Chuck Easttom

Orcid: 0000-0002-6744-6731

According to our database1, Chuck Easttom authored at least 18 papers between 2018 and 2024.

Collaborative distances:
  • Dijkstra number2 of five.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2024
Utilizing ChatGPT to Improve Quantum Algorithms.
Proceedings of the 14th IEEE Annual Computing and Communication Workshop and Conference, 2024

2022
A Graph Theoretical Methodology for Network Intrusion Fingerprinting and Attack Attribution.
Proceedings of the Intelligent Computing, 2022

A Comparitive Study of Machine Learning Algorithms for Identifying Mental States from EEG Recordings.
Proceedings of the 12th IEEE Annual Computing and Communication Workshop and Conference, 2022

NTRU and LASH for a Quantum Resistant Blockchain.
Proceedings of the 12th IEEE Annual Computing and Communication Workshop and Conference, 2022

2021
The Iran-Saudi Cyber Conflict.
Int. J. Cyber Warf. Terror., 2021

Application of the Spectra of Graphs in Network Forensics.
Proceedings of the 11th IEEE Annual Computing and Communication Workshop and Conference, 2021

On the Use of the SSIM Algorithm for Detecting Intellectual Property Copying in Web Design.
Proceedings of the 11th IEEE Annual Computing and Communication Workshop and Conference, 2021

2020
A Comparative Study of Machine Learning Algorithms for Use in Breast Cancer Studies.
Proceedings of the 10th Annual Computing and Communication Workshop and Conference, 2020

On the Application of the Complexity Zeta Function to Modelling Complexity and Emergence in Neuro-Engineering.
Proceedings of the 10th Annual Computing and Communication Workshop and Conference, 2020

On the Application of Algebraic Graph Theory to Modeling Network Intrusions.
Proceedings of the 10th Annual Computing and Communication Workshop and Conference, 2020

2019
On the Efficacy of Using Android Debugging Bridge for Android Device Forensics.
Proceedings of the 10th IEEE Annual Ubiquitous Computing, 2019

Mitigating Implanted Medical Device Cybersecurity Risks.
Proceedings of the 10th IEEE Annual Ubiquitous Computing, 2019

SecML: A Proposed Modeling Language for CyberSecurity.
Proceedings of the 10th IEEE Annual Ubiquitous Computing, 2019

A Modified McCumber Cube as a Basis for a Taxonomy of Cyber Attacks.
Proceedings of the IEEE 9th Annual Computing and Communication Workshop and Conference, 2019

An Analysis of Leading Lattice-Based Asymmetric Cryptographic Primitives.
Proceedings of the IEEE 9th Annual Computing and Communication Workshop and Conference, 2019

A Methodological Approach to Weaponizing Machine Learning.
Proceedings of the 2019 International Conference on Artificial Intelligence and Advanced Manufacturing, 2019

On the Application of the Complexity Zeta Function to Quantify Complexity in Bioengineering Systems.
Proceedings of the 2019 International Conference on Artificial Intelligence and Advanced Manufacturing, 2019

2018
A generalized methodology for designing non-linear elements in symmetric cryptographic primitives.
Proceedings of the IEEE 8th Annual Computing and Communication Workshop and Conference, 2018


  Loading...