W
William Timothy Strayer
Researcher at BBN Technologies
Publications - 27
Citations - 1673
William Timothy Strayer is an academic researcher from BBN Technologies. The author has contributed to research in topics: Network packet & Hash function. The author has an hindex of 17, co-authored 27 publications receiving 1665 citations.
Papers
More filters
Patent
Hash-based systems and methods for detecting and preventing transmission of unwanted e-mail
TL;DR: In this article, a system (120) detects transmission of potentially unwanted e-mail messages by generating hash values based on one or more portions of the e-mails and then determining whether the generated hash values match hash values associated with prior e-email messages.
Patent
Hash-based systems and methods for detecting, preventing, and tracing network worms and viruses
Walter Clark Milliken,William Timothy Strayer,Stephen Douglas Milligan,Luis Sanchez,Craig Partridge +4 more
TL;DR: In this article, a system was proposed to detect transmission of potentially malicious packets by comparing the generated hash values to hash values corresponding to prior packets and tracing the path taken by a potentially malicious packet.
Patent
Hash-based systems and methods for detecting and preventing transmission of polymorphic network worms and viruses
Walter Clark Milliken,William Timothy Strayer,Stephen Douglas Milligan,Luis Sanchez,Craig Partridge +4 more
TL;DR: In this article, a system (200) detects transmission of potentially malicious packets and generates hash values based on variable-sized blocks of the packets, then compares the generated hash values to hash values associated with prior packets.
Proceedings ArticleDOI
Smart Packets for active networks
Beverly Schwartz,Alden W. Jackson,William Timothy Strayer,Wenyi Zhou,R.D. Rockwell,Craig Partridge +5 more
TL;DR: Smart Packets as mentioned in this paper is a DARPA-funded active network project focusing on applying active networks technology to network management and monitoring without placing undue burden on the nodes in the network.
Patent
Systems and methods for identifying anomalies in network data streams
TL;DR: In this article, a traffic auditor (130 ) analyzes traffic in a communications network (100 ) to identify a deviation from the expected traffic behavior model, and develops a model of expected traffic behaviour based on the traffic analysis.