Books
​
TJ OConnor. Violent Python: A Cookbook for Hackers, November 2012. Syngress Press. [bib]
​
Book Chapters
​
Rehah Mohamed, TJ OConnor, Markus Miettinen, William Enck, and Ahmad-Reza Sadeghi. HONEYSCOPE: IoT Device Protection with Deceptive Network Views. In Autonomous Cyber Deception: Reasoning, Adaptive Planning, and Evaluation of HoneyThings, 2019. Springer. [bib]
​
Journal Articles
​
TJ OConnor, Dane Brown, Jasmine Jackson, Suzaan Schmeelk, Bryson Payne. Compete to Learn: Toward Cybersecurity As A Sport. In The Journal of Cybersecurity Education Research and Practice (JCERP), Kennesaw, GA, June 2023 [bib] [pdf]
​
Maria Chaparro Osman, Maureen Namukasa, Cherrise Ficke, Isabella Piasecki, TJ OConnor, Meredith Carroll. Understanding how to diversify the cybersecurity workforce: A qualitative analysis. In The Journal of Cybersecurity Education Research and Practice (JCERP), Kennesaw, GA, 2023 [bib] [pdf]
​
Conferences And Workshops
​
Kourtnee Fernalld, TJ OConnor, Sneha Sudhakaran, Nasheen Nur. Lightweight Symphony: Towards Reducing Computer Science Student Anxiety with Standardized Docker Environments. Special Interest Group on Information Technology Education (SIGITE 23), Marietta, GA, October 2023. [bib] [pdf]
​
TJ OConnor, Dylan Jessee, and Daniel Campos. Towards Examining The Security Cost of Inexpensive Smart Home IoT Devices. IEEE International Workshop on Consumer Devices, Systems, and Services (CDS 2023), Torino, Italy, June 2023. [bib] [pdf]
Stian Olsen and TJ OConnor. Toward a Labeled Dataset of IoT Malware Features. IEEE Computers, Software, and Applications Conference (COMPSAC 2023), Torino, Italy, June 2023. [bib] [pdf]
Parth Ganeriwala, Anubhav Gupta, Daniel Campos, Siddhartha Bhattacharyya, TJ OConnor, Adolf Dcosta, Modeling Internet-of-Things (IoT) Behavior for Enforcing Security and Privacy Policies. In Computing Conference 2023, London, UK, June 2023. [pdf] (Best Student Paper Award)
​
Ahmed Alhazm, Khulud Alawaji, and TJ OConnor. MPO: MQTT-Based Privacy Orchestrator for Smart Home Users. In Computers, Software, and Applications Conference (COMPSAC), Virtual Event, July 2022. IEEE. [bib] [pdf]
​
TJ OConnor, Carl Mann, Tiffanie Petersen, Isaiah Thomas, and Chris Stricklan. Toward an Automatic Exploit Generation Competition for an Undergraduate Binary Reverse Engineering Course. In Innovation and Technology in Computer Science Education (ITiCSE), Dublin, Ireland, July 2022. ACM. [bib] [pdf]
​
TJ OConnor. HELO Darkside: Breaking free from Katas and embracing the adversarial mindset in cybersecurity education. In Special Interest Group on Computer Science Education (SIGCSE), Providence, RI, March 2022. ACM. [bib] [pdf]
Ahmed Alhazmi, Ghassan Kilani, William Allen, and TJ OConnor. A replication study for IoT privacy preferences. In Conference on Omni-Layer Intelligent Systems (COINS), Virtual Event, August 2021. IEEE. [bib] [pdf]
Daniel Campos and TJ OConnor. Towards labeling on-demand IoT traffic. In Cyber Security Experimentation and Test (CSET), Virtual Event, August 2021. USENIX. [bib] [pdf]
TJ OConnor, Dylan Jesse, and Daniel Camps. Through the spyglass: Toward IoT companion app man-in-the-middle attacks. In Cyber Security Experimentation and Test (CSET), Virtual Event, August 2021. USENIX. [bib] [pdf]
TJ OConnor and Chris Stricklan. Teaching a hands-on mobile and wireless cybersecurity course. In Innovation and Technology in Computer Science Education (ITiCSE), Virtual Event, June 2021. ACM. [bib] [pdf]
Chris Stricklan and TJ OConnor. Towards diversified binary challenges for a hands-on reverse engineering course. In Innovation and Technology in Computer Science Education (ITiCSE), Virtual Event, June 2021. ACM. [bib] [pdf]
Blake Janes, Heather Crawford, and TJ OConnor. Never-ending story: Authentication and access control design flaws in shared IoT devices. In Security and Privacy SafeThings Workshop (SafeThings), Virtual Event, May 2020. IEEE. [bib] [pdf]
TJ OConnor, William Enck, and Bradley Reaves. Blinded and confused: Uncovering systemic flaws in device telemetry for smart-home internet of things. In Conference on Security and Privacy in Wireless and Mobile Networks (WiSec), Miami, FL, May 2019. ACM. [bib] [pdf] (Best Paper Award)
TJ OConnor, Reham Mohamed, Markus Miettinen, William Enck, Bradley Reaves, and Ahmad-Reza Sadeghi. Homesnitch: Behavior transparency and control for smart home IoT devices. In Conference on Security and Privacy in Wireless and Mobile Networks (WiSec), Miami, FL, May 2019. ACM. [bib] [pdf]
TJ OConnor, William Enck, W.M. Petullo, and Akash Verma. Pivotwall: Sdn-based information flow control. In Symposium on SDN Research (SoSR), San Francisco, CA, March 2018. ACM. [bib] [pdf]
TJ OConnor and William Enck. Code-stop: Code-reuse prevention by context-aware traffic proxying. In Conference on Internet Monitoring and Protection (ICIMP), Barcelona, Spain, May 2016. IARIA. [bib] [pdf]
Robert Fanelli and TJ OConnor. Experiences with practice-focused undergraduate security education. In Cyber Security Experimentation and Test (CSET), Washington, DC, August 2010. USENIX. [bib] [pdf]
TJ OConnor and Ben Sangster. honeym: A framework for implementing virtual honey clients for mobile devices. In Conference on Security and Privacy in Wireless and Mobile Networks (WiSec), Hoboken, NJ, March 2010. ACM. [bib] [pdf]
TJ OConnor, Ben Sangster, and Erik Dean. Using hacking to teach computer science fundamentals. In American Society for Engineering Education. ASEE, March 2010. [bib] [pdf]
Ben Sangster, TJ OConnor, Thomas Cook, and Robert Fanelli. Toward instrumenting network warfare competitions to generate labeled datasets. In Cyber Security Experimentation and Test (CSET), Montreal, CA, August 2009. USENIX. [bib] [pdf]
TJ OConnor and Doug Reeves. Bluetooth network-based misuse detection. In Annual Computer Security Applications Conference (ACSAC), Anaheim, CA, December 2008. ACSAC. [bib] [pdf]
​
Tech Reports
TJ OConnor. The Hacker Always Gets Through. In SANS Information Security Reading Room, April 2014. SANS. [pdf]
TJ OConnor. The Jester Dynamic: A Lesson in Asymmetric Unmanaged Cyber Warfare. In SANS Information Security Reading Room, December 2011. SANS. [pdf]
TJ OConnor, Russ McRee, and Beth Binde. Assessing Outbound Traffic to Uncover Advanced Persistent Threat. In SANS Information Security Reading Room, May 2011. SANS.
TJ OConnor. Animal Farm: Protection from Client-Side Attacks by Rendering Content with Python and Squid. In SANS Information Security Reading Room, February 2011. SANS. [pdf]
TJ OConnor. About Face: Defending Your Organization Against Penetration Testing Teams. In SANS Information Security Reading Room, December 2010. SANS. [pdf]
TJ OConnor. Detecting and Responding to Data Link Layer Attacks. In SANS Information Security Reading Room, October 2010. SANS. [pdf]
TJ OConnor. Grow Your Own Tools: A Taxonomy of Python Libraries Helpful for Forensic Analysis. In SANS Information Security Reading Room, October 2010. SANS. [pdf]
Miscellaneous
TJ OConnor, Ryan Hand, and Matt McDougall. Studying Offensive Computing is Essential. In Army Communicator, Fall 2012. [bib] [pdf]
TJ OConnor and Joseph Doty. Building Teams of Cyber Warriors. In Army Magazine, January 2010. [pdf]
Joe Doty, TJ OConnor, and Joe Gelineau. Technology’s Limits: The Best Leader is a Human, Not a Machine. Armed Forces Journal, September 2009.
Joe Doty and TJ OConnor. Leadership versus Information Technology Management—Where Do We Go from Here? In Army Magazine, February 2009. [pdf]