(500) Http failure response for https://api.library.tamu.edu/scholars-discovery/individual/search/advanced?page=1&size=10db%22w%27teics&sort=name,asc&class.filter=Person&class.opKey=EQUALS&researchAreas.filter=Education&researchAreas.opKey=EQUALS&filters=class%2CresearchAreas&type.type=STRING&type.pageSize=10db%22w%27teics&type.pageNumber=1&type.sort=COUNT,DESC&positionOrganization.type=STRING&positionOrganization.pageSize=10db%22w%27teics&positionOrganization.pageNumber=1&positionOrganization.sort=INDEX,ASC&researchAreas.type=STRING&researchAreas.pageSize=10db%22w%27teics&researchAreas.pageNumber=1&researchAreas.sort=COUNT,DESC&researchAreas.filter=Education&facets=type%2CpositionOrganization%2CresearchAreas: 500 Internal Server Error
Bettati, Riccardo individual record
Professor - Term Appointment
education and training
selected publications
Academic Articles30
  • Gurary, J., Zhu, Y. e., Bettati, R., & Guan, Y. (2016). Operating System Fingerprinting. Wang, C., Gerdes, R. M., Guan, Y., & Kasera, S. K. (Eds.), Digital Fingerprinting. (pp. 115-139). Springer New York.
    doi badge online source badge
  • Wang, S., Nathuji, R., Bettati, R., & Zhao, W. (2005). Real-Time Guarantees in Wireless Networks. Resource Management in Wireless Networking. (pp. 81-102). Kluwer Academic Publishers.
    doi badge
  • Liu, J., Lin, K., Bettati, R., Hull, D., & Yu, A. (1994). Use of Imprecise Computation to Enhance Dependability of Real-Time Systems. Foundations of Dependable Computing. (pp. 157-182). Springer Us.
    doi badge
Conference Papers80
  • Jin, S., & Bettati, R. (2018). Adaptive Channel Estimation in Side Channel Attacks. 2018 10TH IEEE INTERNATIONAL WORKSHOP ON INFORMATION FORENSICS AND SECURITY (WIFS). 00, 1-7.
    doi badge online source badge
  • Zheng, Z., Webb, A., Reddy, A., Bettati, R., & IEEE, .. (2018). IoTAegis: A Scalable Framework to Secure the Internet of Things. 7TH INTERNATIONAL CONFERENCE ON COMPUTER COMMUNICATIONS AND NETWORKS - PROCEEDINGS. 2018-July,
    doi badge
  • Zheng, Z., Jin, S., Bettati, R., Reddy, A., & IEEE, .. (2017). Securing Cyber-Physical Systems with Adaptive Commensurate Response. 2016 IEEE CONFERENCE ON COMMUNICATIONS AND NETWORK SECURITY (CNS). 155-163.
  • Zheng, Z., Jin, S., Bettati, R., & Reddy, A. (2017). Securing cyber-physical systems with adaptive commensurate response. 2017-January, 1-9.
    doi badge
  • Ruffing, N., Zhu, Y. e., Libertini, R., Guan, Y., & Bettati, R. (2016). Smartphone Reconnaissance: Operating System Identification. 1086-1091.
    doi badge online source badge
chaired theses and dissertations
First Name
Last Name
mailing address
Texas A&M University; Computer Science & Engineering; 3112 TAMU
College Station, TX 77843-3112