You can find papers on Google Scholar

Below are samples of papers and other research publications divided by topic area.


Cryptography

Easttom, C. (2020). Modern Cryptography: Applied Mathematics for Encryption and Information Security 2nd Edition. New York City, New York: Springer Press.

Easttom, C., Ibrahim, A, Chefronov, C., Alsmadi, I., Hanson, R. (2020). Towards a deeper NTRU analysis: a multi modal analysis. International Journal on Cryptography and Information Security ( IJCIS). 10(2).

 March 14-15, 2019. Future of Information and Communication Conference (FICC) 2019 in San Francisco. Distinguished Speaker of the ACM talk: "Quantum Computing and Lattice Based Cryptography".

March 7-8, 2019 The International Conference on Data Sciences, Security and Applications(ICDSSA, 2019) Delivering two presentations: "Overview of Cryptographic Backdoors" and "S-Box Design in symmetric cryptographic primitives" as part of the Distinguished Speakers of the ACM program.

Easttom, C. (2019). "An Analysis of Leading Lattice-Based Asymmetric Cryptographic Primitives". 2019 IEEE 9th Annual Computing and Communication Conference.

Presentation on "Quantum Computing and Cryptography" October 10th and 11th, 2018 SecureWorld Dallas 2018.

"An exploration of quantum computing and post quantum cryptography" October 8 to 10  ISC2 Security Congress in New Orleans.

 Presentation on "Quantum Computing and Cryptography" May 17, 2018. SecureWorld Houston 2018.

Presentation on "Quantum Computing and Lattice Based Cryptography" April 11, 2018 University of Texas at Dallas ACM chapter as part of the Distinguished Speakers of the ACM program.

Easttom, C. (2018) An Overview of Cryptographic Backdoors. Journal of Information System Security, 13 (3), 177-185.

Easttom, C. (2018, May). An Examination of Inefficiencies in Key Dependent Variations of the Rijndael S-Box. In Electrical Engineering (ICEE), Iranian Conference on (pp. 1658-1663). IEEE.

Easttom, C. (2018, May). A Study of Cryptographic Backdoors in Cryptographic Primitives. In Electrical Engineering (ICEE), Iranian Conference on (pp. 1664-1669). IEEE.

Easttom, C. (2018). A Generalized Methodology for Designing Non-Linear Elements in Symmetric Cryptographic Primitives. In Computing and Communication Workshop and Conference (CCWC), 2018 IEEE 8th Annual. IEEE.

Easttom, C. (2017). An Overview of Quantum Cryptography with Lattice Based Cryptography. IOSR Journal of Mathematics, 13(6).

Easttom, C. (2017). An Overview of Key Exchange Protocols. IOSR Journal of Mathematics (IOSR-JM). 13(4). DOI: 10.9790/5728-1304021618

Easttom, C. (2017).  The RSA Algorithm Explored. International Journal of Innovative Research in Information Security. (IJIRIS). 4(1)

U.S. Patent No. 8,527,779 B1 Method and apparatus of performing distributed steganography of a data message

US Patent No. 9,619,656 Method and apparatus of performing distributed steganography of a data message (continuation patent of 8,527,779 B1)

Easttom, C. (2016). Cryptographic Backdoors - An Introduction. Journal of Information Security Science and Digital Forensics 1 (1).

Easttom, C. (2015). Modern Cryptography: Applied Mathematics for Encryption and Information Security. New York City, New York: McGraw-Hill Publishing.

Easttom, C. (2016). Steganography Workshop presented at Defcon 24

Easttom, C. (2010). RSA and its Challenges. EC Council White Paper.

Easttom, C. (2011). The RSA Algorithm - The ups and Downs. CryptoMagazine.

Easttom, C. (2011). Feistel Ciphers - An Overview. Presentation at Cast Security Conference. Washington, D.C.

Easttom, C. (2012). Problems with RSA. Presentation at Takedown Security Conference – Dallas, TX.


Easttom, C. (2013). Cryptanalysis. Presentation at Takedown Security Conference. Huntsville, Alabama

Easttom, C. (2014). Cryptographic Backdoors. Presentation at ISC2 Security Congress. Atlanta, Georgia.


Easttom, C. (2014). Cryptographic Backdoors. Presentation at University of Texas Dallas ACM Chapter Conference

Graph theory

One of Dr. Easttom's areas of research has been the application of graph theory to digital forensics.  He has also been expanding that into incident response.  Here are some sources to get you started with basic graph theory:

http://world.mathigon.org/Graph_Theory
http://primes.utm.edu/graph/
http://onlinelibrary.wiley.com/jour…/10.1002/(ISSN)1097-0118

Here are some papers and presentations on the topic (more to come):

Easttom, C., Adda, M. (2021). Application of the Spectra of Graphs in Network Forensics. IEEE 11th Annual Computing and Communication Conference

Easttom, C. Adda, M. (2020) The Creation of Network Intrusion Fingerprints by Graph Homomorphism. WSEAS Transactions on Information Science and Applications. 17(2020). DOI: 10.37394/23209.2020.17.15

Easttom, C. Adda, M. (2020)An Enhanced View of Incidence Functions for Applying Graph Theory to Modeling Network Intrusions. WSEAS Transactions On Information Science And Applications. DOI: 10.37394/23209.2020.17.12

Easttom, C. (2020). On the Application of Algebraic Graph Theory to Modeling Network Intrusions. 2020 IEEE 10th Annual Computing and Communication Conference.

February 11, 2019.  Dr. Easttom has been invited to speak at Seton Hall University on the application of graph theory to digital forensics and network investigations.

Easttom, C. (2018). How to model digital forensics investigations with graph theory. Digital Forensics Magazine, 37.

Easttom, C. (2018). "A Systems Approach To Indicators Of Compromise Utilizing Graph Theory". 2018 IEEE International Symposium on Technologies for Homeland Security.

Presenting "Applying Graph Theory to Digital Forensics" 6 May 2018 Princess Sumaya University for Technology in Amman Jordan as part of the Distinguished Speakers of the ACM program.

Easttom, C. (2016). Multi-Dimensional Analysis for Cyber Investigations. Forensic Examiner Journal,25 (4).

Easttom, C. (2016). Applying Graph Theory to Evidence Evaluation. Research Gate  DOI: RG.2.2.23391.0528.

Easttom, C. (2017). Utilizing Graph Theory to Model Forensic Examinations- Presentation for the 2nd Annual International Congress of the International Association of Law and Forensic Science (IAFLS). - Cairo Egypt, January 2017. DOI: RG.2.2.33025.66407

Easttom, C. (2017). Utilizing Graph Theory to Model Forensic Examination. International Journal of Innovative Research in Information Security (IJIRIS), 4(2).

Easttom, C. (2017). Applications of Graph Theory to Forensic Investigations- Presentation for the University of North Texas March 3, 2017. RG.2.2.16685.69609

Easttom, C. (2017). Applying Graph Theory to Modeling Investigations. IOSR Journal of Mathematics (IOSR-JM) 13,2 PP 47-51. doi:10.9790/5728-130205475

Easttom, C. (2016). Secure World Dallas. Speaking on "Analyzing Forensic Evidence -Applications of graph theory to forensic analysis”.


Easttom, C. (2017). University of North Texas. A presentation on Applying Graph Theory to Analyzing Digital Evidence.


Easttom, C. (2017). Enfuse 2017 conference in Las Vegas. A presentation on Applying Graph Theory to Analyzing Digital Evidence.


Easttom, C. (2017). ISC2 Security Congress in Austin Texas. A presentation on "Applying Graph Theory to Analyzing Digital Evidence".

Easttom, C. (2017). 2nd International Congress of the International Association of Law and Forensic Science (IALFS), in Cairo Egypt January 17, 18, 19.  “Applying Graph Theory to Model Forensic Examinations”.

AI/Machine Learning

Easttom, C. , Thapa, S., Lawson, J. (2020). A Comparative Study of Machine Learning Algorithms for Use in Breast Cancer Studies. 2020 IEEE 10th Annual Computing and Communication Conference.

Easttom, C. (2019). "Integrating Machine Learning algorithms in the Engineering of Weaponized Malware". Impact of Artificial Intelligence and Robotics Conference (held at Oxford)

Easttom, C. (2019). "On the relationship of emergence and non-linear dynamics to machine learning and synthetic consciousness". Impact of Artificial Intelligence and Robotics Conference (held at Oxford)

Easttom, C. (2019). " A Methodological Approach to Weaponizing Machine Learning " 4th International Conference on Computer Science and Information Engineering

October 28-30. ISC2 Security Congress. Presenting on machine learning and cybersecurity.

October 26, 2019 Colloquium on Analytics, Data Science and Computing (CADSCOM 2019). Keynote talk on Quantum Computing and AI.

 

Forensics

Note: some of these are also listed under Graph Theory

Easttom, C., Adda, M. (2021). Application of the Spectra of Graphs in Network Forensics. IEEE 11th Annual Computing and Communication Conference

Easttom, C. (2021). Mathematically modeling victim selection in cybercrimes. 16th International Conference on Cyber Warfare and Security - ICCWS 2021

Easttom, C. (2021). A methodology for smart TV Forensics. 16th International Conference on Cyber Warfare and Security - ICCWS 2021

Easttom, C. Adda, M. (2020) The Creation of Network Intrusion Fingerprints by Graph Homomorphism. WSEAS Transactions on Information Science and Applications. 17(2020). DOI: 10.37394/23209.2020.17.15

Easttom, C. Adda, M. (2020)An Enhanced View of Incidence Functions for Applying Graph Theory to Modeling Network Intrusions. WSEAS Transactions On Information Science And Applications. DOI: 10.37394/23209.2020.17.12

Easttom, C. (2020). On the Application of Algebraic Graph Theory to Modeling Network Intrusions. 2020 IEEE 10th Annual Computing and Communication Conference.

Easttom, C., Sanders, W. (2019). 'On the Efficacy of Using Android Debugging Bridge for Android Device Forensics. IEEE 10th Annual Computing and Communication Conference UEMCON.

Easttom, C. (2018). How to model digital forensics investigations with graph theory. Digital Forensics Magazine, 37.

Easttom, C. (2018). A Method For Using Historical GPS Phone Records. Digital Forensics Magazine, 36.

Easttom, C. (2018). "A Systems Approach to Indicators Of Compromise Utilizing Graph Theory". 2018 IEEE International Symposium on Technologies for Homeland Security.

Easttom, C. (2018). The Daubert Standard as a Framework for Digital Forensics. Digital Forensics Magazine, 35.

Easttom, C. (2014). Windows Registry Forensics. Research Gate. DOI RG.2.2.29603.86561

Easttom, C. (2015). Multi-dimensional Analysis for Cyber Forensic Evidence  Open Source publication academia.edu

Easttom, C. (2015). Recovering Deleted Files from NTFS Open Source publication academia.edu

Easttom, C. (2016). Multi-Dimensional Analysis for Cyber Investigations. Forensic Examiner Journal,25 (4).

Easttom, C. (2017). American Academy of Forensic Sciences 69th Annual Meeting. Speaking on a novel approach JTAG phone forensics.


Easttom, C. (2017). University of North Texas. A presentation on Applying Graph Theory to Analyzing Digital Evidence.


Easttom, C. (2017). Enfuse 2017 conference in Las Vegas. A presentation on Applying Graph Theory to Analyzing Digital Evidence.


Easttom, C. (2017). 2nd International Congress of the International Association of Law and Forensic Science (IALFS), in Cairo Egypt January 17, 18, 19. The topics were “Improving Digital Forensics” and “Applying Graph Theory to Model Forensic Examinations”.

Easttom, C. (2016). Secure World Dallas. A presentation on "Analyzing Forensic Evidence -Applications of graph theory to forensic analysis”.


Easttom, C. (2016).Jordan Cyber Security & Forensics Forum (JCSFF-2016) Presenting two presentations. The topics were “Zero Day Exploits” and “How to forensically analyze Zero Day Exploits”.


Easttom, C. (2016).“Improving Professional Standards in Cyber Forensics” Keynote speaker for Association of Digital Forensics Security and Law.

 

Applied Mathematics

Note: Many of these papers are also listed under other subjects.

Easttom, C. (2021). Mathematically modelling victim selection in cybercrimes. 16th International Conference on Cyber Warfare and Security - ICCWS 2021

Easttom, C. Adda, M. (2020) The Creation of Network Intrusion Fingerprints by Graph Homomorphism. WSEAS Transactions on Information Science and Applications. 17(2020). DOI: 10.37394/23209.2020.17.15

Easttom, C. Adda, M. (2020)An Enhanced View of Incidence Functions for Applying Graph Theory to Modeling Network Intrusions. WSEAS Transactions On Information Science And Applications. DOI: 10.37394/23209.2020.17.12

Easttom, C. (2020). "Mathematically modeling cyber-attacks utilizing engineering techniques" 15th International Conference on Cyber Warfare and Security ICCWS

Easttom, C. (2020). On the Application of Algebraic Graph Theory to Modeling Network Intrusions. 2020 IEEE 10th Annual Computing and Communication Conference.

Easttom, C. (2020). On the Application of the Complexity Zeta Function to Modelling Complexity and Emergence in Neuro-Engineering. 2020 IEEE 10th Annual Computing and Communication Conference.

Alsmadi, I, Easttom, C. (2019). The Analysis of Sub-Communities Behavior in Social Networks. American Journal of Science and Engineering, 1(1).

Alsmadi, I, Easttom, C. (2019). Using Maximum Weighted Cliques in the Detection of Sub-Communities’ behaviors in OSNs. Proceedings of the Future Technologies Conference 2019.

Easttom, C. (2019). "An Analysis of Leading Lattice-Based Asymmetric Cryptographic Primitives". 2019 IEEE 9th Annual Computing and Communication Conference.

Easttom, C. (2018, May). An Examination of Inefficiencies in Key Dependent Variations of the Rijndael S-Box. In Electrical Engineering (ICEE), Iranian Conference on (pp. 1658-1663). IEEE.

Easttom, C. (2018, May). A Study of Cryptographic Backdoors in Cryptographic Primitives. In Electrical Engineering (ICEE), Iranian Conference on (pp. 1664-1669). IEEE.

Easttom, C. (2018). A Generalized Methodology for Designing Non-Linear Elements in Symmetric Cryptographic Primitives. In Computing and Communication Workshop and Conference (CCWC), 2018 IEEE 8th Annual. IEEE.

Easttom, C. (2018). "A Systems Approach To Indicators Of Compromise Utilizing Graph Theory". 2018 IEEE International Symposium on Technologies for Homeland Security.

Easttom, C. (2020). "Mathematically modeling cyber-attacks utilizing engineering techniques" 15th International Conference on Cyber Warfare and Security ICCW

Bioengineering

Easttom, C., Bianch, L, Valeriani, D., Nam, C. , Hossaini, A., Zapala, D., Roman-Gonzalez, A., Singh, A., Antonietti, A., Sahonero-Alverez, G., Balachandran, P., (2021). A Functional Model for Unifying Brain Computer Interface Terminology. IEEE Open Journal of Engineering in Medicine and Biology.

Easttom, C., Thapa, S., Lawson, J. (2020). A Comparative Study of Machine Learning Algorithms for Use in Breast Cancer Studies. 2020 IEEE 10th Annual Computing and Communication Conference.

Easttom, C. (2020). On the Application of the Complexity Zeta Function to Modeling Complexity and Emergence in Neuro-Engineering. 2020 IEEE 10th Annual Computing and Communication Conference.

Easttom, C., Mei, N. (2019). Mitigating Implanted Medical Device Cyber security Risks. IEEE 10th Annual Computing and Communication Conference UEMCON.

Easttom, C. (2019). "On the Application of the Complexity Zeta function to measuring complexity and emergences in bioengineering” 4th International Conference on Computer Science and Information Engineering

Other Papers/Research

Easttom, C. (2020). A professional Engineering Approach to Penetration Testing. PenTest Magazine, March 2020

Easttom, C. (2020). "Mathematically modeling cyber-attacks utilizing engineering techniques" 15th International Conference on Cyber Warfare and Security ICCWS

Easttom, C., Butler, W. (2020). "Applying systems engineering principles to penetration testing." 15th International Conference on Cyber Warfare and Security ICCWS

Easttom, C. (2019). SecML: A Proposed Modeling Language for CyberSecurity. IEEE 10th Annual Computing and Communication Conference UEMCON.

Alsmadi, I, Easttom, C. (2019). The Analysis of Sub-Communities Behavior in Social Networks. American Journal of Science and Engineering, 1(1).

Alsmadi, I, Easttom, C. (2019). Using Maximum Weighted Cliques in the Detection of Sub-Communities’ behaviors in OSNs. Proceedings of the Future Technologies Conference 2019.

Easttom, C. (2019). " A Methodological Approach to Weaponizing Machine Learning " 4th International Conference on Computer Science and Information Engineering

Easttom, C. (2019). "On the utilization of machine learning algorithms in weaponized malware". European Conference on the Impact of Artificial Intelligence and Robotics, Oxford University, England.

Easttom, C. (2019). "A Modified McCumber Cube as a Basis for a Taxonomy of Cyber Attack". 2019 IEEE 9th Annual Computing and Communication Conference.

Easttom, C. (2019). " Conducting Investigations on the Dark Web". Journal of Information Warfare 18 (1).

Easttom (2018). An Examination of the Operational Requirements of Weaponized Malware. Journal of Information Warfare 17 (2).

Alsmadi, I, Easttom, C. (2019). Using Maximum Weighted Cliques in the Detection of Sub-Communities’ behaviors in OSNs. Proceedings of the Future Technologies Conference 2019.

Easttom, C. (2018). The role of weaponized malware in cyber conflict and espionage. In 13th International Conference on Cyber Warfare and Security ICCWS, 2018.

Easttom, C. (2018). Bluetooth Hacking 101. 2600 Magazine 35(1).

Easttom, C. (2017). Enhancing SQL Injection With Stored Procedures. 2600 Magazine. 34(3).

Easttom, C. (2017). A Model for Penetration Testing. Research Gate. DOI RG.2.2.36221.15844

Easttom, C. (2016). Spyware Techniques  Journal of Information Security Science and Digital Forensics 1 (1)

Easttom, C. (2016). Spyware Techniques. 2600 Magazine. 33(3). 

Easttom, C. (2016). Zero Day Exploits Presentation at Secure Jordan 2016

Easttom, C. (2016). Zero Day Forensics Presentation at Secure Jordan 2016

Easttom, C. (2016). Dark Web Markets for Law Enforcement and Intelligence Presentation at Hakon India 2016

Easttom, C. (2017). Dark Web Markets Presentation. ResearchGate. DOI: RG.2.2.27945.60003

Easttom, C. (2016). Ransomware Presentation (multiple locations)

Easttom, C. (2016). Steganography Workshop presented at Defcon 24

Easttom, C. (2017). Windows: The Undiscovered Country presented at Defcon 25

 

Patents

U.S.  Patent No. 8,527,779 B1 Method and apparatus of performing distributed steganography of a data message

U.S. Patent No. 8,984,639 Method and apparatus of performing data executable integrity verification

U.S. Patent No. 9,405,907  Method and apparatus of performing data executable integrity verification (a continuation patent of '639)

US Patent 9,984,229 Method and apparatus providing a multiple source evidence application trust model

U.S. Patent No. 8,713,067 Stable File System

U.S. Patent No. US 8,819,827 B1 Method and apparatus of performing data executable integrity verification

US Patent No.8,825,845 B1 Managing a network element operating on a network

US Patent No.8,825,810 B1 Domain name service based remote programming objects

US Patent No.9,313,167 B1 Domain name service based remote programming objects

US Patent No. 9,619,656 Method and apparatus of performing distributed steganography of a data message (continuation patent of 8,527,779 B1)

US Patent No. 9,686,227 Domain Name Service based remote programming objects.  A continuation patent of U.S. Pat. No. 9,313,167

US Patent No. 9,755,887 Managing a network element operating on a network

US Patent No. 9,754,108 Method and apparatus of performing data executable integrity verification

US Patent No. 9,753,957 System and method for document tracking

US Patent 10,122,573 Managing a network element operating on a network.

US Patent 10,242,188 Method and apparatus of performing data executable integrity verification.

US Patent 10,360,354 Method and apparatus of performing distributed steganography of a data message. A continuation patent of U.S. Pat. No. 9,619,656.

U.S. Patent 10,469,441 Domain name service based remote programming objects

U.S. Patent 10,467,208 System and method for document tracking

US Patent 10,621,149 Stable File System

U.S. Patent 10,635,815 Method and apparatus of performing data executable integrity verification

U.S. Patent 10,708,118 Managing a network element operating on a network

U.S. Patent 11,080,396 Secure Downloads