default search action
Riccardo Bettati
Person information
- affiliation: Texas A&M University, College Station, Texas, USA
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2023
- [j25]Jafar Pourbemany, Ye Zhu, Riccardo Bettati:
A Survey of Wearable Devices Pairing Based on Biometric Signals. IEEE Access 11: 26070-26085 (2023) - [j24]Rishabh Singla, A. L. Narasimha Reddy, Riccardo Bettati, Hussein M. Alnuweiri:
Toward a Multidimensional Analysis of the National Vulnerability Database. IEEE Access 11: 93354-93367 (2023) - [j23]Sean W. Caldwell, Ye Zhu, Yong Guan, Riccardo Bettati:
On Account Association With Assistance From Mobile Networks. IEEE Trans. Dependable Secur. Comput. 20(4): 3421-3433 (2023) - [c72]Rishabh Singla, Shreyas Srinivasa, A. L. Narasimha Reddy, Jens Myrup Pedersen, Emmanouil Vasilomanolakis, Riccardo Bettati:
An Analysis of War Impact on Ukrainian Critical Infrastructure Through Network Measurements. TMA 2023: 1-10 - 2022
- [c71]Shan Jin, Minghua Xu, Riccardo Bettati, Mihai Christodorescu:
Optimal Energy Efficient Design of Artificial Noise to Prevent Side-Channel Attacks. WIFS 2022: 1-6 - [c70]Jafar Pourbemany, Ye Zhu, Riccardo Bettati:
Breathe-to-Pair (B2P): Respiration-Based Pairing Protocol for Wearable Devices. WISEC 2022: 188-200 - [i3]Shan Jin, Minghua Xu, Riccardo Bettati, Mihai Christodorescu:
An Optimal Energy Efficient Design of Artificial Noise for Preventing Power Leakage based Side-Channel Attacks. CoRR abs/2208.09140 (2022) - 2021
- [j22]Shan Jin, Riccardo Bettati:
Efficient side-channel attacks beyond divide-and-conquer strategy. Comput. Networks 198: 108409 (2021) - [j21]Ye Zhu, Nicholas Ruffing, Jonathan Gurary, Yong Guan, Riccardo Bettati:
Towards Smartphone Operating System Identification. IEEE Trans. Dependable Secur. Comput. 18(1): 411-425 (2021) - [c69]Sean W. Caldwell, Ye Zhu, Yong Guan, Riccardo Bettati:
Identifying Account Association with Assistance from Mobile Networks using Cross-Service Attacks. ICC 2021: 1-6 - [c68]Rishabh Singla, A. L. Narasimha Reddy, Riccardo Bettati, Hussein M. Alnuweiri:
Connect Id: Identifying Devices Before They Connect to the Network. WF-IoT 2021: 421-426 - [i2]Jafar Pourbemany, Ye Zhu, Riccardo Bettati:
Breath to Pair (B2P): Respiration-Based Pairing Protocol for Wearable Devices. CoRR abs/2107.11677 (2021) - [i1]Jafar Pourbemany, Ye Zhu, Riccardo Bettati:
A Survey of Wearable Devices Pairing Based on Biometric Signals. CoRR abs/2107.11685 (2021) - 2020
- [c67]Shan Jin, Riccardo Bettati:
Reinforcement-Based Divide-and-Conquer Strategy for Side-Channel Attacks. WIFS 2020: 1-6
2010 – 2019
- 2018
- [c66]Zhiyuan Zheng, Allen Webb, A. L. Narasimha Reddy, Riccardo Bettati:
IoTAegis: A Scalable Framework to Secure the Internet of Things. ICCCN 2018: 1-9 - [c65]Shan Jin, Riccardo Bettati:
Adaptive Channel Estimation in Side Channel Attacks. WIFS 2018: 1-7 - 2017
- [c64]Zhiyuan Zheng, Shan Jin, Riccardo Bettati, A. L. Narasimha Reddy:
Securing cyber-physical systems with adaptive commensurate response. CNS 2017: 1-6 - 2016
- [j20]Timothy Nix, Riccardo Bettati:
Neighbourhood failures in covert communication network topologies. Int. J. Comput. Sci. Eng. 13(2): 132-146 (2016) - [c63]Nicholas Ruffing, Ye Zhu, Rudy Libertini, Yong Guan, Riccardo Bettati:
Smartphone reconnaissance: Operating system identification. CCNC 2016: 1086-1091 - [p1]Jonathan Gurary, Ye Zhu, Riccardo Bettati, Yong Guan:
Operating System Fingerprinting. Digital Fingerprinting 2016: 115-139 - 2014
- [c62]Timothy Nix, Riccardo Bettati:
Neighborhood Failures in Random Topology Covert Communication Networks. ANT/SEIT 2014: 1127-1134 - 2012
- [c61]Timothy Nix, Riccardo Bettati:
Subversion Impedance in Covert Communication Networks. TrustCom 2012: 458-465 - 2011
- [c60]Omar Álvarez-Xochihua, Riccardo Bettati, Lauren Cifuentes, René Mercer:
A Mixed-initiative Intelligent Tutoring System - Based on Learning from Demonstration. CSEDU (1) 2011: 333-339 - 2010
- [j19]Shengquan Wang, Youngwoo Ahn, Riccardo Bettati:
Schedulability analysis in hard real-time systems under thermal constraints. Real Time Syst. 46(2): 160-188 (2010) - [j18]Wei Yu, Nan Zhang, Xinwen Fu, Riccardo Bettati, Wei Zhao:
Localization Attacks to Internet Threat Monitors: Modeling and Countermeasures. IEEE Trans. Computers 59(12): 1655-1668 (2010) - [j17]Shengquan Wang, Dong Xuan, Riccardo Bettati, Wei Zhao:
Toward statistical QoS guarantees in a differentiated services network. Telecommun. Syst. 43(3-4): 253-263 (2010) - [j16]Ye Zhu, Xinwen Fu, Bryan Graham, Riccardo Bettati, Wei Zhao:
Correlation-Based Traffic Analysis Attacks on Anonymity Networks. IEEE Trans. Parallel Distributed Syst. 21(7): 954-967 (2010) - [c59]Riccardo Bettati, Lauren Cifuentes, Willis F. Marti, René Mercer, Youngwoo Ahn, Gaurav Yadav, Omar Álvarez-Xochihua:
Cyber-defense Training in the Real - Design Principles and Architecture of the VNEL Cyber-training Platform. CSEDU (1) 2010: 493-496
2000 – 2009
- 2009
- [j15]SooHyun Cho, Riccardo Bettati:
Use of competition detection in TCP for simple topology networks. Comput. Networks 53(11): 1903-1925 (2009) - [j14]Ye Zhu, Riccardo Bettati:
Compromising anonymous communication systems using blind source separation. ACM Trans. Inf. Syst. Secur. 13(1): 8:1-8:31 (2009) - [j13]Ye Zhu, Riccardo Bettati:
Information Leakage as a Model for Quality of Anonymity Networks. IEEE Trans. Parallel Distributed Syst. 20(4): 540-552 (2009) - [c58]Youngwoo Ahn, Inchoon Yeo, Riccardo Bettati:
Efficient calibration of thermal models based on application behavior. ICCD 2009: 41-46 - 2008
- [j12]Ionut Cardei, Allalaghatta Pavan, Riccardo Bettati:
Quality of Service guarantees and fault-tolerant TCP services in mobile wireless optical networks. Int. J. Ad Hoc Ubiquitous Comput. 3(3): 146-158 (2008) - [j11]Ye Zhu, Xinwen Fu, Riccardo Bettati:
On the Effectiveness of Continuous-Time Mixes under Flow-Correlation Based Anonymity Attacks. Int. J. Netw. Secur. 7(1): 130-140 (2008) - [j10]Shengquan Wang, Riccardo Bettati:
Reactive speed control in temperature-constrained real-time systems. Real Time Syst. 39(1-3): 73-95 (2008) - [j9]Youngwoo Ahn, Riccardo Bettati:
Thermal effects on real-time systems. SIGBED Rev. 5(1): 29 (2008) - [c57]Wei Yu, Nan Zhang, Xinwen Fu, Riccardo Bettati, Wei Zhao:
On localization attacks to Internet Threat Monitors: An information-theoretic framework. DSN 2008: 356-365 - [c56]Youngwoo Ahn, Riccardo Bettati:
Transient Overclocking for Aperiodic Task Execution in Hard Real-Time Systems. ECRTS 2008: 102-111 - 2007
- [j8]Ye Zhu, Xinwen Fu, Riccardo Bettati, Wei Zhao:
Analysis of flow-correlation attacks in anonymity network. Int. J. Secur. Networks 2(1/2): 137-153 (2007) - [c55]Ye Zhu, Riccardo Bettati:
Compromising Location Privacy inWireless Networks Using Sensors with Limited Information. ICDCS 2007: 24 - [c54]Tuneesh Leila, Riccardo Bettati:
Privacy of encrypted voice-over-IP. SMC 2007: 3063-3068 - 2006
- [c53]SooHyun Cho, Riccardo Bettati:
Improving quality of service of TCP flows in strictly prioritized network. ACST 2006: 240-245 - [c52]Ionut Cardei, Allalaghatta Pavan, Riccardo Bettati:
Communications quality of service for ad-hoc mobile optical free-space networks. CCNC 2006: 142-146 - [c51]Shengquan Wang, Riccardo Bettati:
Reactive Speed Control in Temperature-Constrained Real-Time Systems. ECRTS 2006: 161-170 - [c50]SooHyun Cho, Riccardo Bettati:
Use of Competition Detection in TCP for Fair and Effective Utilization of Network Bandwidth. GLOBECOM 2006 - [c49]SooHyun Cho, Riccardo Bettati:
Adaptive Aggregated Aggressiveness Control on Parallel TCP Flows Using Competition Detection. ICCCN 2006: 237-244 - [c48]Shengquan Wang, Riccardo Bettati:
Delay Analysis in Temperature-Constrained Hard Real-Time Systems with General Task Arrivals. RTSS 2006: 323-334 - 2005
- [c47]Ye Zhu, Xinwen Fu, Riccardo Bettati, Wei Zhao:
Anonymity analysis of mix networks against flow-correlation attacks. GLOBECOM 2005: 5 - [c46]SooHyun Cho, Riccardo Bettati:
Collaborative congestion control in parallel TCP flows. ICC 2005: 1026-1030 - [c45]Hongyun Xu, Xinwen Fu, Ye Zhu, Riccardo Bettati, Jianer Chen, Wei Zhao:
SAS: A Scalar Anonymous Communication System. ICCNMC 2005: 452-461 - [c44]Xinwen Fu, Ye Zhu, Bryan Graham, Riccardo Bettati, Wei Zhao:
On Flow Marking Attacks in Wireless Anonymous Communication Networks. ICDCS 2005: 493-503 - [c43]Ye Zhu, Riccardo Bettati:
Anonymity vs. Information Leakage in Anonymity Systems. ICDCS 2005: 514-524 - [c42]Bryan Graham, Ye Zhu, Xinwen Fu, Riccardo Bettati:
Using Covert Channels to Evaluate the Effectiveness of Flow Confidentiality Measures. ICPADS (1) 2005: 57-63 - [c41]Ionut Cardei, Allalaghatta Pavan, Riccardo Bettati:
Architecture for delay-sensitive communications in mobile optical free-space networks. MASS 2005 - [c40]Ye Zhu, Xinwen Fu, Riccardo Bettati:
On the Effectiveness of Continuous-Time Mixes under Flow-Correlation Based Anonymity Attacks. NCA 2005: 215-218 - [c39]SooHyun Cho, Riccardo Bettati:
Aggregated Aggressiveness Control on Groups of TCP Flows. NETWORKING 2005: 586-597 - [c38]Sangig Rho, Byung-Kyu Choi, Riccardo Bettati:
Design Real-Time Java Remote Method Invocation: A Server-Centric Approach. IASTED PDCS 2005: 269-276 - [c37]Ye Zhu, Riccardo Bettati:
Unmixing Mix Traffic. Privacy Enhancing Technologies 2005: 110-127 - [c36]Shengquan Wang, Sangig Rho, Zhibin Mai, Riccardo Bettati, Wei Zhao:
Real-Time Component-Based Systems. IEEE Real-Time and Embedded Technology and Applications Symposium 2005: 428-437 - 2004
- [j7]Shengquan Wang, Dong Xuan, Riccardo Bettati, Wei Zhao:
Providing absolute differentiated services for real-time applications in static-priority scheduling networks. IEEE/ACM Trans. Netw. 12(2): 326-339 (2004) - [j6]Yong Guan, Xinwen Fu, Riccardo Bettati, Wei Zhao:
A quantitative analysis of anonymous communications. IEEE Trans. Reliab. 53(1): 103-115 (2004) - [c35]Shengquan Wang, Ripal Nathuji, Riccardo Bettati, Wei Zhao:
Providing Statistical Delay Guarantees in Wireless Networks. ICDCS 2004: 48-55 - [c34]Xinwen Fu, Bryan Graham, Dong Xuan, Riccardo Bettati, Wei Zhao:
Empirical and Theoretical Evaluation of Active Probing Attacks and Their Countermeasures. Information Hiding 2004: 266-281 - [c33]Byung-Kyu Choi, Sangig Rho, Riccardo Bettati:
Fast Software Component Migration for Applications Survivability in Distributed Real-Time Systems. ISORC 2004: 269-276 - [c32]Ye Zhu, Xinwen Fu, Bryan Graham, Riccardo Bettati, Wei Zhao:
On Flow Correlation Attacks and Countermeasures in Mix Networks. Privacy Enhancing Technologies 2004: 207-225 - 2003
- [j5]Byung-Kyu Choi, Dong Xuan, Riccardo Bettati, Wei Zhao, Chengzhi Li:
Utilization-Based Admission Control for Scalable Real-Time Communication. Real Time Syst. 24(2): 171-202 (2003) - [c31]Wei Yu, Dong Xuan, Sandeep K. Reddy, Riccardo Bettati, Wei Zhao:
Distributed Policy Processing in Virtual Private Operation Environment for Large Scale Networks. IAW 2003: 84-91 - [c30]Xinwen Fu, Bryan Graham, Riccardo Bettati, Wei Zhao:
On Countermeasures to Traffic Analysis Attacks. IAW 2003: 188-195 - [c29]Xinwen Fu, Bryan Graham, Riccardo Bettati, Wei Zhao:
On Effectiveness of Link Padding for Statistical Traffic Analysis Attacks. ICDCS 2003: 340- - [c28]Xinwen Fu, Bryan Graham, Riccardo Bettati, Wei Zhao, Dong Xuan:
Analytical and Empirical Analysis of Countermeasures to Traffic Analysis Attacks. ICPP 2003: 483-492 - [c27]Byung-Kyu Choi, Sangig Rho, Riccardo Bettati:
Dynamic Resource Discovery for Applications Survivability in Distributed Real-Time Systems. IPDPS 2003: 122 - [c26]Shengquan Wang, Dong Xuan, Riccardo Bettati, Wei Zhao:
A Study of Providing Statistical QoS in a Differentiated Sevices Network. NCA 2003: 297-304 - 2002
- [c25]Yong Guan, Xinwen Fu, Riccardo Bettati, Wei Zhao:
An Optimal Strategy for Anonymous Communication Protocols. ICDCS 2002: 257-266 - 2001
- [j4]Yong Guan, Xinwen Fu, Dong Xuan, P. U. Shenoy, Riccardo Bettati, Wei Zhao:
NetCamo: camouflaging network traffic for QoS-guaranteed mission critical applications. IEEE Trans. Syst. Man Cybern. Part A 31(4): 253-265 (2001) - [c24]Byung-Kyu Choi, Riccardo Bettati:
Endpoint Admission Control: Network Based Approach. ICDCS 2001: 227-235 - [c23]Shengquan Wang, Dong Xuan, Riccardo Bettati, Wei Zhao:
Providing Absolute Differentiated Services for Real-Time Application in Static-Priority Scheduling Networks. INFOCOM 2001: 669-678 - [c22]Shengquan Wang, Dong Xuan, Riccardo Bettati, Wei Zhao:
Providing Absolute Differentiated Services with Statistical Guarantees in Static-Priority Scheduling Networks. IEEE Real Time Technology and Applications Symposium 2001: 127-129 - [c21]Shengquan Wang, Dong Xuan, Riccardo Bettati, Wei Zhao:
Differentiated Services with Statistical Real-Time Guarantees in Static-Priority Scheduling Networks. RTSS 2001: 289-298 - 2000
- [c20]Byung-Kyu Choi, Dong Xuan, Chengzhi Li, Riccardo Bettati, Wei Zhao:
Scalable QoS Guaranteed Communication Services for Real-Time Applications. ICDCS 2000: 180-187 - [c19]Gurudatt Shenoy, Suresh K. Satapati, Riccardo Bettati:
HYDRANET-FT: Network Support for Dependable Services. ICDCS 2000: 699-706 - [c18]Dong Xuan, Chengzhi Li, Riccardo Bettati, Jianer Chen, Wei Zhao:
Utilization-Based Admission Control for Real-Time Applications. ICPP 2000: 251-262 - [c17]Byung-Kyu Choi, Riccardo Bettati:
Efficient resource management for hard real-time communication over differentiated services architectures. RTCSA 2000: 119-126 - [c16]Yves Meylan, Aneema Bajpai, Riccardo Bettati:
ProtEx: a toolkit for the analysis of distributed real-time systems. RTCSA 2000: 183-
1990 – 1999
- 1999
- [j3]Hamesh Chawla, Geoff Dillon, Riccardo Bettati:
HydraNet: Network support for scaling of large-scale services. J. Netw. Comput. Appl. 22(1): 33-50 (1999) - [c15]Chengzhi Li, Riccardo Bettati, Wei Zhao:
New Delay Analysis in High Speed Networks. ICPP 1999: 454-461 - [c14]Riccardo Bettati, Wei Zhao, D. Teodor:
Real-time Intrusion Detection and Suppression in ATM Networks. Workshop on Intrusion Detection and Network Monitoring 1999: 111-118 - [c13]B. Devalla, Riccardo Bettati, Wei Zhao:
Fault Tolerant Real-Time Connection Admission Control for Mission Critical Applications over ATM-Based Networks . RTCSA 1999: 340-347 - [c12]Byung-Kyu Choi, Riccardo Bettati:
Bandwidth Reservation for Real Time Traffic in Wireless Mobile Environment. RTCSA 1999: 388- - 1998
- [c11]Hamesh Chawla, Geoff Dillon, Riccardo Bettati:
HYDRANET : Network Support for Scaling of Large-Scale Services. ICCCN 1998: 574-583 - [c10]Chengzhi Li, Riccardo Bettati, Wei Zhao:
Response Time Analysis for Distributed Real-Time Systems with Bursty Job Arrivals. ICPP 1998: 432-440 - 1997
- [c9]Sharad Sundaresan, Riccardo Bettati:
Distributed Connection Management for Real-Time Communication over Wormhole-Routed Networks. ICDCS 1997: 209-216 - [c8]Chengzhi Li, Riccardo Bettati, Wei Zhao:
Static priority scheduling for ATM networks. RTSS 1997: 264-273 - 1996
- [j2]Jane W.-S. Liu, Chung Laung Liu, Zhong Deng, Too-Seng Tia, Jun Sun, Matthew F. Storch, David Hull, J. L. Redondo, Riccardo Bettati, A. Silberman:
Perts: a Prototyping Environment for Real-Time Systems. Int. J. Softw. Eng. Knowl. Eng. 6(2): 161-177 (1996) - [c7]Riccardo Bettati, Amit Gupta:
Dynamic Resource Allocation Migration for Multiparty Real-Time Communications. ICDCS 1996: 646-656 - [c6]Rolf Oppliger, Amit Gupta, Mark Moran, Riccardo Bettati:
A Security Architecture for Tenet Scheme 2. IDMS 1996: 163-174 - 1995
- [c5]Riccardo Bettati, Domenico Ferrari, Amit Gupta, W. Heffner, Wingwai Howe, Mark Moran, Quyen Nguyen, R. Yavatkar:
Connection Establishment for Multi-Party Real-Time Communication. NOSSDAV 1995: 240-250 - 1994
- [j1]Jane W.-S. Liu, Wei-Kuan Shih, Kwei-Jay Lin, Riccardo Bettati, Jen-Yao Chung:
Imprecise computations. Proc. IEEE 82(1): 83-94 (1994) - 1993
- [c4]Riccardo Bettati:
On-Line Scheduling for Checkpointing Imprecise Computation. RTS 1993: 238-243 - [c3]Jane W.-S. Liu, J. L. Redondo, Zhong Deng, Too-Seng Tia, Riccardo Bettati, A. Silberman, Matthew F. Storch, Rhan Ha, Wei-Kuan Shih:
PERTS: A prototyping environment for real-time systems. RTSS 1993: 184-188 - 1992
- [c2]Riccardo Bettati, Jane W.-S. Liu:
End-to-End Scheduling to Meet Deadlines in Distributed Systems. ICDCS 1992: 452-459 - 1990
- [c1]Riccardo Bettati, Jane W.-S. Liu:
Algorithms for end-to-end scheduling to meet deadlines. SPDP 1990: 62-67
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-04-24 22:53 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint