top of page
Books

1. O'Connor, T.J. Violent Python: A Cookbook for Hackers. Syngress Press, November 2012. [bib]

Book Chapters

  1. Mohamed, R., O'Connor, T.J., Miettinen, M., Enck, W., Sadeghi, A.-R. "HONEYSCOPE: IoT Device Protection with Deceptive Network Views." In Autonomous Cyber Deception: Reasoning, Adaptive Planning, and Evaluation of HoneyThings, Springer, 2019. [bib]

Journal Articles

  1. Namukasa, M., Chauhan, B., Swords, B., Gough, C., Dymanus, W., Diresta, C., Vitali, J., Sharma, J., O'Connor, T.J., Carroll, M. "Diversifying Cybersecurity: Evaluation of an Internet of Things (IoT)-Based Cybersecurity Training Course Designed to Bridge the Diversity Gap" Journal of Cybersecurity Education, Research and Practice, 2025. [bib]

  2. Namukasa, M., Chaparro Osman, M., Ficke, C., Piasecki, I., O'Connor, T.J., Carroll, M. "Evaluation of an Internet of Things Device-Based Educational Approach to Engage a More Diverse Cybersecurity Workforce." International Journal of Human-Computer Interaction, January 2024. [bib] [pdf]

  3. O'Connor, T.J., Brown, D., Jackson, J., Schmeelk, S., Payne, B. "Compete to Learn: Toward Cybersecurity As A Sport." The Journal of Cybersecurity Education Research and Practice (JCERP), Kennesaw, GA, 2023. [bib][pdf]

  4. Chaparro Osman, M., Namukasa, M., Ficke, C., Piasecki, I., O'Connor, T.J., Carroll, M. "Understanding how to diversify the cybersecurity workforce: A qualitative analysis." The Journal of Cybersecurity Education Research and Practice (JCERP), Kennesaw, GA, 2023. [bib] [pdf]

Conferences And Workshops

  1. Stricklan, C., Curtis, C., Carranza, G., Blackwell, C., Abraham, L., O'Connor, T.J., "Preventative Exploitation of Computer Systems Using Binary Diversification" International Conference on Electrical, Computer, and Energy Technologies (ICECET 2025), Paris, France, July 2025. [bib]

  2. More, S., Sudhakaran, S., O'Connor, T.J., Carvalho, M., "Comprehensive Security Assessment of Holy Stone Drones: Examining Attack Vectors" 20th International Conference on Cyber Warfare and Security (ICCWS 25), Williamsburg, VA, March 2025. [bib] [pdf]

  3. Namukasa, M., Regi, A., Deloach, I., O'Connor, T.J., Dymanus, W., Carroll, M, "The Digital Divide: Implications for Training and Education" Interservice/Industry Training, Simulation, and Education Conference (I/ITSEC 24), Orlando, December 2024. [bib] [pdf]

  4. Suarez, L., Alshubrumi, D., O'Connor, T.J., Sudhakaran, S. "Unsafe at any Bandwidth: Towards Understanding Risk Factors for Ransomware in Higher Education." Workshop on Data-Driven Security (DDWS 2024), Hasselt, Belgium, April 2024. [pdf]

  5. O'Connor, T.J., Schmith, A., Stricklan, C., Carvalho, M., Sudhakaran, S. "Pwn Lessons Made Easy With Docker: Toward an Undergraduate Vulnerability Research Cybersecurity Class." Technical Symposium on Computer Science Education (SIGCSE TS 24), Portland, OR, March 2024. [bib] [pdf]

  6. Gough, C., Mann, C., Ficke, C., Namukasa, M., Carroll, M., O'Connor, T.J. "Remote Controlled Cyber: Toward Engaging and Educating a Diverse Cybersecurity Workforce." Technical Symposium on Computer Science Education (SIGCSE TS 24), Portland, OR, March 2024. [bib] [pdf]

  7. Fernalld, K., O'Connor, T.J., Sudhakaran, S., Nur, N. "Lightweight Symphony: Towards Reducing Computer Science Student Anxiety with Standardized Docker Environments." Special Interest Group on Information Technology Education (SIGITE 23), Marietta, GA, October 2023. [bib] [pdf]

  8. O'Connor, T.J., Jessee, D., Campos, D. "Towards Examining The Security Cost of Inexpensive Smart Home IoT Devices." IEEE International Workshop on Consumer Devices, Systems, and Services (CDS 2023), Torino, Italy, June 2023. [bib] [pdf]

  9. Olsen, S., O'Connor, T.J. "Toward a Labeled Dataset of IoT Malware Features." IEEE Computers, Software, and Applications Conference (COMPSAC 2023), Torino, Italy, June 2023. [bib] [pdf]

  10. Ganeriwala, P., Gupta, A., Campos, D., Bhattacharyya, S., O'Connor, T.J., Dcosta, A. "Modeling Internet-of-Things (IoT) Behavior for Enforcing Security and Privacy Policies." Computing Conference 2023, London, UK, June 2023. [bib] [pdf]

  11. Alhazmi, A., Alawaji, K., O'Connor, T.J. "MPO: MQTT-Based Privacy Orchestrator for Smart Home Users." IEEE Computers, Software, and Applications Conference (COMPSAC 2022), Virtual Event, July 2022. IEEE. [bib][pdf]

  12. O'Connor, T.J., Mann, C., Petersen, T., Thomas, I., Stricklan, C. "Toward an Automatic Exploit Generation Competition for an Undergraduate Binary Reverse Engineering Course." Innovation and Technology in Computer Science Education (ITiCSE 2022), Dublin, Ireland, July 2022. ACM. [bib] [pdf]

  13. O'Connor, T.J. "Helo darkside: Breaking free from katas and embracing the adversarial mindset in cybersecurity education." Technical Symposium on Computer Science Education (SIGCSE TS 2022), Providence, RI, March 2022. ACM. [bib] [pdf]

  14. Alhazmi, A., Kilani, G., Allen, W., O'Connor, T.J. "A replication study for IoT privacy preferences." Conference on Omni-Layer Intelligent Systems (COINS 2021), Virtual Event, August 2021. IEEE. [bib] [pdf]

  15. Campos, D., O'Connor, T.J. "Towards labeling on-demand IoT traffic." Cyber Security Experimentation and Test (CSET 2021), Virtual Event, August 2021. USENIX. [bib] [pdf]

  16. O'Connor, T.J., Jesse, D., Campos, D. "Through the spyglass: Toward IoT companion app man-in-the-middle attacks." Cyber Security Experimentation and Test (CSET 2021), Virtual Event, August 2021. USENIX. [bib][pdf]

  17. O'Connor, T.J., Stricklan, C. "Teaching a hands-on mobile and wireless cybersecurity course." Innovation and Technology in Computer Science Education (ITiCSE 2021), Virtual Event, June 2021. ACM. [bib] [pdf]

  18. Stricklan, C., O'Connor, T.J. "Towards binary diversified challenges for a hands-on reverse engineering course." Innovation and Technology in Computer Science Education (ITiCSE 2021), Virtual Event, June 2021. ACM. [bib] [pdf]

  19. Janes, B., Crawford, H., O'Connor, T.J. "Never ending story: Authentication and access control design flaws in shared IoT devices." Security and Privacy SafeThings Workshop (SafeThings 2020), Virtual Event, May 2020. IEEE. [bib] [pdf]

  20. O'Connor, T.J., Enck, W., Reaves, B. "Blinded and confused: Uncovering systemic flaws in device telemetry for smart-home internet of things." Conference on Security and Privacy in Wireless and Mobile Networks (WiSec 2019), Miami, FL, May 2019. ACM. [bib] [pdf]

  21. O'Connor, T.J., Mohamed, R., Miettinen, M., Enck, W., Reaves, B., Sadeghi, A.-R. "Homesnitch: Behavior transparency and control for smart home IoT devices." Conference on Security and Privacy in Wireless and Mobile Networks (WiSec 2019), Miami, FL, May 2019. ACM. [bib] [pdf]

  22. O'Connor, T.J., Enck, W., Petullo, W.M., Verma, A. "Pivotwall: SDN-based information flow control." Symposium on SDN Research (SoSR 2018), San Francisco, CA, March 2018. ACM. [bib] [pdf]

  23. O'Connor, T.J., Enck, W. "Code-stop: Code-reuse prevention by context-aware traffic proxying." Conference on Internet Monitoring and Protection (ICIMP 2016), Barcelona, Spain, May 2016. IARIA. [bib] [pdf]

  24. Fanelli, R., O'Connor, T.J. "Experiences with practice-focused undergraduate security education." Cyber Security Experimentation and Test (CSET 2010), Washington, DC, August 2010. USENIX. [bib] [pdf]

  25. O'Connor, T.J., Sangster, B. "honeym: A framework for implementing virtual honey clients for mobile devices." Conference on Security and Privacy in Wireless and Mobile Networks (WiSec 2010), Hoboken, NJ, March 2010. ACM. [bib] [pdf]

  26. Sangster, B., O'Connor, T.J., Cook, T., Fanelli, R. "Toward instrumenting network warfare competitions to generate labeled datasets." Cyber Security Experimentation and Test (CSET 2009), Montreal, CA, August 2009. USENIX. [bib] [pdf]

  27. O'Connor, T.J., Reeves, D. "Bluetooth network-based misuse detection." Annual Computer Security Applications Conference (ACSAC 2008), Anaheim, CA, December 2008. ACSAC. [bib] [pdf]

Tech Reports

  1. O'Connor, T.J. "The Hacker Always Gets Through." SANS Information Security Reading Room, April 2014. SANS. [pdf]

  2. O'Connor, T.J. "The Jester Dynamic: A Lesson in Asymmetric Unmanaged Cyber Warfare." SANS Information Security Reading Room, December 2011. SANS. [pdf]

  3. O'Connor, T.J., McRee, R., Binde, B. "Assessing Outbound Traffic to Uncover Advanced Persistent Threat." SANS Information Security Reading Room, May 2011. SANS.

  4. O'Connor, T.J. "Animal Farm: Protection from Client-Side Attacks by Rendering Content with Python and Squid." SANS Information Security Reading Room, February 2011. SANS. [pdf]

  5. O'Connor, T.J. "About Face: Defending Your Organization Against Penetration Testing Teams." SANS Information Security Reading Room, December 2010. SANS. [pdf]

  6. O'Connor, T.J. "Detecting and Responding to Data Link Layer Attacks." SANS Information Security Reading Room, October 2010. SANS. [pdf]

  7. O'Connor, T.J. "Grow Your Own Tools: A Taxonomy of Python Libraries Helpful for Forensic Analysis." SANS Information Security Reading Room, October 2010. SANS. [pdf]

Miscellaneous

 

  1. O'Connor, T.J., Hand, R., McDougall, M. "Studying Offensive Computing is Essential." Army Communicator, Fall 2012. [bib] [pdf]

  2. O'Connor, T.J., Doty, J. "Building Teams of Cyber Warriors." Army Magazine, January 2010. [pdf]

  3. Doty, J., O'Connor, T.J., Gelineau, J. "Technology’s Limits: The Best Leader is a Human, Not a Machine." Armed Forces Journal, September 2009.

  4. Doty, J., O'Connor, T.J. "Leadership versus Information Technology Management—Where Do We Go from Here?" Army Magazine, February 2009. [pdf]

bottom of page