Follow
TJ OConnor
TJ OConnor
Other namesTerrence OConnor, Terrence O'Connor, T.J. O'Connor
Unknown affiliation
Verified email at fit.edu - Homepage
Title
Cited by
Cited by
Year
Toward Instrumenting Network Warfare Competitions to Generate Labeled Datasets.
B Sangster, TJ OConnor, T Cook, R Fanelli, E Dean, C Morrell, GJ Conti
Proceedings of Cyber Security Experimentation and Test (CSET), USENIX Security, 2009
1952009
HomeSnitch: behavior transparency and control for smart home IoT devices
TJ OConnor, R Mohamed, M Miettinen, W Enck, B Reaves, AR Sadeghi
ACM Conference on Security and Privacy in Wireless and Mobile Networks …, 2019
1402019
Assessing outbound traffic to uncover advanced persistent threat
B Binde, R McRee, TJ OConnor
SANS Information Security Reading Room, 2011
1052011
Blinded and confused: uncovering systemic flaws in device telemetry for smart-home internet of things
TJ OConnor, W Enck, B Reaves
ACM Conference on Security and Privacy in Wireless and Mobile Networks …, 2019
582019
Honeyscope: Iot device protection with deceptive network views
R Mohamed, TJ OConnor, M Miettinen, W Enck, AR Sadeghi
Autonomous Cyber Deception: Reasoning, Adaptive Planning, and Evaluation of …, 2019
53*2019
Violent Python: a cookbook for hackers, forensic analysts, penetration testers and security engineers
TJ OConnor
Syngress, 2012
462012
Bluetooth network-based misuse detection
TJ OConnor, D Reeves
IEEE Annual Computer Security Applications Conference (ACSAC), 377-391, 2008
402008
Never ending story: authentication and access control design flaws in shared IoT devices
B Janes, H Crawford, TJ OConnor
IEEE Security and Privacy Workshops (SPW), 104-109, 2020
35*2020
PivotWall: SDN-based information flow control
TJ OConnor, W Enck, WM Petullo, A Verma
ACM Symposium on SDN Research (SOSR), 1-14, 2018
302018
Teaching a Hands-On Mobile and Wireless Cybersecurity Course
TJ OConnor, C Stricklan
ACM Conference on Innovation and Technology in Computer Science Education …, 2021
242021
Detecting and responding to data link layer attacks
T OConnor
SANS Institute Cyber Security White Papers, 2010
242010
Experiences with practice-focused undergraduate security education.
RL Fanelli, TJ OConnor
Proceedings of Cyber Security Experimentation and Test (CSET), USENIX Security, 2010
222010
HELO DarkSide: Breaking Free From Katas and Embracing the Adversarial Mindset in Cybersecurity Education
TJ OConnor
Technical Symposium on Computer Science Education (SIGCSE TS), 710-716, 2022
152022
Through the Spyglass: Towards IoT Companion App Man-in-the-Middle Attacks
TJ OConnor, D Jessee, D Campos
Proceedings of 14th Cyber Security Experimentation and Test (CSET), 2021
152021
The Jester Dynamic: A Lesson in Asymmetric Unmanaged Cyber Warfare
TJ OConnor, D Shinberg
SANS Institute Cyber Security White Papers, 2011
13*2011
honeym: A framework for implementing virtual honeyclients for mobile devices
TJ OConnor, B Sangster
ACM Conference on Security and Privacy in Wireless and Mobile Networks …, 2010
132010
Understanding how to diversify the cybersecurity workforce: A qualitative analysis
MC Osman, M Namukasa, C Ficke, I Piasecki, TJ OConnor, M Carroll
The Journal of Cybersecurity Education Research and Practice (JCERP), 2023
10*2023
A Replication Study for IoT Privacy Preferences
A Alhazmi, G Kilani, W Allen, TJ OConnor
Proceedings of the 2021 IEEE Conference on Omni-Layer Intelligent Systems …, 2021
92021
Towards Labeling On-Demand IoT Traffic
D Campos, TJ OConnor
Proceedings of 14th Cyber Security Experimentation and Test (CSET), 2021
92021
ITOC dataset
B Sangster, TJ O’Connor, T Cook, R Fanelli, E Dean, WJ Adams, ...
9*2009
The system can't perform the operation now. Try again later.
Articles 1–20