Follow
TJ OConnor
Title
Cited by
Cited by
Year
Toward Instrumenting Network Warfare Competitions to Generate Labeled Datasets.
B Sangster, TJ OConnor, T Cook, R Fanelli, E Dean, C Morrell, GJ Conti
Proceedings of Cyber Security Experimentation and Test (CSET), USENIX Security, 2009
1882009
HomeSnitch: behavior transparency and control for smart home IoT devices
TJ OConnor, R Mohamed, M Miettinen, W Enck, B Reaves, AR Sadeghi
ACM Conference on Security and Privacy in Wireless and Mobile Networks …, 2019
1282019
Assessing outbound traffic to uncover advanced persistent threat
B Binde, R McRee, TJ OConnor
SANS Information Security Reading Room, 2011
1032011
Blinded and confused: uncovering systemic flaws in device telemetry for smart-home internet of things
TJ OConnor, W Enck, B Reaves
ACM Conference on Security and Privacy in Wireless and Mobile Networks …, 2019
532019
Honeyscope: Iot device protection with deceptive network views
R Mohamed, TJ OConnor, M Miettinen, W Enck, AR Sadeghi
Autonomous Cyber Deception: Reasoning, Adaptive Planning, and Evaluation of …, 2019
50*2019
Violent Python: a cookbook for hackers, forensic analysts, penetration testers and security engineers
TJ OConnor
Syngress, 2012
452012
Bluetooth network-based misuse detection
TJ OConnor, D Reeves
IEEE Annual Computer Security Applications Conference (ACSAC), 377-391, 2008
382008
Never ending story: authentication and access control design flaws in shared IoT devices
B Janes, H Crawford, TJ OConnor
IEEE Security and Privacy Workshops (SPW), 104-109, 2020
29*2020
PivotWall: SDN-based information flow control
TJ OConnor, W Enck, WM Petullo, A Verma
ACM Symposium on SDN Research (SOSR), 1-14, 2018
272018
Detecting and responding to data link layer attacks
T OConnor
SANS Institute Cyber Security White Papers, 2010
242010
Experiences with practice-focused undergraduate security education.
RL Fanelli, TJ OConnor
Proceedings of Cyber Security Experimentation and Test (CSET), USENIX Security, 2010
222010
Teaching a Hands-On Mobile and Wireless Cybersecurity Course
TJ OConnor, C Stricklan
ACM Conference on Innovation and Technology in Computer Science Education …, 2021
212021
The Jester Dynamic: A Lesson in Asymmetric Unmanaged Cyber Warfare
TJ OConnor, D Shinberg
SANS Institute Cyber Security White Papers, 2011
13*2011
honeym: A framework for implementing virtual honeyclients for mobile devices
TJ OConnor, B Sangster
ACM Conference on Security and Privacy in Wireless and Mobile Networks …, 2010
132010
HELO DarkSide: Breaking Free From Katas and Embracing the Adversarial Mindset in Cybersecurity Education
TJ OConnor
Technical Symposium on Computer Science Education (SIGCSE TS), 710-716, 2022
122022
Through the Spyglass: Towards IoT Companion App Man-in-the-Middle Attacks
TJ OConnor, D Jessee, D Campos
Proceedings of 14th Cyber Security Experimentation and Test (CSET), 2021
112021
ITOC dataset
B Sangster, TJ O’Connor, T Cook, R Fanelli, E Dean, WJ Adams, ...
9*2009
Toward an Automatic Exploit Generation Competition for an Undergraduate Binary Reverse Engineering Course.
TJ OConnor, C Mann, T Petersen, I Thomas, C Stricklan
ACM Conference on Innovation and Technology in Computer Science Education …, 2022
82022
Towards Labeling On-Demand IoT Traffic
D Campos, TJ OConnor
Proceedings of 14th Cyber Security Experimentation and Test (CSET), 2021
82021
Bluetooth intrusion detection
TJ OConnor
North Carolina State University, 2008
8*2008
The system can't perform the operation now. Try again later.
Articles 1–20