Publications

Journal Publications:

  1. J. Jeong, Y. shen, S. Jeong, S. Lee, H. Jeong, T. Oh, T. Park, M. Ilyas, S. Son, and D. Du, “STMAC: Spatio-Temporal Coordination-Base MAC Protocol for Driving Safety in Urban Vehicular Networks”, IEEE Transactions on Intelligent System,  2017.
  2. J. Jeong, T. Oh, S. Pack, and A. Petrescu, "Protocols and applications in vehicular sensor networks for driving safety, driving efficiency, and data services", SAGE International Journal of Distributed Sensor Networks, Vol. 13, No. 2, 3 pgs, Feb. 2017.
  3. C. Ge, T. Oh, D. Johnson, A. Mondragon, “MEMS Based Tracking Devices for Measuring Distribution Hazards on the Product and Package”, Journal of Applied Packaging Research, Vol. 8, No. 2, Article 7, pp.56-67, 2016.
  4. J. Jeong and T. Oh, “Survey on Protocols and Applications for Vehicular Sensor Networks”, International Journal of Distributed Sensor Networks, Vol. 12, No. 8, 10 pgs, Aug. 2016.
  5. J. Jeong, H. Jeong, E. Lee, T. Oh, and D. Du, “SAINT: Self-Adaptive Interactive Navigation Tool for Cloud-Based Vehicular Traffic Optimization,” IEEE Transactions on Vehicular Technology, vol. 65, Issue 6, pp. 4053-4067, 2016.
  6. Y. Kim, T. Oh, and Jeongnyeo Kim, “Analyzing User Awareness of Privacy Data Leak in Mobile Applications,” Mobile Information Systems, vol. 2015, Article ID 369489, doi:10.1155/2015/369489, 12 pgs, 2015.
  7. E. Tang, T. Oh, Y. B. Choi and R. Chouta,, “Effect of Web Caching on Load Time”, International Journal of Emerging Technology in Learning (iJECT), Vol. 8, No. 6, pp. 21-26, Dec. 2013.
  8. Y. B. Choi, Y. Choe and T. Oh, “Future Direction for a Next Generation Web”, International Journal of Emerging Technology in Learning (iJECT), Vol. 8, No. 6, pp. 6-10, Dec. 2012.
  9. K. Alghamdi, T. Oh and B. Stackpole, “Bluetooth Security Lock for Android Smart Phone Platform.” International Journal of Scientific and Engineering Research, Vol. 3, Issue 7, 3 pgs, July 2012.
  10. T. Oh, Y. Choi, J. Ryoo and K. Stokes, “Security Management Protocols and their Applications in Wireless Sensor Networks for Healthcare”, International Journal of Mobile Communications, vol. 9 no. 2, pp. 187-207, Mar. 2011.
  11. T. Oh, Y. Choi, M. Guthrie, K. Harold, D. Copeland and T. Kim, “Reeling in Cognitive Radio: The Issues of Regulations and Policies Affecting Spectrum Management”, International Journal of Future Generation Communication Networking, vol. 3 no. 3, pp. 71-79, Sept. 2010.
  12. J. Ryoo, T. Oh, S. Shin, and Y. Choi, “A Comprehensive Readiness Assessment Framework for Identity Theft Safeguards in Web-based Electronic Government Systems”, International Journal of Electronic Government, vol. 6, no. 1, pp. 19-40, Jan. 2009.
  13. J. Ryoo, Y. Choi, T. Oh, and G. Corbin, “A Multi-Dimensional Classification Framework for Developing Context-Specific Wireless Local Area Network Attack Taxonomies”, International Journal of Mobile Communications, vol. 7, no. 2, pp. 253-267, Feb. 2009.
  14. T. Chen, T.Oh “Reliability in MPLS Network.” IEEE Communication Magazine, vol 37, no. 12, pp. 58-62, Nov. 1999.

Conference Publications:

  1. Y. Shen, J. Jeong, J. Jun and T. Oh, “HCMAC: Hybrid Cluster-based MAC Protocol for Driving Safety in Highway Environment”, IEEE INFOCOM 2018, Honolulu, HI, Apr. 2018, 10pgs (Submitted).
  2. J. Jeong, Y. Shen, J. Jeong, T. Oh, and J. Jun, “TOMAS: TCP Context Migration for Reliable Data Services with EDCA Multichannel in Vehicular Network”, IEEE INFOCOM 2018, Honolulu, HI, Apr. 2018, 10pgs (Submitted).
  3. T. Oh, S. Chung, B. Lunt, R. McMahon, R. Rutherfoord, "The Roles of IT Education in IoT and Data Analysis", ACM Special Interest Group for Information Technology Education (ACM SIGITE 2017), Rochester, NY, Oct. 2017.
  4. J. Margolis, T. Oh, S. Jadhav, Y. Kim and J. Kim, “ An In-Depth Analysis of the Mirai Botnet”, IEEE International Conference on Software Security and Assurance (ICSSA 2017), Altoona, PA, July 2017, 5pgs.
  5. J. Margolis, T. Oh, S. Jadhav, J. Jeong, Y. Kim and J. Kim, “Analysis and Impact of IoT Malware”, ACM Special Interest Group for Information Technology Education (ACM SIGITE 2017), Rochester, NY, Oct. 2017, 5pgs.
  6. S. Jadhav, T. Oh and J. Jeong, “An Assistive System for Android Malware Analysis to Increase Malware Analysis Efficiency”, The 31st IEEE International Conference on Advanced Information Networking and Applications (AINA-2017) Tamkang University, Taipei, Taiwan, Mar. 2017. 5 pgs.
  7. B. Mugabarigira, Y. Shen, J. Jeong, T. Oh and S. Son, “Design and Implementation of a Vehicular Network Simulator for Data Forwarding Scheme Evaluation”, The 31st IEEE International Conference on Advanced Information Networking and Applications (AINA-2017) Tamkang University, Taipei, Taiwan, Mar. 2017, 5 pgs.
  8. J. Jeong, Y. Shen, J. Jeong, T. Oh, J. Jun and S. Son, “TOMS: TCP Contest Migration Scheme for Efficient Data Services in Vehicular Networks”, The 31st IEEE International Conference on Advanced Information Networking and Applications (AINA-2017) Tamkang University, Taipei, Taiwan, Mar. 2017, 5 pgs.
  9. T. Oh, Y. Kim, H. Moon and J. Kim, “Android Malware Analysis and Conceptual Malware Mitigation Approaches”, IEEE International Conference on Information and Communication Technology Convergence (ICTC 2016), Jeju Island, Korea, July 2016, pp. 684-693.
  10. J. Kang, Q. Yu, E. Holden and T. Oh, “Security Requirements Embedded in MS Programs in Information Sciences and Technologies”, ACM Special Interest Group for Information Technology Education (ACM SIGITE 2016), Boston, MA, Sept. 2016, pp. 77-82.
  11. H. Alatwi, T. Oh, E. Fokoue and B. Stackpole, “Android Malware Detection using Category-Based Machine Learning Classifiers”, ACM Special Interest Group for Information Technology Education (ACM SIGITE 2016), Boston, MA, Sept. 2016, pp. 54-59.
  12. J. Waggoner, B. Stackpole and T. Oh, A Hands-On Approach to Computing Security Education: Metasploit Module Development”, CISSE 2016, June 2016.
  13. J. Lee, J. Jeong, T. Oh, J. Jun, and S. Son “DCMAC: Data-oriented Cluster-based Media Access Control Protocol”, IEEE 30th International Conference on Advanced Information Networking and Applications (2016 WAINA), Mar. 2016, pp. 258-261.
  14. Y. Shen, J. Jeong, T. Oh and S. Son “CASD: A Framework of Context-Awareness Safety Driving in Vehicular Networks”, IEEE 30th International Conference on Advanced Information Networking and Applications (2016 WAINA), Mar. 2016, pp. 252-257.
  15. P. Victoria, G. Behm, and T. Oh, “Intelligent Mobility Cane for People Who are Blind and Deaf-Blind: A Multidisciplinary Design Project That Assists People with Disabilities”, ASME 2015 International Mechanical Engineering Conference & Exposition, Houston, TX Nov. 2015, pp. 231-240.
  16. S. Jadhav, S. Dutia, K. Calangutkar, T. Oh, Y. H. Kim, and J. N. Kim, “Cloud-based Android botnet malware detection system,” IEEE 2015 17th International Conference on Advanced Communication Technology (IEEE ICACT), July 2015, pp. 347–352.
  17. S. Jadhav, T. Oh, Y. H. Kim, and J. N. Kim, “Mobile device penetration testing framework and platform for the mobile device security course,” IEEE 2015 17th International Conference on Advanced Communication Technology (IEEE ICACT), July 2015, pp. 675–680.
  18. R. Campillo and T. Oh, “Layer 2 Protocol to Protect the IP Communication in a Wired Ethernet Network”, ASIA 2015, Albany, NY, June 2015, pp.67-72.
  19. T. Oh, S. Jadhav and Y. Kim, “Android Botnet Categorization and Family Detection Based on Behavioral and Signature Data”, IEEE 6th International Conference of Information and Communication Technology Convergence (IEEE ICTC), Jeju Island, Korea, Oct. 2015, pp. 647-652.
  20. B. Harmat, J. Stroud, D. Johnson, B. Stackpole, S. Perez-hardy, R. Mislan, and T. Oh,” The Security Implications of IMSI Catchers”, SAM ’15 International Conference on Security and Management, Las Vegas, NV, July 2015 pp. 57-62.
  21. S. Dutia, T. Oh, and Y. Kim, “Developing Automated Input Generator for Android Mobile Device to Evaluate Malware Behavior”, ACM SIGITE 2015, Chicago, IL, Sept. 2015 pp. 43.
  22. S. Dutia, Y. Kim and T. Oh, “Automated Input Generator for Android Applications” ASIA 2014, Albany, NY, 2014, pp. 71-76.
  23. R. Kushalnagar, V. Ramachandran and T. Oh, “Tactile Captions: Augmenting Visual Captions”, 16th International Conference of Computers Helping People with Special Needs (ICCHP 2014), Univ. Linz, Austria, July 20, pp. 25-32.
  24. K. Paugh, R. Mislan, T. Oh, “Virtual Malware Analysis Framework and Platform for Android”, IEEE 9th International Conference on Cyber Warfare and Security (ICCWS 2014), West Lafayette, IN, Mar. 2014, pp. 31-37.
  25. Sinan Nacy, Tae Oh and Jim Leone, "Implementation of SHA-1 and ECDSA for Vehicular Ad-hoc Network using NS-3" ACM SIGITE 2013, Orlando, FL, Oct. 2013. pp. 83-88.
  26. Carlos Gonzalez, Charles Border, Tae Oh, "Teaching in Amazon's Elastic Cloud Computing", ACM SIGITE 2013, Orlando, FL, Oct. 2013, pp. 150-156.
  27. Colin Szost, Kriti Sharma, Tae Oh, Bill Stackpole and Rick Mislan, “Teaching Android Malware Behaviors for Android Platform using Interactive Labs” ASIA 2013, Albany, NY, June 2013, pp. 69-72.
  28. Kriti Sharma, Trushank Dand, Tae Oh and Bill Stackpole, “Malware Analysis for Android Operating System”, ASIA 2013, Albany, NY, June 2013. pp. 31-35.
  29. R. Mislan and T. Oh, “Mobile Device Vulnerability Exploitation as a Security Curriculum using the Flipped Classroom Model Approach”, ASIA 2013, Albany, NY, June 2013, pp. 65-68.
  30. Ben Andrew, Tae Oh, and Bill Stackpole, “Android Malware Analysis Platform”, ASIA 2013, Albany, NY, June 2013, pp. 36-38.
  31. HyunGon Kim, T. Oh, Y. Choi, “Nomadic Device based CRL Acquisition Method for Vehicular Networks”, 6th International Conference of Convergence and Hybrid Information Technology (ICHIT 2012), Daejon, Korea, Daejeon, Aug. 2012, pp.86-93.
  32. Jaseem Jeffery and T. Oh, “Implementation of Security Encryption in MANET Reactive Routing Protocols using OPNET.”, OPNETWORK 2012, Washington DC, Aug. 2012, 7 pgs.
  33. Tae Oh, Rahul Ramachandran, Carlos Gonzalez, William Stackpole and Emily Cummins, “Best Practices for Android, Blackberry, and iOS”, The First IEEE Workshop in enabling Technologies for Smartphone and Internet of Things, June 2012.
  34. Rahul Ramachandran, Tae Oh, and William Stackpole, “Android Anti-Virus Analysis”, ASIA and SKM 2012, Albany, NY, June 2012, pp. 35-40. (BEST TECHICAL PAPER).
  35. Carlos Gonzalez, William Stackpole, and Tae Oh, “Anti-Spyware Analysis for iOS”, ASIA and SKM 2012, Albany, NY, June 2012, pp. 72-78.
  36. Emily Cummins, Bill Stackpole, and Tae Oh, “Blackberry Structure and Anti-Malware Analysis”, ASIA and SKM 2012, Albany, NY, June 2012, pp. 68-71.
  37. S. Sajan and T. Oh, “Simulation and Performance Evaluation in Neighborhood Area Network for Smart Grid Using Zigbee”, in OPNETWORK 2011, Washington DC, Aug. 2011. 7 pgs. (BEST TECHICAL PAPER)
  38. T. Oh, Y. Choi and R. Chouta, “RFID & Supply Chain Management: Generic and Military Applications”, submitted to Future Generation Communication and Networking 2011, Jeju Island, Korea, Aug. 2011.
  39. E. Tang, T. Oh, Y. Choi and R. Chouta, “Effect of Web Caching on Load Time”, in AHList 2011, Houston, TX, May 2011.
  40. Y. Choi, Y. Choe and T. Oh, “Future Direction for a Next Generation Web”, AHList 2011, Houston, TX, May 2011.
  41. Y. Choi, S. Lim and T. Oh “Feasibility of Virtual Security Laboratory for Three-Tiered Distance Education”, ACM SIGITE 2010, Midland, MI, Oct. 2010, pp. 53-57.
  42. S. Lim, T. Oh, Y. Choi, and T. Lakshman, “Security Issues on Wireless Body Area Network for Remote Healthcare Monitoring,” in 2010 IEEE International Conference on Ubiquitous and Mobile Computing (UMC 2010) in conjunction with 2010 IEEE Sensor Networks, Ubiquitous, and Trustworthy Computing (SUTC 2010), Newport Beach, CA, June 2010, pp. 327-332.
  43. R. Chouta, T. Oh, J. Ryoo, Y. Choi, “Parameters of Green IT”, in Northeast DSI 2010, Alexandria, VA, Mar. 2010, 7 pgs.
  44. T. Oh, Y. Choi, M. Guthrie, K. Harold and D. Copeland, “Reeling in Cognitive Radio: The Issues of Regulations and Policies Affecting Spectrum Management”, in 2009 FGCN, Jeju, Korea, Dec. 2009, 13 pgs.
  45. T. Oh, Y. Pan and S. Mishra “Teaching High-Assurance Internet Protocol Encryption (HAIPE) Using OPNET Modeler Simulation Tool”, ACM SIGITE 2009, George Mason University, Arlington, VA, Oct. 2009, pp. 161-165.
  46. S. Mishra, Y. Pan and T. Oh “Undergraduate Research in Wireless Sensor Security Course”, CISSE 2009, Seattle, WA, June 2009, 6 pgs.
  47. J. Ryoo, T. Oh, and Y. Choi, “An Analysis of Identity Theft Safeguards in the U.S. e-Government Systems”, In Proceedings of the 35th Research Conference on Communication, Information, and Internet Policy (Telecommunications Policy Research Conference), George Mason University, Arlington, VA, Sept. 2007.
  48. T. Oh, T.Chen and J. Kennington “Fault Restoration Techniques for MPLS with QoS Constraints”, in Technical Report 00-CSE-7, SMU, Dallas, TX, Aug. 2000.
  49. T. Oh, T. Chen and J. Kennington "Fault Restoration Techniques and Spare Capacity Allocation with QoS Constraints for MPLS Network," in GLOBECOM2000, San Francisco, CA, Nov. 2000.
  50. T. Oh, T. Chen “Fast Self-healing ATM Networks by Adaptive selection of Backup Virtual Paths.” IEEE Symposium in Planning & Design of Broadband Networks, Montreal, Canada, Oct. 1998, pp130-138.

Book Chapters:

  1. T. Oh, S. Mishra, C. Hochgraf “Smart Grid Security in the Last Mile”, in Auerbach Publications, Taylor & Francis Group, CRC, will publish in 2013.
  2. Y. Choi, T. Oh and R. Chouta, “RFID Implementation and Security Issues” in Lecture Notes in Computer Science, Springer-Verlag Berlin Heidelberg, 2011, pp. 236-249.
  3. T. Oh, S. Lim, Y. Choi and J. Ryoo, “Security Implications in Virtualization”, in Encyclopedia of Cryptography and Security (2nd Ed.), Springer Verlag, Germany, 2011.
  4. J. Ryoo, Y. Choi and T. Oh, “Automated Input Generator for Android Application”, Handbook of Green Information and Communication Technologies, 2010. pp. 364-376.
  5. J. Ryoo, Y. Choi, and T. Oh, "Security and Privacy in Mobile Telemedicine," Mobile Telemedicine: A Computing and Networking Perspective, Auerbach Publications, CRC Press, 2007 (ISBN-10: 1420060465).

Patent:

  1. C. Ge, T. Oh, A. Mondragon, S. Kumar, A. Grimaldi, D. Johnson, R. Brockhurst*, and M. Brockhurst, “Real-Time Monitoring of Packaging Handling and Transportation”, Patent # US 61/889,914, RIT Invention Disclosure, 2013.

Internet Standardization in Internet Engineering Task Force: (IETF)

  1. J. Jeong, S. Antipolis, D. Liu, T. Oh, C. Perkins, A. Petrescu, “IP Based Vehicular Networking: Use Cases, Survey and Problem Statement.”, draft-ietf-ipwave-vehicular-networking-01, 49 pgs, Nov. 2017.
  2. J. Jeong, A. Petrecu, T. Oh, D. Liu and C. Perkins, “Problem Statement for IP Wireless Access in Vehicular Environments”, IETF, draft-jeong-ipwave-problem-statement, June 2017,
  3. J. Jeong and T. Oh, "Problem Statement for Vehicle-to-Infrastructure Networking", IETF, draft-jeong-its-v2i-problem-statement, July 2016.

Extended Abstract Publications:

  1. T. Oh "Android and IoT Detection System", KOCSEA 2017, Las Vegas, Nov. 2017.
  2. S. Jashav, T. Oh, J. Jeong, Y. Kim, and J. Kim, "An Assistive System for Android Malware Analysis to Increase Malware Analysis Efficiency", UKC 2017, Washington DC, Aug. 2017.
  3. T. Oh “Using the Machine Learning Approach to Detect Mobile Device Malware “, KOCSEA 2016, Washington DC, Dec. 2016.
  4. T. Oh “Intelligent Mobility Cane with Navigation “US-Korea Conference (UKC) 2016, Dallas, TX, Aug. 2016.
  5. R. Mislan and T. Oh, “Implementing Flipped Classroom Model in Mobile Device Security and Vulnerability Exploitation Course”, KOCSEA 2015, Clarmont, CA, Dec. 2015,
  6. S. Dutia, T. Oh, Y. Kim and J. Kim, “Automated Input Generator to Detect Malicious Android Applications”, UKC 2015, Atlanta, GA, Aug. 2015, pp. 311.
  7. S. Jadhav, T. Oh, Y. Kim and J. Kim, “Advanced Android Malware Detection Techniques Using Android Memory Dump”, UKC 2015, Atlanta, GA, Aug. 2015, pp. 316.
  8. T. Oh, Y. Kim, and J. Kim, “Cloud-based Malware Mitigation Prototype for Android”, KOCSEA 2014, Yorktown Heights, NY, Dec. 2014.
  9. Y. Kim and T. Oh, “Analysis of Mobile Malware Based on the User Awareness”, ACM SIGITE 2014, Atlanta, GA, Oct. 2014.
  10. R. Kushainagar, V. Ramachandran, and T. Oh, “Creating Tactile Captions: Augmeting Visual Captions”, UKC 2014, San Francisco, CA, Aug. 2014.
  11. T. Oh, Rich Mislan, “Implementing Flipped Classroom Model in Mobile Device Security and Vulnerability Exploitation Course.”, CISSE 2014, San Diego, CA, June 2014.
  12. T. Oh, Y. Kim, “Conceptual Solution for Cloud-based Malware Mitigation Prototype for Android”, KOCSEA 2013, San Jose, CA, Dec. 2013.
  13. T. Oh, P. Inglesias, and G. Behm, “Utilizing Haptic Device with Mobility Cane to Guide the Deaf-blind in Real-time Obstacle Avoidance”, UKC 2013, Aug. 7, 2013.
  14. T. Oh, P. Iglesias, G. Behm, M. Steward, V. Gupta, R. Lamb, N. Kabylkas and S. Ulman, “Increasing the Number of Undergraduate Research Experience of Deaf and Hard of Hearing Students: Smart Cane Project” 2013 CAID Conference, Rochester, NY.
  15. K. Sharma, T. Oh, “Android Malware Analysis and Developing Mitigation Techniques, New York Celebration of Women in Computing (NYCWiC) 2013, Albany, NY, Apr. 19-20, 2013.
  16. T. Oh, “Android Malware Analysis and Technical Solutions”, KOCSEA 2012, Atlanta, GA, Dec. 2012.
  17. T. Oh, “Utilizing OPNET Modeler in Networking Courses at RIT”, OPNETWORK 2012, Washington DC, Aug. 2012.
  18. Y. Sun, T. Oh, S. Lim, “Feasibility Study of Emergency Siren Detection for Deaf and Hard of Hearing using Android Platform”, UKC 2012, Aug. 2012.
  19. S. Lim, T. Oh, Y. Choe “Assistive Technology for the People with Disabilities to Enhance Accessibility of Emergency Communications”, UKC 2011, Park City, Utah, Aug. 2011.
  20. T. Oh, “Providing Research Experience for Graduate Students Using OPNET”, presented at OPNETWORK 2011, Washington DC, Aug. 2011.
  21. S. Lim and T. Oh “Emergency Communication for the Minor Society in Korea ” presented at 2011 Workshop on Smart and Green Home Technology for Improving Quality of Life, South Korea, July 14, 2011.
  22. S. Lim and T. Oh, “Emergency Communication for Deaf/Hard of Hearing”, in KOCSEA 2010, Vienna, VA, Nov. 5-6, 2010.
  23. T. Oh, “Teaching and Research using OPNET Modeler at Rochester Institute of Technology”, presented at OPNETWORK 2010, Washington DC, Aug. 2010.
  24. S. Lim, T. Oh, K. Park, “Issues and Research Topics of Smart Grid Services and Standards in USA”, in US-Korea Conference (UKC) 2010, Seattle, Washington, Aug. 2010.
  25. S. Lim, T. Oh, Y. Choi, and T. Lakshman, “Security and Privacy issues for Remote Healthcare Monitoring,” in US-Korea Conference (UKC) 2010, Seattle, Washington, Aug. 2010.
  26. T. Oh, S. Lim, Y. Choi, and A. Rahman, “Network Security Perspectives in Cloud Computing,” in UKC 2010, Seattle, Washington, Aug. 2010.
  27. T. Oh, S. Mishura and Y. Pan “Network Management for Energy Efficient MANET”, in UKC 2009, Raleigh, NC, July 2009.
  28. T. Oh, “Single Attack in Wireless Mesh Networks in Smart Grid”, presented in 2009 KOCSEA Conference, Las Vegas, NV, Dec. 2009.
  29. T. Oh, “Multi-Protocol Label Switching Concept,” in OPNETWORK 2008, Washington D.C. Aug. 2008.
  30. T. Oh and J. Ryoo, “Modeling and Simulation of Wireless Local Area Network Security Using a New Multi-Dimensional Threat Taxonomy”, UKC 2007, Washington, D.C., Aug. 2007.
  31. T. Oh, “Multi-Protocol Label Switching Technology,” in OPNETWORK 2007, Washington D.C. Aug. 2007.
  32. T. Oh “Applications of MPLS Technology in Enterprise and Access Networks,” in OPNETWORK 2006, Washington D.C., Aug. 2006.
  33. T. Oh “The Concept of Multi-Protocol Label Switching (MPLS) Technology,” in OPNETWORK 2006, Washington D.C, Aug. 2006.

Reports:

  1. T. Oh, S. Jadhav, T. Ajmera, Y. Seralathan and J. Margoili, “Development of Marlicious Code Detection Mehtod for Mobile Device in IoT Environment.” May 2017, 64 pgs.
  2. S. Perez-Hardy, R. Mislan, D. Johnson, B. Stackpole, T. Oh, B. Harmat, J. Stroud, M. Johnson, E. Embling, and R. Henson, “PLIG Implementation-Final Report and Migration to Phase 2: MoSeVERE The Design and Implementation of a Wireless Carrier Topology in a Lab Environment”, PLIG Final Report, Mar. 2015, 12 pgs.
  3. T. Oh, B. Stackpole, S. Jadhav, S. Dutia, K. Calangutkar, R. Hagawane, and G. Joshi, “Developing Cloud-based Conceptual Solution for Detecting Android Malware”, ETRI Final Report, Dec. 2014, 70 pgs.
  4. B. Stackpole, S. Mason, D. Johnson, R. Mislan, and T. Oh, “Report: DoD Information Assurance Scholarship Program”, Dept. of Defense, Nov. 2014, 40 pgs.
  5. T. Oh, B. Stackpole, Y. Kim, T. Dand, A. Kondeti, S. Dutia, and S. Jaising, “Conceptual Solution for Cloud-based Malware Mitigation System for Android”, Midterm ETRI Report 2013, Sept. 2013, 40 pgs.
  6. R. Mislan and T. Oh "Mobile Device Security and Vulnerability Exploitation (MoSEVERE)", PLIG Interim Report, June, 2013. 40 pgs.
  7. T. Oh, “Mobile Device Security and Ethical Hacking Training”, FEAD Assessment Report, March, 2013, 10 pgs.
  8. T. Oh and B. Stackpole, Analyzing the Behavior of Mobile Device Malware and Providing Security Solution to Protect Mobile Devices,” ETRI Final Report 2012, Dec. 30, 2012.
  9. T. Oh, B. Stackpole, B. Mauer, T. Desrosiers and D. Bonasera, Analyzing the Behavior of Mobile Device Malware and Providing Security Solution to Protect Mobile Devices,” ETRI Interim Report 2012, Sept. 30, 2012, 40pgs.
  10. T. Oh “Including Real Networking Hardware in the Modeling and Simulation (M&S) Environment”, PLIG Committee 2011, 10 pgs.
  11. T. Oh, B. Lee and L. Lee, “YGPF 2010 Report”, KSEA and KOFST, 9/1/2010.

Posters, Invited Talks and Interviews:

  1. T. Oh, “MS NSA Department Interview”, ( https://www.youtube.com/watch?v=kqslZDxH6p4), Nov. 2017.
  2. Stephanie Robusto, “Apps Let Spammers Hijack Phone Numbers, Make Robocalls”, (http://www.whec.com/news/apps-let-spammers-hijack-phone-numbers-make-robocalls/4650059/), WHEC Channel 10 News, Oct. 2017.
  3. Jeannie McBride, “How to Stop Calls From Those Annoying Telemarketers”, (http://www.rochesterfirst.com/news/local-news/how-to-stop-calls-from-those-annoying-telemarketers/760406803), July, 2017.
  4. E. Stegner, M. Mack, T. Oh, “Removable Obstacle Avoidance Module”, 2017 Effective Access Technology Conference, Rochester, NY, Apr. 2017.
  5. Sasha-Ann Simons, WXXI, WATCH: Tech Breaks Down Barriers, Increases Access”, GPS Smart Cane, (http://innovationtrail.org/post/watch-tech-breaks-down-barriers-increases-access.), 2017.
  6. Sasha-Ann Simons, “Effective Access Technology Student Projects to Help People with Disabilities”, Smart Cane, (https://www.youtube.com/watch?v=xj_NMiZo5OM), 2017
  7. T. Oh, P. Iglesias, G. Behm, T. Shinde, C. Henerdean, M. Alawad, “Intelligent Mobility Cane with the Indoor Navigation for Blind, Visually Impaired and Deaf-Blind”, Imagine RIT, May 2016.
  8. T. Shinde, M. Alawad, T. Oh, P. Victoria, G. Behm, “Intelligent Mobilty Cane Prototype with Navigation for People who are Deaf and Deaf-blind.”, 3rd Annual Effective Access Technology Conference, Rochester NY, Nov. 2015.
  9. T. Oh, “Intelligent Mobility Cane Development Process”, I-Corp presentation, Mar. 2016.
  10. T. Oh, “Mobile Device Security”, Guest speaker CSEC 417, Dec. 2014.
  11. V. Ramachandran, R. Kushalnagar, and T. Oh, “Tactile Captions: Augmenting Visual Captions”, Imagine RIT, 2014.
  12. T. Oh, P. Ignesis, G. Behm, “Implementation of Tactile Feedback in Smart Cane”, RIT Effective Access Technologies Conference 2014, Rochester, 2014.
  13. S. Jadhav, T. Oh, S. Jaising, S. Dutia, and A. Pantavaidya, “Cloud-based Runtime Malware Analysis Platform”, Imagine RIT, 2014.
  14. A. Nagendran, P. Victoria, T. Oh, G. Behm, D. Sebastian, V. Kilaparthi, “Smart Cane”, Imagine RIT, 2014.
  15. R. Mislan, B. Stackpole, D. Johnson, T. Oh, B. Hartpence, “SkyJacker: Theft from Above”, Imagine RIT, 2014.
  16. T. Oh, “Smart Homes and Smart Thieves on WHEC”, WHEC Ch 10 TV News, Apr. 5, 2014. (https://www.youtube.com/watch?v=XYcA22Tt1Ho)
  17. T. Oh, “Kill-Switch” for Cell Phones”, 13WHAM News, Mar. 10, 2014. (https://www.youtube.com/watch?v=MMVnfZjlnKc)
  18. T. Oh, P. Iglesias, G. Behm, “Smart Cane”, Presidental’s RoundTable, Oct. 10, 2013.
  19. T. Oh, “Android Malware Analysis and Technical Solutions”, Presented at SKKU, ETRI, Jun Nam University, NRSI, June, 2013.
  20. T. Oh, P. Iglesias, and G. Behm, “Method & Apparatus for Enhanced Mobility Cane Utilizing Haptic Device to Guide the Deaf-blind User in Real-time Obstacle Avoidance.” Imagine RIT, May, 2013.
  21. M. Augustine and Tae Oh, “Desktop Virtualization over MANET”, Imagine RIT, May 2013.
  22. B. Andrews, T. Oh, B. Stackpole, “Android Malware Analysis Platform”, Imagine RIT, May 2013.
  23. C. Szost, B. Stackpole and T. Oh, “Teaching Android Malware Behavior for the Android Platform Using Interactive Labs”, Imagine RIT, May 2013.
  24. T. Aliarbi and T. Oh, “Emergency Notification System for Deaf and hard of hearing (DHH),” Effective Access Technologies, RIT, Nov. 2012
  25. T. Oh, P Inglesias, G. Behm, “Method & Apparatus for Enhanced Mobility Cane Utilizing Haptic Device to Guide the Deaf-blind User in Real-time Obstacle Avoidance”, Effective Access Technologies, RIT, Nov. 2012.
  26. T. Oh, B. Mauer, T. Desrosiers, “Mobile Security for Android, Blackberry, and IOS”, RIT Brick City Home Coming, Oct., 2012.
  27. V. Ionescu, Tae Oh “Physical and Behavior Security Solutions for the Android Smart Phone Platform.”, RIT Undergraduate Symposium 2012, RIT.
  28. K. Raja, Tae Oh, Yu Sun and Daniel Bower, “Learning Cyber Security using Second Life”. Imagine RIT 2012, May 2012.
  29. R. Ramachandran, Carlos Gonzalez, Emily Cummins, Tae Oh and Bill Stackpole, “Mobile Security for iPhone, Android and Blackberry”, Imagine RIT 2012, May 2012.
  30. M. Augustine and T. Oh, “Interaction Between Real and Simulated Devices”, Imagine RIT 2012, May 2012.
  31. T. Oh, “Reliable Emergency Communication Solution for Elders with Hearing Loss”, presented at Retirement Research Foundation, Chicago, IL, Jan. 2012.
  32. S. Sajan, T. Oh “Modeling Zigbee Communication for Smart Grid in Neighborhood Area Network (NAN)” presented at RIT Graduate Symposium, Rochester, NY, Aug. 2011.
  33. A. Alenzi and T. Oh “Emergency Notification System for Deaf and Hard of Hearing”, presented at Imagine RIT 2011, Rochester, NY, May 2011.
  34. S. Sajan, M. Patil, P. Hristov and T. Oh, “Interaction of Real Network Devices with Simulation using OPNET”, presented at Imagine RIT, May 2011.
  35. P. Newcomb, S. Mishra, T. Oh, and G. Tsouri “Novel Methods of Monitoring Labor in Electrohvsterography”, presented at RIT/RGH Alliance Poster Session, Rochester, NY, Mar. 2011.
  36. M. Patil and T. Oh, “Effect of Real Video Streaming over Virtual MANET Environment”, presented at 2nd Annual RIT Graduate Research Symposiums, Rochester, NY, July 21, 2010.
  37. R. Chouta, T. Oh, and S. Pendelberry, “A Behavior Analysis of a Computer Server in Controlled Environment”, presented in 2nd Annual RIT Graduate Research Symposiums, July 21, 2010.
  38. T. Oh, “Green IT Education and Research at RIT”, presented at RIT/Community College Partnership Conference, Rochester, NY, June 2010.
  39. M. Patil and T. Oh, “Effect of Real Video Streaming over Virtual MANET Environment”, presented at Imagine RIT, Rochester, NY, May 2010.
  40. T. Oh, “Future Estimation Model for Network Management in MANET”, Invited talk at RIT (Audiences: Director of National Intelligence Fellows), Rochester, NY, Oct. 2009.
  41. T. Oh, “How to do Research “, Invited talk at RIT (Sensor Network Course), Rochester, NY, 2009.
  42. T. Oh, “Network Security Issues and Solutions for MANET”, Invited talk at SMU, Dallas, TX, Apr. 2007.
  43. T. Oh, “Evaluating routing algorithms and protocols using OPNET”, Invited talk at Rockwell Collins, Richardson, TX, Oct. 2006.
  44. T. Oh, “OPNET in Defense Industry”, invited talk at SMU, Dallas, TX. Nov. 2005.
  45. T. Oh, “Evaluating routing algorithms and protocols using OPNET”, Invited talk at SMU, Dallas, TX, Nov. 2005.
  46. T. Oh, “Reliability and QoS in MPLS Networks”, invited talk at Texas A&M University, College Station, TX, Apr. 2004.
  47. T. Oh, “Challenges of QoS in Wireless Networks,” invited talk at Rockwell Collins, Richardson, TX, Apr. 2003.
  48. T. Oh, “Fault Restoration Techniques and Spare Capacity Allocation for MPLS Networks,” invited talk at University of Houston, Houston, TX, Oct. 2003.
  49. T. Oh, Young Lee “Ceterus Link State Protocol (CLSP),” invited talk at Sprint Corporation, Kansas City, Missouri, Oct. 2002.
  50. T. Oh “Fault Restoration Techniques”, invited talk at SMU, Dallas, TX, Nov. 2001.
  51. T. Oh “QoS and Reliability in MdPLS Networks,” presented at SMU Graduate Research Day, Dallas, TX, Feb. 2001.
  52. T. Oh, “Fault Restoration Routing using Operation Research Technique,” invited talk at Nortel Networks, Richardson, TX, Nov. 2000.

Korean-American Scientists and Engineers Association (KSEA) Journals:

  1. Tae Oh, "Young Generation Technical and Leadership Conference (YGTLC) 2009 Report", KSEA Letters, Vol. 37-2 ,pg. 8-10 Feb 2009.
  2. Tae Oh " Young Generation Gathered Again at UKC 2008", KSEA Letters, Vol. 37-1, pg. 30-31 Oct. 2008.
  3. Tae Oh and Ben Lee "UKC Young Generation and Professional Forum (YGPF) Report", KSEA Letters, Vol. 38, pg. 30-31, Oct. 2009.