Vincenzo Fioriti - Academia.edu (original) (raw)

Uploads

Papers by Vincenzo Fioriti

Research paper thumbnail of Networks to Stop the Epidemic Spreading

Lecture Notes in Computer Science, 2021

Research paper thumbnail of The topological defense in SIS epidemic models

Chaos, Solitons & Fractals, 2016

Research paper thumbnail of The Complexity Science Approach vs. the Simulative Approach

Critical Information Infrastructure Protection and Resilience in the ICT Sector, 2013

Research paper thumbnail of Definition of a Metric for ICT-PS infrastructures

Research paper thumbnail of Stability of a model of power microgeneration network using the Kuramoto model

International Journal of System of Systems Engineering, 2010

ABSTRACT Most of critical infrastructures (CIs) depend on the power system. The predictable onset... more ABSTRACT Most of critical infrastructures (CIs) depend on the power system. The predictable onset of a microgeneration paradigm (many dispersed small generators of medium-low power) will considerably decrease network stability and thus increase risk of failures and other's infrastructures dependence. In order to study the stability of synchronisation in a power microgeneration scenario, we derive the Kuramoto equation from the 'swing' equation of the electrical generator and use the resulting model to simulate the phase stability and the synchronisation of a very small electrical grid. In our model, nodes are arranged in a regular lattice; the strength of their couplings is randomly chosen and allowed to vary as square waves. Although the system undergoes several synchronisation losses, nevertheless it is able to quickly resynchronise. Moreover, we show that the synchronisation rising-time follows a power-law.

Research paper thumbnail of Methodologies for inter-dependency assessment

2010 5th International Conference on Critical Infrastructure (CRIS), 2010

... The functional interdependency does not concern low-level elements interaction and others mec... more ... The functional interdependency does not concern low-level elements interaction and others mechanisms that are ... Parameters [a], [b] and [c] cover the three main inter dependency types and are the basis ... Similarly to the pure wired case, we may estimate the impact of any pair of ...

Research paper thumbnail of On Modeling and Measuring Inter-dependencies among Critical Infrastructures

2010 Complexity in Engineering, 2010

During the last years man efforts have been devoted to inspect the inter-dependence among Critica... more During the last years man efforts have been devoted to inspect the inter-dependence among Critical Infrastructures. Even assuming that the asset owners are supposed to handle their own possible misbehaviours properly, critical events maybe triggered by infrastructure's interactions. Therefore the need to handle and possibly measure inter-dependencies. Within this perspective, the EU funded MIA Project which basic aim is to assess some measures to quantify inter-dependencies among Critical Infrastructures (energy and ICT networks) for the topological and the service level. We report recent outcomes of that project based on topological information and especially on spectral analysis that can be related to dynamical properties of the electric and telecommunication systems. A topological concepts of "Relevance" is applied for the first time to the real electric network of Roma area.

Research paper thumbnail of Expanding the Time Horizon in Underwater Robot Swarms

Advances in Artificial Life, ECAL 2013, 2013

In this paper we study the time delays affecting the diffusion of information in an underwater he... more In this paper we study the time delays affecting the diffusion of information in an underwater heterogeneous robot swarm, considering a time-sensitive environment. In many situations each member of the swarm must update its knowledge about the environment as soon as possible, thus every effort to expand the knowledge horizon is useful. Otherwise critical information may not reach nodes far from the source causing dangerous misbehaviour of the swarm. We consider two extreme situations. In the first scenario we have an unique probabilistic delay distribution. In the second scenario, each agent is subject to a different truncated gaussian distribution, meaning local conditions are significantly different from link to link. We study how several swarm topologies react to the two scenarios and how to allocate the more efficient transmission resources in order to expand the horizon. Results show that significant time savings under a gossip-like protocol are possible properly allocating the resources. Moreover, methods to determine the fastest swarm topologies and the most important nodes are suggested.

Research paper thumbnail of Levy Foraging in a Dynamic Environment – Extending the Levy Search

International Journal of Advanced Robotic Systems, 2015

Research paper thumbnail of The synchronization of Kuramoto oscillator networks: forecasting financial index critical points

Organizations can be modeled as complex systems. Here we consider complex economic organizations ... more Organizations can be modeled as complex systems. Here we consider complex economic organizations such as the stock exchange and show that the Kuramoto equation is a suitable model to forecast maxima or minima of the financial signals.

Research paper thumbnail of Levy flight search of moving objects

A Levy flight is a particular case of the random walk.

Research paper thumbnail of Sub-optimal Topological Protection Strategy from Advanced Malware

Lecture Notes in Computer Science, 2013

Research paper thumbnail of Inter-dependency Assessment in the ICT-PS Network: The MIA Project Results

Lecture Notes in Computer Science, 2011

... Emiliano Casalicchio1, Sandro Bologna2, Luigi Brasca3, Stefano Buschi4, Emanuele Ciapessoni3,... more ... Emiliano Casalicchio1, Sandro Bologna2, Luigi Brasca3, Stefano Buschi4, Emanuele Ciapessoni3,Gregorio D'Agostino2, Vincenzo Fioriti2, and Federico ... By the application of the Mason's formula (which computes the transfer functions regarding the input signals and the output ...

Research paper thumbnail of The Complexity Science Approach vs. the Simulative Approach

Research paper thumbnail of On Modeling and Measuring Inter-dependencies among Critical Infrastructures

2010 Complexity in Engineering, 2010

... ACKNOWLEDGEMENTS Authors gratefully thank E. Ciapessoni, C. Brasca, M. Sforna, S. Buschi, R. ... more ... ACKNOWLEDGEMENTS Authors gratefully thank E. Ciapessoni, C. Brasca, M. Sforna, S. Buschi, R. Setola, G. Condorelli, C. Caruso, S. Caracò, B. Di Carlo, E. Casalicchio, G. Fiorenza, and all co-workers of the MIA Project. ... 09; M. Porfiri, DJ Stilwell, and EM Bollt, IEEE Trans. ...

Research paper thumbnail of New mathematical models for fetal heart rate evaluation

Research paper thumbnail of Analisi frattale della frequenza cardiaca fetale

Research paper thumbnail of Discriminating chaotic time series with visibility graph eigenvalues

Time series can be transformed in graphs called horizontal visibility graphs in order to gain use... more Time series can be transformed in graphs called horizontal visibility graphs in order to gain useful insights. Here the maximum eigenvalue of the adjacency matrix associated to the horizontal visibility graph, derived from several time series is calculated. The maximum eigenvalue methodology is able to discriminate between chaos and randomness and is suitable for short time series, hence for experimental results. An application to the US Gross Domestic Product data is given.

Research paper thumbnail of CRITIS 11 Conference Lucerne 2011, “Sub-optimal Topological Protection Strategy from Advanced Malware”, Andrea Arbore and Vincenzo Fioriti, (selected paper for LNCS Springer special number on the CRITIS '11 Conference)

Research paper thumbnail of Topological security assessment of technological networks

The spreading of dangerous malware in inter-dependent networks of electronics devices has raised ... more The spreading of dangerous malware in inter-dependent networks of electronics devices has raised deep concern, because from the ICT networks infections may propagate to other Critical Infrastructures producing the well-known domino effect. Researchers are attempting to develop a high level analysis of malware propagation, discarding software details, in order to generalize to the maximum extent the defensive strategies. It has been suggested that the maximum eigenvalue could act as a threshold for the malware spreading. This paper presents a new proof of this statement and an original way to classify the max eigenvalue minimization problem (NP-hard). A study of the Italian Internet Autonomous System verifying the theoretical threshold is shown. Finally, it shows how to stop a worm in a real LAN using a new sub-optimal algorithm. Such algorithm suggests which nodes to protect for limiting the worm diffusion according to the spectral paradigm.

Research paper thumbnail of Networks to Stop the Epidemic Spreading

Lecture Notes in Computer Science, 2021

Research paper thumbnail of The topological defense in SIS epidemic models

Chaos, Solitons & Fractals, 2016

Research paper thumbnail of The Complexity Science Approach vs. the Simulative Approach

Critical Information Infrastructure Protection and Resilience in the ICT Sector, 2013

Research paper thumbnail of Definition of a Metric for ICT-PS infrastructures

Research paper thumbnail of Stability of a model of power microgeneration network using the Kuramoto model

International Journal of System of Systems Engineering, 2010

ABSTRACT Most of critical infrastructures (CIs) depend on the power system. The predictable onset... more ABSTRACT Most of critical infrastructures (CIs) depend on the power system. The predictable onset of a microgeneration paradigm (many dispersed small generators of medium-low power) will considerably decrease network stability and thus increase risk of failures and other's infrastructures dependence. In order to study the stability of synchronisation in a power microgeneration scenario, we derive the Kuramoto equation from the 'swing' equation of the electrical generator and use the resulting model to simulate the phase stability and the synchronisation of a very small electrical grid. In our model, nodes are arranged in a regular lattice; the strength of their couplings is randomly chosen and allowed to vary as square waves. Although the system undergoes several synchronisation losses, nevertheless it is able to quickly resynchronise. Moreover, we show that the synchronisation rising-time follows a power-law.

Research paper thumbnail of Methodologies for inter-dependency assessment

2010 5th International Conference on Critical Infrastructure (CRIS), 2010

... The functional interdependency does not concern low-level elements interaction and others mec... more ... The functional interdependency does not concern low-level elements interaction and others mechanisms that are ... Parameters [a], [b] and [c] cover the three main inter dependency types and are the basis ... Similarly to the pure wired case, we may estimate the impact of any pair of ...

Research paper thumbnail of On Modeling and Measuring Inter-dependencies among Critical Infrastructures

2010 Complexity in Engineering, 2010

During the last years man efforts have been devoted to inspect the inter-dependence among Critica... more During the last years man efforts have been devoted to inspect the inter-dependence among Critical Infrastructures. Even assuming that the asset owners are supposed to handle their own possible misbehaviours properly, critical events maybe triggered by infrastructure's interactions. Therefore the need to handle and possibly measure inter-dependencies. Within this perspective, the EU funded MIA Project which basic aim is to assess some measures to quantify inter-dependencies among Critical Infrastructures (energy and ICT networks) for the topological and the service level. We report recent outcomes of that project based on topological information and especially on spectral analysis that can be related to dynamical properties of the electric and telecommunication systems. A topological concepts of "Relevance" is applied for the first time to the real electric network of Roma area.

Research paper thumbnail of Expanding the Time Horizon in Underwater Robot Swarms

Advances in Artificial Life, ECAL 2013, 2013

In this paper we study the time delays affecting the diffusion of information in an underwater he... more In this paper we study the time delays affecting the diffusion of information in an underwater heterogeneous robot swarm, considering a time-sensitive environment. In many situations each member of the swarm must update its knowledge about the environment as soon as possible, thus every effort to expand the knowledge horizon is useful. Otherwise critical information may not reach nodes far from the source causing dangerous misbehaviour of the swarm. We consider two extreme situations. In the first scenario we have an unique probabilistic delay distribution. In the second scenario, each agent is subject to a different truncated gaussian distribution, meaning local conditions are significantly different from link to link. We study how several swarm topologies react to the two scenarios and how to allocate the more efficient transmission resources in order to expand the horizon. Results show that significant time savings under a gossip-like protocol are possible properly allocating the resources. Moreover, methods to determine the fastest swarm topologies and the most important nodes are suggested.

Research paper thumbnail of Levy Foraging in a Dynamic Environment – Extending the Levy Search

International Journal of Advanced Robotic Systems, 2015

Research paper thumbnail of The synchronization of Kuramoto oscillator networks: forecasting financial index critical points

Organizations can be modeled as complex systems. Here we consider complex economic organizations ... more Organizations can be modeled as complex systems. Here we consider complex economic organizations such as the stock exchange and show that the Kuramoto equation is a suitable model to forecast maxima or minima of the financial signals.

Research paper thumbnail of Levy flight search of moving objects

A Levy flight is a particular case of the random walk.

Research paper thumbnail of Sub-optimal Topological Protection Strategy from Advanced Malware

Lecture Notes in Computer Science, 2013

Research paper thumbnail of Inter-dependency Assessment in the ICT-PS Network: The MIA Project Results

Lecture Notes in Computer Science, 2011

... Emiliano Casalicchio1, Sandro Bologna2, Luigi Brasca3, Stefano Buschi4, Emanuele Ciapessoni3,... more ... Emiliano Casalicchio1, Sandro Bologna2, Luigi Brasca3, Stefano Buschi4, Emanuele Ciapessoni3,Gregorio D'Agostino2, Vincenzo Fioriti2, and Federico ... By the application of the Mason's formula (which computes the transfer functions regarding the input signals and the output ...

Research paper thumbnail of The Complexity Science Approach vs. the Simulative Approach

Research paper thumbnail of On Modeling and Measuring Inter-dependencies among Critical Infrastructures

2010 Complexity in Engineering, 2010

... ACKNOWLEDGEMENTS Authors gratefully thank E. Ciapessoni, C. Brasca, M. Sforna, S. Buschi, R. ... more ... ACKNOWLEDGEMENTS Authors gratefully thank E. Ciapessoni, C. Brasca, M. Sforna, S. Buschi, R. Setola, G. Condorelli, C. Caruso, S. Caracò, B. Di Carlo, E. Casalicchio, G. Fiorenza, and all co-workers of the MIA Project. ... 09; M. Porfiri, DJ Stilwell, and EM Bollt, IEEE Trans. ...

Research paper thumbnail of New mathematical models for fetal heart rate evaluation

Research paper thumbnail of Analisi frattale della frequenza cardiaca fetale

Research paper thumbnail of Discriminating chaotic time series with visibility graph eigenvalues

Time series can be transformed in graphs called horizontal visibility graphs in order to gain use... more Time series can be transformed in graphs called horizontal visibility graphs in order to gain useful insights. Here the maximum eigenvalue of the adjacency matrix associated to the horizontal visibility graph, derived from several time series is calculated. The maximum eigenvalue methodology is able to discriminate between chaos and randomness and is suitable for short time series, hence for experimental results. An application to the US Gross Domestic Product data is given.

Research paper thumbnail of CRITIS 11 Conference Lucerne 2011, “Sub-optimal Topological Protection Strategy from Advanced Malware”, Andrea Arbore and Vincenzo Fioriti, (selected paper for LNCS Springer special number on the CRITIS '11 Conference)

Research paper thumbnail of Topological security assessment of technological networks

The spreading of dangerous malware in inter-dependent networks of electronics devices has raised ... more The spreading of dangerous malware in inter-dependent networks of electronics devices has raised deep concern, because from the ICT networks infections may propagate to other Critical Infrastructures producing the well-known domino effect. Researchers are attempting to develop a high level analysis of malware propagation, discarding software details, in order to generalize to the maximum extent the defensive strategies. It has been suggested that the maximum eigenvalue could act as a threshold for the malware spreading. This paper presents a new proof of this statement and an original way to classify the max eigenvalue minimization problem (NP-hard). A study of the Italian Internet Autonomous System verifying the theoretical threshold is shown. Finally, it shows how to stop a worm in a real LAN using a new sub-optimal algorithm. Such algorithm suggests which nodes to protect for limiting the worm diffusion according to the spectral paradigm.