default search action
W. Timothy Strayer
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2010 – 2019
- 2019
- [c27]Tim Strayer, Ram Ramanathan, Daniel Coffin, Samuel C. Nelson, Michael Atighetchi, Aaron Adler, Stephane Blais, Bishal Thapa, William N. Tetteh, Vladimir Shurbanov, Karen Zita Haigh, Regina Hain, Colleen T. Rock, Emily H. Do, Armando Caro, Daniel Ellard, Michael J. Beckerle, Stephen Lawrence, Scott Loos:
Mission-Centric Content Sharing Across Heterogeneous Networks. ICNC 2019: 1034-1038 - 2018
- [j11]Tim Strayer, Samuel C. Nelson, Armando Caro, Joud Khoury, Bryan Tedesco, Olivia DeRosa, Carsten Clark, Kolia Sadeghi, Michael Matthews, Jake Kurzer, Philip Lundrigan, Vikas Kawadia, Dorene Ryder, Keith Gremban, Wayne Phoel:
Content sharing with mobility in an infrastructure-less environment. Comput. Networks 144: 1-16 (2018) - 2016
- [c26]Tim Strayer:
Keynote: Evolving Systems for Situational Awareness. NCA 2016: xx - 2015
- [c25]Daniel Ellard, Christine E. Jones, Victoria Manfredi, W. Timothy Strayer, Bishal Thapa, Megan Van Welie, Alden W. Jackson:
Rebound: Decoy routing on asymmetric routes via error messages. LCN 2015: 91-99 - 2014
- [c24]Joud Khoury, Samuel C. Nelson, Armando Caro, Vikas Kawadia, Dorene Ryder, Tim Strayer:
An Efficient and Expressive Access Control Architecture for Content-Based Networks. MILCOM 2014: 1034-1039 - 2013
- [c23]Tim Strayer, Vikas Kawadia, Armando Caro, Samuel C. Nelson, Dorene Ryder, Carsten Clark, Kolia Sadeghi, Bryan Tedesco, Olivia DeRosa:
CASCADE: Content Access System for the Combat-Agile Distributed Environment. MILCOM 2013: 1518-1523 - 2012
- [c22]Joseph P. Loyall, Matthew Gillen, Karen Zita Haigh, Robert Walsh, Craig Partridge, Greg Lauer, W. Timothy Strayer:
A concept for publish-subscribe information dissemination and networking. ICC 2012: 5810-5816 - [c21]Craig Partridge, Robert Walsh, Matthew Gillen, Gregory Lauer, John Lowry, W. Timothy Strayer, Derrick Kong, David Levin, Joseph P. Loyall, Michael Paulitsch:
A secure content network in space. CHANTS@MobiCom 2012: 43-50 - 2011
- [c20]Josh Karlin, Daniel Ellard, Alden W. Jackson, Christine E. Jones, Greg Lauer, David Mankins, W. Timothy Strayer:
Decoy Routing: Toward Unblockable Internet Communication. FOCI 2011
2000 – 2009
- 2009
- [j10]Thomas M. Chen, Zhi Fu, Liwen He, Tim Strayer:
Recent developments in network intrusion detection [guest editorial]. IEEE Netw. 23(1): 4-5 (2009) - [c19]Tim Strayer, Walter C. Milliken, Ronald J. Watro, Walt Heimerdinger, Steven A. Harp, Robert P. Goldman, Dustin Spicuzza, Beverly Schwartz, David Mankins, Derrick Kong, Pieter Mudge Zatko:
An architecture for scalable network defense. LCN 2009: 368-371 - [c18]Basil AsSadhan, José M. F. Moura, David E. Lapsley, Christine E. Jones, W. Timothy Strayer:
Detecting Botnets Using Command and Control Traffic. NCA 2009: 156-162 - 2008
- [j9]Tim Strayer, Mark Allman, Grenville J. Armitage, Steven M. Bellovin, Shudong Jin, Andrew W. Moore:
IMRG workshop on application classification and identification report. Comput. Commun. Rev. 38(3): 87-90 (2008) - [p1]W. Timothy Strayer, David E. Lapsley, Robert Walsh, Carl Livadas:
Botnet Detection Based on Network Behavior. Botnet Detection 2008: 1-24 - 2007
- [c17]W. Timothy Strayer, Christine E. Jones, Beverly Schwartz, Sarah Edwards, Walter C. Milliken, Alden W. Jackson:
Efficient Multi-Dimensional Flow Correlation. LCN 2007: 531-538 - [c16]Alden W. Jackson, Walter C. Milliken, Cesar A. Santivanez, Matthew Condell, W. Timothy Strayer:
A Topological Analysis of Monitor Placement. NCA 2007: 169-178 - 2006
- [c15]W. Timothy Strayer, Robert Walsh, Carl Livadas, David E. Lapsley:
Detecting Botnets with Tight Command and Control. LCN 2006: 195-202 - [c14]Carl Livadas, Robert Walsh, David E. Lapsley, W. Timothy Strayer:
Using Machine Learning Techniques to Identify Botnet Traffic. LCN 2006: 967-974 - 2005
- [c13]W. Timothy Strayer, Christine E. Jones, Beverly Schwartz:
Architecture for Multi-Stage Network Attack Traceback. LCN 2005: 776-785 - 2004
- [j8]W. Timothy Strayer:
Privacy issues in virtual private networks. Comput. Commun. 27(6): 517-52 (2004) - 2003
- [c12]W. Timothy Strayer, Christine E. Jones, Fabrice Tchakountio, Alex C. Snoeren, Beverly Schwartz, Robert C. Clements, Matthew Condell, Craig Partridge:
SPIE Demonstration: Single Packet Traceback. DISCEX (2) 2003: 106-107 - [c11]W. Timothy Strayer, Christine E. Jones, Fabrice Tchakountio, Alex C. Snoeren, Beverly Schwartz, Robert C. Clements, Matthew Condell, Craig Partridge:
Traceback of Single IP Packets Using SPIE. DISCEX (2) 2003: 266-270 - [c10]W. Timothy Strayer:
Privacy Issues in an Insecure World. NCA 2003: 167-170 - 2002
- [j7]Alex C. Snoeren, Craig Partridge, Luis A. Sanchez, Christine E. Jones, Fabrice Tchakountio, Beverly Schwartz, Stephen T. Kent, W. Timothy Strayer:
Single-packet IP traceback. IEEE/ACM Trans. Netw. 10(6): 721-734 (2002) - [c9]Craig Partridge, David Cousins, Alden W. Jackson, Rajesh Krishnan, Tushar Saxena, W. Timothy Strayer:
Using signal processing to analyze wireless data traffic. Workshop on Wireless Security 2002: 67-76 - 2001
- [j6]Craig Partridge, Alex C. Snoeren, W. Timothy Strayer, Beverly Schwartz, Matthew Condell, Isidro Castiñeyra:
FIRE: flexible intra-AS routing environment. IEEE J. Sel. Areas Commun. 19(3): 410-425 (2001) - 2000
- [j5]Beverly Schwartz, Alden W. Jackson, W. Timothy Strayer, Wenyi Zhou, R. Dennis Rockwell, Craig Partridge:
Smart packets: applying active networks to network management. ACM Trans. Comput. Syst. 18(1): 67-88 (2000) - [c8]Craig Partridge, Alex C. Snoeren, W. Timothy Strayer, Beverly Schwartz, Matthew Condell, Isidro Castiñeyra:
FIRE: Flexible intra-AS routing environment. SIGCOMM 2000: 191-203
1990 – 1999
- 1996
- [j4]Andrew S. Grimshaw, Jon B. Weissman, W. Timothy Strayer:
Portable Run-Time Support for Dynamic Object-Oriented Parallel Processing. ACM Trans. Comput. Syst. 14(2): 139-170 (1996) - [c7]W. Timothy Strayer:
A Class-Chest for Deriving Transport Protocols. LCN 1996: 106-115 - [c6]J. William Atwood, Octavian Catrina, John Fenton, W. Timothy Strayer:
Reliable Multicasting in the Xpress Transport Protocol. LCN 1996: 202-211 - 1994
- [c5]W. Timothy Strayer, Michael J. Lewis, Raymond E. Cline Jr.:
XTP as a Transport Protocol for Distributed Parallel Processing. USENIX High-Speed Networking Symposium 1994 - [c4]W. Timothy Strayer, Simon Gray, Raymond E. Cline Jr.:
An Object-Oriented Implementation of the Xpress Transfer Protocol. IWACA 1994: 387-400 - 1993
- [j3]Andrew S. Grimshaw, W. Timothy Strayer, Padmini Narayan:
Dynamic, object-oriented parallel processing. IEEE Parallel Distributed Technol. Syst. Appl. 1(2): 33-47 (1993) - [c3]John F. Karpovich, Matthew Judd, W. Timothy Strayer, Andrew S. Grimshaw:
A Parallel Object-Oriented Framework for Stencil Algorithms. HPDC 1993: 34-41 - 1991
- [j2]W. Timothy Strayer:
A study of preemptable vs. non-preemptable token reservation access protocols. Comput. Commun. Rev. 21(2): 71-80 (1991)
1980 – 1989
- 1989
- [c2]W. Timothy Strayer, Alfred C. Weaver:
An argument for judicious use of error detection mechanisms in LANs. LCN 1989: 365-375 - 1988
- [j1]W. Timothy Strayer, Alfred C. Weaver:
Performance measurement of data transfer services in MAP. IEEE Netw. 2(3): 75-81 (1988) - [c1]W. Timothy Strayer, Alfred C. Weaver:
Performance measurements of Motorola's implementation of MAP. LCN 1988: 216-221
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-10-07 21:17 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint