Terrence (TJ) OConnor

Lieutenant Colonel (Retired), US Army


North Carolina State University, Raleigh, NC

Ph.D., Computer Science, May 2019

Dissertation: Network Access Control through Host and Application Analysis

Advisor: Dr. William Enck

North Carolina State University, Raleigh, NC

M.S., Computer Science, May 2008

Thesis: Bluetooth Misuse Detection

Advisor: Dr. Douglas Reeves


SANS Technology Institute, Bethesda, MD

M.S., Information Security Engineering, 2012

Focus: Digital Forensics

Advisor: Dr. Ray Davidson


US Military Academy, West Point, NY

B.S., Computer Science, May 1999

Thesis: Denial of Service Prevention

Advisor: Dr. Jim Jensen


Academic and Research Appointments


Program Chair, Information Assurance and Cybersecurity, Florida Tech, 2019-Present

Assistant Professor, Computer Sciences and. Cybersecurity, Florida Tech, 2019-Present

Department Head, Army ROTC, Military Studies, Florida Tech, 2015-2019

Assistant Professor, US Military Academy, Dept. of Electrical Engineering and Computer Science, 2010-2011

Instructor, US Military Academy, Dept. of Electrical Engineering and Computer Science, 2008-2010


Military Assignments


Asst. Chief of Staff, G6 Communications, 1st Special Forces Command, 2014-2015

Directorate Signal Officer, Office of Special Warfare, 2013-2014

Group Signal Officer, 10th Special Forces Group, 2011-2013

Battalion Signal Officer, 1/7 Special Forces Battalion, 2003-2006

Battalion Signal Officer, 1/2 Attack Helicopter Battalion, 2000-2002

Platoon Leader, 57th Signal Battalion, 1999-2000

Selected Publications


TJ OConnor, Chris Stricklan. Teaching a Hands-On Mobile and Wireless Cybersecurity Course. ACM Innovation and Technology in Computer Science Education (ITiCSE). June 2021. (acceptance rate=31%) [pdf]

Blake Janes, Heather Crawford, and TJ OConnor. Never Ending Story: Authentication and Access Control Design Flaws in Shared IoT Devices. IEEE Security and Privacy SafeThings Workshop (SafeThings). May, 2020. [pdf]


TJ OConnor, William Enck, and Bradley Reaves. Blinded and Confused: Uncovering Systemic Flaws in Device Telemetry for Smart-Home Internet of Things, Proceedings of the ACM Conference on Security and Privacy in Wireless and Mobile Networks (WiSec), May, 2019.  (acceptance rate=25.6%, Best Paper)  

TJ OConnor, Reham Mohamed, Markus Miettinen, William Enck, Bradley Reaves, and Ahmad-Reza Sadeghi. HomeSnitch: Behavior Transparency and Control for Smart Home IoT Devices, Proceedings of the ACM Conference on Security and Privacy in Wireless and Mobile Networks (WiSec), May, 2019. (acceptance rate=25.6%)

TJ OConnor, William Enck, W.M. Petullo, and Akash Verma. "PivotWall: SDN-Based Information Flow Control", Symposium on SDN Research (SoSR), March 2018. (acceptance rate=28.6%)

TJ OConnor, Ben Sangster. “honeyM: A Framework for Implementing Virtual Honeyclients for Mobile Devices,” Proceedings of the ACM Conference on Wireless Network Security (WiSec), March 2010.

TJ OConnor, Doug Reeves, “Bluetooth Network-Based Misuse Detection,” Annual Computer Security Applications Conference (ACSAC), December 2008. (acceptance rate=24%)


  • Co-Chair, The Human Element in Autonomous Cyber Security Workshop (2020)

  • Program Committee, USENIX Workshop on Cyber Security Experimentation and Test (2020,2021)

  • Program Committee, Silicon ValleyCybersecurity Conference (2021)

  • Reviewer, ACM Transactions on Internet of Things (2019/2020), 

  • Reviewer, IEEE Transactions on Industrial Informatics (2020)



  • Recognized as "Best Faculty", International Student Community of Florida Tech, 2020.

  • Best Paper Award, ACM WiSec, 2019. 

  • National Cybersecurity Innovation Award, March 2013

  • Ray C. Clark Award, US Military Academy D/EECS, May 2010

  • Bronze Star, Operation Enduring Freedom, US Army, June 2004

  • Bronze Order of Mercury, US Army Signal Regiment, May 2010

  • Cyber Challenge Champion, National Defense University, 2009

  • NSA Cyber Defense Exercise Winning Co-Coach, 2009, 2011

  • SANS Netwars Competition Record High Score, 2012





Professional Activities


Public Speaking


1. O'Connor, T.J., and Enck W, "Classifying and Enforcing Network Profiles of Smart Home IoT Devices", SELIoT: SEcuring Lifecycle of Internet of Things, Aalto University, Finland, September 2017.

2. O'Connor, T.J. "Ethical and Technical Considerations of the FBI's iPhone Writ", US Military Academy Cyber Defense Laboratory Invited Guest Speaker, March 2016. 

3. O'Connor, T.J., and Burhop David, "The Hacker Always Gets Through," American Association of Motor Vehicle Administrators, Louisville, KY, June 2016. (Slides)

4. O’Connor, T.J., “Why Every Defender Should Know How To Write Exploits,” B-Sides Augusta Security Conference, Augusta, GA, September 2013.

5. O’Connor, T.J., “Don’t Pull Your Goalie: The Role of an Active Defense,” ForenSecure Security Conference, Wheaton, IL, April 2013.

6. O’Connor, T.J., and Tomes, T., “Hide and Seek: Post-Exploitation Style,” ShmooCon Security Conference, Washington DC, February 2013. (Video)

7. O’Connor, T.J., Wertheimer, M., DiGiovanni, F., Papay, M., Brown, J., and Mahaffey, K., “Cyber Security Training,” I/ITSEC 2013, Orlando, FL, December 2012.

8. O’Connor, T.J., Bassel, E., Carroll, O, Denman, B., Fanelli, R., and Runyan, S., “Keys to Fighting and Winning a Cyber War,” AFCEA Homeland Security Conference 2012, Washington DC, February 2012.

9. O’Connor, T.J., Sangster, B., and Dean, E., “Using Hacking to Teach Computer Science Fundamentals,” American Society for Engineering Education (ASEE) Presentation, March 2010.

10. O’Connor, T.J., Grunzweig, N., and Brasefield, D., “honeyM: A Framework for Implementing Virtual Honeyclients for Mobile Devices,” ShmooCon Security Conference, Washington DC, February 2010.