quantify Complexity in Bioengineering Systems. 4th International Conference on
`Computer Science and Information Engineering in Beijing China.
`
`9
`
`
`Page 9 of 42
`
`
`
`55. Alsmadi, I, Easttom, C. (2019). Using Maximum Weighted Cliques in the
`Detection of Sub-Communities’ behaviors in OSNs. Proceedings of the Future
`Technologies Conference 2019.
`56. Easttom, C. (2019). SecML: A Proposed Modeling Language for Cybersecurity.
`IEEE 10th Annual Computing and Communication Conference UEMCON.
`57. Easttom, C., Mei, N. (2019). Mitigating Implanted Medical Device Cybersecurity
`Risks. IEEE 10th Annual Computing and Communication Conference UEMCON.
`58. Easttom, C., Sanders, W. (2019). On the Efficacy of Using Android Debugging
`Bridge for Android Device Forensics. IEEE 10th Annual Computing and
`Communication Conference UEMCON.
`59. Easttom, C. (2020). Mathematically modeling cyber-attacks utilizing engineering
`techniques 15th International Conference on Cyber Warfare and Security ICCWS
`60. Easttom, C., Butler, W. (2020). Applying systems engineering principles to
`penetration testing. 15th International Conference on Cyber Warfare and Security
`ICCWS
`61. Easttom, C. (2020). On the Application of Algebraic Graph Theory to Modeling
`Network Intrusions. 2020 IEEE 10th Annual Computing and Communication
`Conference.
`62. Easttom, C., Thapa, S., Lawson, J. (2020). A Comparative Study of Machine
`Learning Algorithms for Use in Breast Cancer Studies. 2020 IEEE 10th Annual
`Computing and Communication Conference.
`63. Easttom, C. (2020). On the Application of the Complexity Zeta Function to
`Modelling Complexity and Emergence in Neuro-Engineering. 2020 IEEE 10th
`Annual Computing and Communication Conference.
`64. Easttom, C. (2020). A professional Engineering Approach to Penetration Testing.
`PenTest Magazine, March 2020.
`65. Easttom, C. Adda, M. (2020). An Enhanced View of Incidence Functions for
`Applying Graph Theory to Modeling Network Intrusions. WSEAS Transactions
`on Information Science and Applications. DOI: 10.37394/23209.2020.17.12
`66. Easttom, C., Ibrahim, A, Chefronov, C., Alsmadi, I., Hanson, R. (2020). Towards
`a deeper NTRU analysis: a multi modal analysis. International Journal on
`Cryptography and Information Security (IJCIS). 10(2).
`67. Easttom, C. Adda, M. (2020) The Creation of Network Intrusion Fingerprints by
`Graph Homomorphism. WSEAS Transactions on Information Science and
`Applications. 17(2020). DOI: 10.37394/23209.2020.17.15
`68. Easttom, C. (2021). Mathematically modelling victim selection in cybercrimes.
`16th International Conference on Cyber Warfare and Security - ICCWS 2021
`69. Easttom, C. (2021). A methodology for smart TV Forensics. 16th International
`Conference on Cyber Warfare and Security - ICCWS 2021
`70. Easttom C. (2021). On the Use of the SSIM Algorithm for Detecting Intellectual
`Property Copying in Web Design. IEEE 11th Annual Computing and
`Communication Conference.
`71. Easttom, C., Adda, M. (2021). Application of the Spectra of Graphs in Network
`
`10
`
`
`Page 10 of 42
`
`
`
`Forensics. IEEE 11th Annual Computing and Communication Conference.
`72. Pelosi, M., & Easttom, C. (2021). Identification of LSB image Steganography
`using Cover Image Comparisons. Journal of Digital Forensics, Security and Law,
`15(2), 6.
`73. Easttom, C., Butler, W. (2021). The Iran-Saudi Cyber Conflict. International
`Journal of Cyber Warfare and Terrorism (IJCWT)
`74. Easttom, C., Bianch, L, Valeriani, D., Nam, C., Hossaini, A., Zapala, D., Roman-
`Gonzalez, A., Singh, A., Antonietti, A., Sahonero-Alverez, G., Balachandran, P.,
`(2021). A Functional Model for Unifying Brain Computer Interface Terminology.
`IEEE Open Journal of Engineering in Medicine and Biology.
`75. Easttom, C. (2021, October). Applying Mathematics and Engineering Techniques
`to Cyber Security. In Actas del Congreso Internacional de Ingeniería de Sistemas
`(pp. e5575-e5575).
`76. Easttom, C., Bianchi, L., Valeriani, D., Nam, C. S., Hossaini, A., Zapała, D., ... &
`Balachandran, P. (2021). A functional BCI model by the P2731 working group:
`control interface. Brain-Computer Interfaces, 8(4), 154-160.
`77. Easttom, C., Alsmadi, I (2022).A Comparative Study of Machine Learning
`Algorithms for Identifying Mental States from EEG Recordings. IEEE 12th
`Annual Computing and Communication Conference.
`78. Easttom, C. (2022). NTRU & LASH Implemented for Quantum Resistant
`Blockchain. IEEE 12th Annual Computing and Communication Conference.
`
`Patents
`
`1. U.S. Patent No. 8,527,779 B1 Method and apparatus of performing
`distributed steganography of a data message.
`2. U.S. Patent No. 8,713,067 Stable File System
`3. U.S. Patent No. 8,819,827 B1 Method and apparatus of performing data
`executable integrity verification.
`4. U.S. Patent No. 8,825,845 B1 Managing a network element operating on a
`network.
`5. U.S. Patent No. 8,825,810 B1 Domain name service based remote
`programming objects.
`6. U.S. Patent No. 8,984,639 Method and apparatus of performing
`data executable integrity verification.
`7. U.S. Patent No. 9,405,907 Method and apparatus of performing data
`executable integrity verification (a continuation patent of '639)
`8. US Patent No. 9,313,167 Domain name service based remote
`programming objects.
`9. US Patent No. 9,619,656 Method and apparatus of performing distributed
`steganography of a data message (continuation patent of 8,527,779 B1)
`10. US Patent No. 9,686,227 Domain Name Service based remote
`programming objects (continuation patent of U.S. Pat. No. 9,313,167)
`11. US Patent No. 9,755,887 Managing a network element operating on a
`network.
`
`
`
`
`
`11
`
`
`Page 11 of 42
`
`
`
`12. US Patent No. 9,754,108 Method and apparatus of performing data
`executable integrity verification.
`13. US Patent No. 9,753,957 System and method for document tracking
`14. US Patent No. 9,984,229 Method and apparatus providing a multiple
`source evidence application trust model.
`15. US Patent No. 10,122,573 Managing a network element operating
`on a network.
`16. US Patent No. 10,242,188 Method and apparatus of performing
`data executable integrity verification.
`17. US Patent No. 10,360,354 Method and apparatus of performing
`distributed steganography of a data message. A continuation patent of
`U.S. Pat. No. 9,619,656.
`18. U.S. Patent No. 10,469,441 Domain name service based remote
`programming objects. A continuation patent of U.S. Patent 9,686,227.
`19. U.S. Patent No. 10,467,208 System and method for document
`tracking. A continuation patent of U.S. Patent 9,753,957.
`20. US Patent No. 10,621,149 Stable File System. A continuation patent of
`U.S. Pat. No. 8,713,067.
`21. U.S. Patent No. 10,635,815 Method and apparatus of performing
`data executable integrity verification.
`22. U.S. Patent No. 10,708,118 Managing a network element operating
`on a network.
`23. U.S. Patent No. 11,080,396 Secure Downloads
`24. U.S. Patent No. 11,165,629 Managing a network element operating
`on a network
`25. U.S. Patent No. 11,204,999 Method and apparatus of performing
`data executable integrity verification
`
`Standards and Certification Creation
`
`1. Chair of IEEE P3123 Standard for Artificial Intelligence and Machine Learning
`(AI/ML) Terminology and Data Formats.
`2. Vice Chair of IEEE P23026 - Systems and Software Engineering -- Engineering
`and Management of Websites for Systems, Software, and Services Information
`3. Member of IEEE Software & Systems Engineering Standards Committee.
`Working on the DevOps 2675 standards group 2017 to 2019.
`4. Member of the IEEE Engineering in Medicine and Biology Standards Committee.
`Standard for a Unified Terminology for Brain-Computer Interfaces P2731 from
`2020 to present. I am chairing one of the subgroups.
`5. Member of IEEE P2995 - Trial-Use Standard for a Quantum Algorithm Design
`and Development Standards Group from 2021 to present
`6. Vice Chair of IEEE P3120 - Quantum Computing Architecture Working Group
`7. Member of IEEE P3155 QuSIM/WG - Programmable Quantum Simulator Working Group
`8. Member of IEEE Artificial Intelligence Standards Group from 2021 to present.
`
`12
`
`
`
`
`
`
`Page 12 of 42
`
`
`
`1. Editor in Chief for the American Journal of Science and Engineering 2017 to 2022
`2. Editorial board for the Journal Artificial Intelligence in Medical Imaging
`3. Editorial Review Board for International Journal of Cyber Warfare and
`Terrorism (IJCWT)
`4. Reviewer for Journal of Modern Mechanical Engineering and Technology – EBM
`5. Reviewer for scientific papers submitted to IEEE Security & Privacy and the
`IEEE Open Access Journal.
`6. Reviewer for the International Journal of Network Security (IJNS) 2018-2019
`7. Reviewer for the International Journal of Computer Science and Security (IJCSS)
`2018-2019
`8. Reviewer for the Journal of Information Warfare (JIW) for 2019
`9. Reviewer for scientific papers submitted to Digital Forensics magazine for 2016
`to 2018.
`10. Editorial board member for the year 2016 for Journal of Information Security
`Science & Digital Forensics.
`11. Editorial board for the year 2016 member for The Forensic Examiner.
`12. Subject matter expert for the Computer Technology Industry Association
`(CompTIA) Server + exam creation team. I was part of the team that helped
`create the CompTIA Server+ certification test.
`13. Subject matter expert for the Computer Technology Industry Association
`(CompTIA) Linux+ exam review team. I was part of the team that helped create
`the CompTIA Linux+ certification test.
`14. Subject matter expert for the Computer Technology Industry Association
`(CompTIA) Security+ exam Job Task Analysis team. I was part of the team that
`helped create the CompTIA Security+ certification test.
`15. Subject matter expert for the Computer Technology Industry Association
`(CompTIA) Certified Technical Trainer exam revision team.
`16. Created the EC Council Certified Encryption Specialist course and certification
`test. Then revised the course and certification in 2017.
`17. Created the EC Council CAST Advanced Encryption course.
`18. Created the EC Council advanced forensics courses for Dark Web investigations;
`Memory and Malware Forensics; and Cell Phone Forensics.
`19. Created the EC Council IoT and IoT security courses.
`20. Worked on the Job Task Analysis Team for the Certified Ethical Hacker v8 test.
`21. Created the video courses for EC-Council CASE (Certified Application Security
`Engineer) courses for Java and .Net.
`22. Member of the advisory board for Embry Riddle University cyber security
`program within the Homeland Security degree program 2016-2018.
`23. Created the OSCFE (OS Forensics Certified Forensic Examiner) course and test.
`24. Advisory board committee for your DOE- National Nuclear Security
`
`13
`
`
`Page 13 of 42
`
`
`
`
`
`
`
`
`
`
`
`Administration (NNSA)’s solicitation, “Minority Serving Institution Partnership
`Program (MSIPP), title TAMUK Cybersecurity Minor / Certificate Program for
`DOE / NNSA Workforce. Texas A&M University Kingsville.
`
`Professional Awards and Memberships
`
`1. Distinguished Speaker of the Association of Computing Machinery (2017 to
`2020)
`2. Distinguished Visitor of the IEEE Computer Society (for the term of 1 January
`2020 through 31 December 2022)
`3. Senior Member of the IEEE (Institute of Electronics and Electrical Engineers)
`#92862378
`4. Senior Member of the ACM (Association of Computing Machinery) #0447967
`5. Member of the ACM Special Interest Group on Artificial Intelligence
`6. Member of the International Association of Cryptological Research (IACR)
`7. Member of the ACM Special Interest Group on Security, Audit and Control
`8. Member of the IEEE Nanotechnology Society
`9. Member of the IEEE Engineering in Medicine and Biology Society
`10. Member of the International Council of Systems Engineers (INCOSE) # 275062
`11. Affiliate Member of the National Academy of Forensic Engineers
`12. Member of the American Physical Society (APS). Member of both the Quantum
`Information and Nuclear Physics divisions
`13. Member of the Association for the Advancement of Artificial Intelligence
`14. Associate Member of the American Academy of Forensic Sciences (2015 to
`2018)
`15. Member of InfraGard (FBI-Civilian group for cyber security) 2013- 2019
`16. 1992-1993 National Deans List
`17. Who's Who in American Colleges and Universities 1998