Riccardo Bettati

Orcid: 0000-0002-5877-6667

Affiliations:
  • Texas A&M University, College Station, Texas, USA


According to our database1, Riccardo Bettati authored at least 97 papers between 1990 and 2023.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2023
On Account Association With Assistance From Mobile Networks.
IEEE Trans. Dependable Secur. Comput., 2023

Toward a Multidimensional Analysis of the National Vulnerability Database.
IEEE Access, 2023

A Survey of Wearable Devices Pairing Based on Biometric Signals.
IEEE Access, 2023

An Analysis of War Impact on Ukrainian Critical Infrastructure Through Network Measurements.
Proceedings of the 7th Network Traffic Measurement and Analysis Conference, 2023

2022
An Optimal Energy Efficient Design of Artificial Noise for Preventing Power Leakage based Side-Channel Attacks.
CoRR, 2022

Breathe-to-Pair (B2P): Respiration-Based Pairing Protocol for Wearable Devices.
Proceedings of the WiSec '22: 15th ACM Conference on Security and Privacy in Wireless and Mobile Networks, San Antonio, TX, USA, May 16, 2022

Optimal Energy Efficient Design of Artificial Noise to Prevent Side-Channel Attacks.
Proceedings of the IEEE International Workshop on Information Forensics and Security, 2022

2021
Towards Smartphone Operating System Identification.
IEEE Trans. Dependable Secur. Comput., 2021

Breath to Pair (B2P): Respiration-Based Pairing Protocol for Wearable Devices.
CoRR, 2021

Efficient side-channel attacks beyond divide-and-conquer strategy.
Comput. Networks, 2021

Connect Id: Identifying Devices Before They Connect to the Network.
Proceedings of the 7th IEEE World Forum on Internet of Things, 2021

Identifying Account Association with Assistance from Mobile Networks using Cross-Service Attacks.
Proceedings of the ICC 2021, 2021

2020
Reinforcement-Based Divide-and-Conquer Strategy for Side-Channel Attacks.
Proceedings of the 12th IEEE International Workshop on Information Forensics and Security, 2020

2018
Adaptive Channel Estimation in Side Channel Attacks.
Proceedings of the 2018 IEEE International Workshop on Information Forensics and Security, 2018

IoTAegis: A Scalable Framework to Secure the Internet of Things.
Proceedings of the 27th International Conference on Computer Communication and Networks, 2018

2017
Securing cyber-physical systems with adaptive commensurate response.
Proceedings of the 2017 IEEE Conference on Communications and Network Security, 2017

2016
Neighbourhood failures in covert communication network topologies.
Int. J. Comput. Sci. Eng., 2016

Smartphone reconnaissance: Operating system identification.
Proceedings of the 13th IEEE Annual Consumer Communications & Networking Conference, 2016

Operating System Fingerprinting.
Proceedings of the Digital Fingerprinting, 2016

2014
Neighborhood Failures in Random Topology Covert Communication Networks.
Proceedings of the 5th International Conference on Ambient Systems, 2014

2012
Subversion Impedance in Covert Communication Networks.
Proceedings of the 11th IEEE International Conference on Trust, 2012

2011
A Mixed-initiative Intelligent Tutoring System - Based on Learning from Demonstration.
Proceedings of the CSEDU 2011, 2011

2010
Correlation-Based Traffic Analysis Attacks on Anonymity Networks.
IEEE Trans. Parallel Distributed Syst., 2010

Toward statistical QoS guarantees in a differentiated services network.
Telecommun. Syst., 2010

Localization Attacks to Internet Threat Monitors: Modeling and Countermeasures.
IEEE Trans. Computers, 2010

Schedulability analysis in hard real-time systems under thermal constraints.
Real Time Syst., 2010

Cyber-defense Training in the Real - Design Principles and Architecture of the VNEL Cyber-training Platform.
Proceedings of the CSEDU 2010 - Proceedings of the Second International Conference on Computer Supported Education, Valencia, Spain, April 7-10, 2010, 2010

2009
Information Leakage as a Model for Quality of Anonymity Networks.
IEEE Trans. Parallel Distributed Syst., 2009

Compromising anonymous communication systems using blind source separation.
ACM Trans. Inf. Syst. Secur., 2009

Use of competition detection in TCP for simple topology networks.
Comput. Networks, 2009

Efficient calibration of thermal models based on application behavior.
Proceedings of the 27th International Conference on Computer Design, 2009

2008
Thermal effects on real-time systems.
SIGBED Rev., 2008

Reactive speed control in temperature-constrained real-time systems.
Real Time Syst., 2008

On the Effectiveness of Continuous-Time Mixes under Flow-Correlation Based Anonymity Attacks.
Int. J. Netw. Secur., 2008

Quality of Service guarantees and fault-tolerant TCP services in mobile wireless optical networks.
Int. J. Ad Hoc Ubiquitous Comput., 2008

Transient Overclocking for Aperiodic Task Execution in Hard Real-Time Systems.
Proceedings of the 20th Euromicro Conference on Real-Time Systems, 2008

On localization attacks to Internet Threat Monitors: An information-theoretic framework.
Proceedings of the 38th Annual IEEE/IFIP International Conference on Dependable Systems and Networks, 2008

2007
Analysis of flow-correlation attacks in anonymity network.
Int. J. Secur. Networks, 2007

Privacy of encrypted voice-over-IP.
Proceedings of the IEEE International Conference on Systems, 2007

Compromising Location Privacy inWireless Networks Using Sensors with Limited Information.
Proceedings of the 27th IEEE International Conference on Distributed Computing Systems (ICDCS 2007), 2007

2006
Delay Analysis in Temperature-Constrained Hard Real-Time Systems with General Task Arrivals.
Proceedings of the 27th IEEE Real-Time Systems Symposium (RTSS 2006), 2006

Adaptive Aggregated Aggressiveness Control on Parallel TCP Flows Using Competition Detection.
Proceedings of the 15th International Conference On Computer Communications and Networks, 2006

Use of Competition Detection in TCP for Fair and Effective Utilization of Network Bandwidth.
Proceedings of the Global Telecommunications Conference, 2006. GLOBECOM '06, San Francisco, CA, USA, 27 November, 2006

Communications quality of service for ad-hoc mobile optical free-space networks.
Proceedings of the 3rd IEEE Consumer Communications and Networking Conference, 2006

Improving quality of service of TCP flows in strictly prioritized network.
Proceedings of the IASTED International Conference on Advances in Computer Science and Technology, 2006

2005
Real-Time Component-Based Systems.
Proceedings of the 11th IEEE Real-Time and Embedded Technology and Applications Symposium (RTAS 2005), 2005

Unmixing Mix Traffic.
Proceedings of the Privacy Enhancing Technologies, 5th International Workshop, 2005

Design Real-Time Java Remote Method Invocation: A Server-Centric Approach.
Proceedings of the International Conference on Parallel and Distributed Computing Systems, 2005

Aggregated Aggressiveness Control on Groups of TCP Flows.
Proceedings of the NETWORKING 2005: Networking Technologies, 2005

Architecture for delay-sensitive communications in mobile optical free-space networks.
Proceedings of the IEEE 2nd International Conference on Mobile Adhoc and Sensor Systems, 2005

Using Covert Channels to Evaluate the Effectiveness of Flow Confidentiality Measures.
Proceedings of the 11th International Conference on Parallel and Distributed Systems, 2005

Anonymity vs. Information Leakage in Anonymity Systems.
Proceedings of the 25th International Conference on Distributed Computing Systems (ICDCS 2005), 2005

On Flow Marking Attacks in Wireless Anonymous Communication Networks.
Proceedings of the 25th International Conference on Distributed Computing Systems (ICDCS 2005), 2005

SAS: A Scalar Anonymous Communication System.
Proceedings of the Networking and Mobile Computing, Third International Conference, 2005

Collaborative congestion control in parallel TCP flows.
Proceedings of IEEE International Conference on Communications, 2005

Anonymity analysis of mix networks against flow-correlation attacks.
Proceedings of the Global Telecommunications Conference, 2005. GLOBECOM '05, St. Louis, Missouri, USA, 28 November, 2005

2004
A quantitative analysis of anonymous communications.
IEEE Trans. Reliab., 2004

Providing absolute differentiated services for real-time applications in static-priority scheduling networks.
IEEE/ACM Trans. Netw., 2004

On Flow Correlation Attacks and Countermeasures in Mix Networks.
Proceedings of the Privacy Enhancing Technologies, 4th International Workshop, 2004

Fast Software Component Migration for Applications Survivability in Distributed Real-Time Systems.
Proceedings of the 7th IEEE International Symposium on Object-Oriented Real-Time Distributed Computing (ISORC 2004), 2004

Empirical and Theoretical Evaluation of Active Probing Attacks and Their Countermeasures.
Proceedings of the Information Hiding, 6th International Workshop, 2004

Providing Statistical Delay Guarantees in Wireless Networks.
Proceedings of the 24th International Conference on Distributed Computing Systems (ICDCS 2004), 2004

2003
Utilization-Based Admission Control for Scalable Real-Time Communication.
Real Time Syst., 2003

A Study of Providing Statistical QoS in a Differentiated Sevices Network.
Proceedings of the 2nd IEEE International Symposium on Network Computing and Applications (NCA 2003), 2003

Dynamic Resource Discovery for Applications Survivability in Distributed Real-Time Systems.
Proceedings of the 17th International Parallel and Distributed Processing Symposium (IPDPS 2003), 2003

Analytical and Empirical Analysis of Countermeasures to Traffic Analysis Attacks.
Proceedings of the 32nd International Conference on Parallel Processing (ICPP 2003), 2003

On Effectiveness of Link Padding for Statistical Traffic Analysis Attacks.
Proceedings of the 23rd International Conference on Distributed Computing Systems (ICDCS 2003), 2003

Distributed Policy Processing in Virtual Private Operation Environment for Large Scale Networks.
Proceedings of the IEEE Systems, 2003

On Countermeasures to Traffic Analysis Attacks.
Proceedings of the IEEE Systems, 2003

2002
An Optimal Strategy for Anonymous Communication Protocols.
Proceedings of the 22nd International Conference on Distributed Computing Systems (ICDCS'02), 2002

2001
NetCamo: camouflaging network traffic for QoS-guaranteed mission critical applications.
IEEE Trans. Syst. Man Cybern. Part A, 2001

Differentiated Services with Statistical Real-Time Guarantees in Static-Priority Scheduling Networks.
Proceedings of the 22nd IEEE Real-Time Systems Symposium (RTSS 2001), 2001

Providing Absolute Differentiated Services with Statistical Guarantees in Static-Priority Scheduling Networks.
Proceedings of the 7th IEEE Real-Time Technology and Applications Symposium (RTAS 2001), 30 May, 2001

Providing Absolute Differentiated Services for Real-Time Application in Static-Priority Scheduling Networks.
Proceedings of the Proceedings IEEE INFOCOM 2001, 2001

Endpoint Admission Control: Network Based Approach.
Proceedings of the 21st International Conference on Distributed Computing Systems (ICDCS 2001), 2001

2000
ProtEx: a toolkit for the analysis of distributed real-time systems.
Proceedings of the 7th International Workshop on Real-Time Computing and Applications Symposium (RTCSA 2000), 2000

Efficient resource management for hard real-time communication over differentiated services architectures.
Proceedings of the 7th International Workshop on Real-Time Computing and Applications Symposium (RTCSA 2000), 2000

Utilization-Based Admission Control for Real-Time Applications.
Proceedings of the 2000 International Conference on Parallel Processing, 2000

HYDRANET-FT: Network Support for Dependable Services.
Proceedings of the 20th International Conference on Distributed Computing Systems, 2000

Scalable QoS Guaranteed Communication Services for Real-Time Applications.
Proceedings of the 20th International Conference on Distributed Computing Systems, 2000

1999
HydraNet: Network support for scaling of large-scale services.
J. Netw. Comput. Appl., 1999

Fault Tolerant Real-Time Connection Admission Control for Mission Critical Applications over ATM-Based Networks .
Proceedings of the 6th International Workshop on Real-Time Computing and Applications Symposium (RTCSA '99), 1999

Bandwidth Reservation for Real Time Traffic in Wireless Mobile Environment.
Proceedings of the 6th International Workshop on Real-Time Computing and Applications Symposium (RTCSA '99), 1999

Real-time Intrusion Detection and Suppression in ATM Networks.
Proceedings of the Workshop on Intrusion Detection and Network Monitoring, 1999

New Delay Analysis in High Speed Networks.
Proceedings of the International Conference on Parallel Processing 1999, 1999

1998
Response Time Analysis for Distributed Real-Time Systems with Bursty Job Arrivals.
Proceedings of the 1998 International Conference on Parallel Processing (ICPP '98), 1998

1997
Static priority scheduling for ATM networks.
Proceedings of the 18th IEEE Real-Time Systems Symposium (RTSS '97), 1997

Distributed Connection Management for Real-Time Communication over Wormhole-Routed Networks.
Proceedings of the 17th International Conference on Distributed Computing Systems, 1997

1996
Perts: a Prototyping Environment for Real-Time Systems.
Int. J. Softw. Eng. Knowl. Eng., 1996

A Security Architecture for Tenet Scheme 2.
Proceedings of the Interactive Distributed Multimedia Systems and Services, 1996

Dynamic Resource Allocation Migration for Multiparty Real-Time Communications.
Proceedings of the 16th International Conference on Distributed Computing Systems, 1996

1995
Connection Establishment for Multi-Party Real-Time Communication.
Proceedings of the Network and Operating System Support for Digital Audio and Video, 1995

1994
Imprecise computations.
Proc. IEEE, 1994

1993
PERTS: A prototyping environment for real-time systems.
Proceedings of the Real-Time Systems Symposium. Raleigh-Durham, NC, USA, December 1993, 1993

On-Line Scheduling for Checkpointing Imprecise Computation.
Proceedings of the Fifth Euromicro Workshop on Real-Time Systems, 1993

1992
End-to-End Scheduling to Meet Deadlines in Distributed Systems.
Proceedings of the 12th International Conference on Distributed Computing Systems, 1992

1990
Algorithms for end-to-end scheduling to meet deadlines.
Proceedings of the Second IEEE Symposium on Parallel and Distributed Processing, 1990


  Loading...