Vincenzo Fioriti

Learn More
The epidemic spreading of a disease can be described by a contact network whose nodes are persons or centers of contagion and links heterogeneous relations among them. We provide a procedure to identify multiple sources of an outbreak or their closer neighbors. Our methodology is based on a simple spectral technique requiring only the knowledge of the(More)
We derive a Kuramoto-like equation from the Cardell-Ilic distributed electrical generation network and use the resulting model to simulate the phase stability and the synchronization of a small electrical grid. In our model nodes are arranged in a regular lattice; the strength of their couplings are randomly chosen and allowed to vary as square waves.(More)
The basic inverse problem in spectral graph theory consists in determining the graph given its eigenvalue spectrum. In this paper, we are interested in a network of technological agents whose graph is unknown, communicating by means of a consensus protocol. Recently, the use of artificial noise added to consensus signals has been proposed to reconstruct the(More)
— During the last years man efforts have been devoted to inspect the interdependence among Critical Infrastructures. Even assuming that the asset owners are supposed to handle their own possible misbehaviours properly, critical events maybe triggered by infrastructure's interactions. Therefore the need to handle and possibly measure inter-dependencies.(More)
– Identifying the nodes of small sub-graphs with no a priori information is a hard problem. In this work, we want to find each node of a sparse sub-graph embedded in both dynamic and static background graphs, of larger average degree. We show that exploiting the summability over several background realizations of the Estrada-Benzi communicability and the(More)
—The spreading of dangerous malware or faults in interdependent networks of electronics devices has raised deep concern, because from the ICT networks infections may propagate to other Critical Infrastructures producing the well-known domino or cascading effect. Researchers are attempting to develop a high level analysis of malware propagation discarding(More)