Adding existing work
This commit is contained in:
parent
d2aadbb1a0
commit
89dd5bec06
63
Appendices.aux
Normal file
63
Appendices.aux
Normal file
@ -0,0 +1,63 @@
|
|||||||
|
\relax
|
||||||
|
\providecommand\hyper@newdestlabel[2]{}
|
||||||
|
\@writefile{toc}{\contentsline {section}{\numberline {A}HIPAA Results}{19}{appendix.A}\protected@file@percent }
|
||||||
|
\newlabel{apx:hipaa}{{A}{19}{HIPAA Results}{appendix.A}{}}
|
||||||
|
\@writefile{lot}{\contentsline {table}{\numberline {7}{\ignorespaces Top 15 Nodes with Degree Centrality\relax }}{20}{table.caption.12}\protected@file@percent }
|
||||||
|
\newlabel{table:hipaa-degree}{{7}{20}{Top 15 Nodes with Degree Centrality\relax }{table.caption.12}{}}
|
||||||
|
\@writefile{lot}{\contentsline {table}{\numberline {8}{\ignorespaces Top 15 Nodes with Katz Centrality\relax }}{20}{table.caption.13}\protected@file@percent }
|
||||||
|
\newlabel{table:hipaa-katz}{{8}{20}{Top 15 Nodes with Katz Centrality\relax }{table.caption.13}{}}
|
||||||
|
\@writefile{lot}{\contentsline {table}{\numberline {9}{\ignorespaces Top 15 Nodes with K-path Edge Centrality\relax }}{21}{table.caption.14}\protected@file@percent }
|
||||||
|
\newlabel{table:hipaa-kpe}{{9}{21}{Top 15 Nodes with K-path Edge Centrality\relax }{table.caption.14}{}}
|
||||||
|
\@writefile{lot}{\contentsline {table}{\numberline {10}{\ignorespaces Top 15 Nodes with PageRank Centrality\relax }}{21}{table.caption.15}\protected@file@percent }
|
||||||
|
\newlabel{table:hipaa-APC}{{10}{21}{Top 15 Nodes with PageRank Centrality\relax }{table.caption.15}{}}
|
||||||
|
\@writefile{lot}{\contentsline {table}{\numberline {11}{\ignorespaces Top 15 Nodes with Betweenness Centrality\relax }}{22}{table.caption.16}\protected@file@percent }
|
||||||
|
\newlabel{table:hipaa-btwn}{{11}{22}{Top 15 Nodes with Betweenness Centrality\relax }{table.caption.16}{}}
|
||||||
|
\@writefile{lot}{\contentsline {table}{\numberline {12}{\ignorespaces Top 15 Nodes with Degree Centrality\relax }}{23}{table.caption.17}\protected@file@percent }
|
||||||
|
\newlabel{table:pci-deg}{{12}{23}{Top 15 Nodes with Degree Centrality\relax }{table.caption.17}{}}
|
||||||
|
\@writefile{toc}{\contentsline {section}{\numberline {B}PCI DSS Results}{23}{appendix.B}\protected@file@percent }
|
||||||
|
\newlabel{apx:pci}{{B}{23}{PCI DSS Results}{appendix.B}{}}
|
||||||
|
\@writefile{lot}{\contentsline {table}{\numberline {13}{\ignorespaces Top 15 Nodes with Katz Centrality\relax }}{24}{table.caption.18}\protected@file@percent }
|
||||||
|
\newlabel{table:pci-katz}{{13}{24}{Top 15 Nodes with Katz Centrality\relax }{table.caption.18}{}}
|
||||||
|
\@writefile{lot}{\contentsline {table}{\numberline {14}{\ignorespaces Top 15 Nodes with K-path Edge Centrality\relax }}{24}{table.caption.19}\protected@file@percent }
|
||||||
|
\newlabel{table:pci-kpe}{{14}{24}{Top 15 Nodes with K-path Edge Centrality\relax }{table.caption.19}{}}
|
||||||
|
\@writefile{lot}{\contentsline {table}{\numberline {15}{\ignorespaces Top 15 Nodes with PageRank Centrality\relax }}{25}{table.caption.20}\protected@file@percent }
|
||||||
|
\newlabel{table:pci-PR}{{15}{25}{Top 15 Nodes with PageRank Centrality\relax }{table.caption.20}{}}
|
||||||
|
\@writefile{lot}{\contentsline {table}{\numberline {16}{\ignorespaces Top 15 Nodes with Betweenness Centrality\relax }}{25}{table.caption.21}\protected@file@percent }
|
||||||
|
\newlabel{table:pci-btwn}{{16}{25}{Top 15 Nodes with Betweenness Centrality\relax }{table.caption.21}{}}
|
||||||
|
\@setckpt{Appendices}{
|
||||||
|
\setcounter{page}{26}
|
||||||
|
\setcounter{equation}{6}
|
||||||
|
\setcounter{enumi}{0}
|
||||||
|
\setcounter{enumii}{0}
|
||||||
|
\setcounter{enumiii}{0}
|
||||||
|
\setcounter{enumiv}{20}
|
||||||
|
\setcounter{footnote}{3}
|
||||||
|
\setcounter{mpfootnote}{0}
|
||||||
|
\setcounter{part}{0}
|
||||||
|
\setcounter{section}{2}
|
||||||
|
\setcounter{subsection}{0}
|
||||||
|
\setcounter{subsubsection}{0}
|
||||||
|
\setcounter{paragraph}{0}
|
||||||
|
\setcounter{subparagraph}{0}
|
||||||
|
\setcounter{figure}{3}
|
||||||
|
\setcounter{table}{16}
|
||||||
|
\setcounter{caption@flags}{2}
|
||||||
|
\setcounter{continuedfloat}{0}
|
||||||
|
\setcounter{subfigure}{0}
|
||||||
|
\setcounter{subtable}{0}
|
||||||
|
\setcounter{float@type}{8}
|
||||||
|
\setcounter{algorithm}{0}
|
||||||
|
\setcounter{ALG@line}{0}
|
||||||
|
\setcounter{ALG@rem}{0}
|
||||||
|
\setcounter{ALG@nested}{0}
|
||||||
|
\setcounter{ALG@Lnr}{2}
|
||||||
|
\setcounter{ALG@blocknr}{10}
|
||||||
|
\setcounter{ALG@storecount}{0}
|
||||||
|
\setcounter{ALG@tmpcounter}{0}
|
||||||
|
\setcounter{Item}{0}
|
||||||
|
\setcounter{Hfootnote}{3}
|
||||||
|
\setcounter{bookmark@seq@number}{26}
|
||||||
|
\setcounter{lofdepth}{1}
|
||||||
|
\setcounter{lotdepth}{1}
|
||||||
|
\setcounter{section@level}{1}
|
||||||
|
}
|
||||||
268
Appendices.tex
Normal file
268
Appendices.tex
Normal file
@ -0,0 +1,268 @@
|
|||||||
|
\appendix
|
||||||
|
|
||||||
|
\section{HIPAA Results} \label{apx:hipaa}
|
||||||
|
\clearpage
|
||||||
|
|
||||||
|
\begin{table}[]
|
||||||
|
\centering
|
||||||
|
\begin{tabular}{|cc|cc|cc|}
|
||||||
|
\hline
|
||||||
|
\multicolumn{2}{|c|}{\cellcolor[HTML]{FFFF00}\textbf{Base}} & \multicolumn{2}{|c|}{\cellcolor[HTML]{FFFF00}\textbf{Transitive Closure}} & \multicolumn{2}{|c|}{\cellcolor[HTML]{FFFF00}\textbf{Dominant Tree}} \\ \hline
|
||||||
|
\multicolumn{1}{|c|}{\textbf{Node}} & \textbf{Value} & \multicolumn{1}{|c|}{\textbf{Node}} & \textbf{Value} & \multicolumn{1}{|c|}{\textbf{Node}} & \textbf{Value} \\ \hline
|
||||||
|
\multicolumn{1}{|c|}{1} & 4 & \multicolumn{1}{|c|}{0} & 2320 & \multicolumn{1}{|c|}{0} & 2203 \\ \hline
|
||||||
|
\multicolumn{1}{|c|}{4} & 4 & \multicolumn{1}{|c|}{1} & 2199 & \multicolumn{1}{|c|}{1} & 83 \\ \hline
|
||||||
|
\multicolumn{1}{|c|}{5} & 4 & \multicolumn{1}{|c|}{2} & 2109 & \multicolumn{1}{|c|}{2} & 1 \\ \hline
|
||||||
|
\multicolumn{1}{|c|}{6} & 4 & \multicolumn{1}{|c|}{6} & 1999 & \multicolumn{1}{|c|}{3} & 1 \\ \hline
|
||||||
|
\multicolumn{1}{|c|}{11} & 4 & \multicolumn{1}{|c|}{4} & 1980 & \multicolumn{1}{|c|}{4} & 1 \\ \hline
|
||||||
|
\multicolumn{1}{|c|}{12} & 4 & \multicolumn{1}{|c|}{5} & 1980 & \multicolumn{1}{|c|}{5} & 1 \\ \hline
|
||||||
|
\multicolumn{1}{|c|}{13} & 4 & \multicolumn{1}{|c|}{11} & 1980 & \multicolumn{1}{|c|}{8} & 1 \\ \hline
|
||||||
|
\multicolumn{1}{|c|}{15} & 4 & \multicolumn{1}{|c|}{15} & 1980 & \multicolumn{1}{|c|}{10} & 1 \\ \hline
|
||||||
|
\multicolumn{1}{|c|}{16} & 4 & \multicolumn{1}{|c|}{24} & 1980 & \multicolumn{1}{|c|}{11} & 1 \\ \hline
|
||||||
|
\multicolumn{1}{|c|}{18} & 4 & \multicolumn{1}{|c|}{33} & 1980 & \multicolumn{1}{|c|}{15} & 1 \\ \hline
|
||||||
|
\multicolumn{1}{|c|}{24} & 4 & \multicolumn{1}{|c|}{45} & 1980 & \multicolumn{1}{|c|}{20} & 1 \\ \hline
|
||||||
|
\multicolumn{1}{|c|}{25} & 4 & \multicolumn{1}{|c|}{61} & 1980 & \multicolumn{1}{|c|}{23} & 1 \\ \hline
|
||||||
|
\multicolumn{1}{|c|}{26} & 4 & \multicolumn{1}{|c|}{76} & 1980 & \multicolumn{1}{|c|}{24} & 1 \\ \hline
|
||||||
|
\multicolumn{1}{|c|}{28} & 4 & \multicolumn{1}{|c|}{101} & 1980 & \multicolumn{1}{|c|}{33} & 1 \\ \hline
|
||||||
|
\multicolumn{1}{|c|}{29} & 4 & \multicolumn{1}{|c|}{119} & 1980 & \multicolumn{1}{|c|}{40} & 1 \\ \hline
|
||||||
|
\end{tabular}
|
||||||
|
\caption{Top 15 Nodes with Degree Centrality}
|
||||||
|
\label{table:hipaa-degree}
|
||||||
|
\end{table}
|
||||||
|
|
||||||
|
\begin{table}[]
|
||||||
|
\centering
|
||||||
|
\begin{tabular}{|cc|cc|cc|}
|
||||||
|
\hline
|
||||||
|
\multicolumn{2}{|c|}{\cellcolor[HTML]{FFFF00}\textbf{Base}} & \multicolumn{2}{|c|}{\cellcolor[HTML]{FFFF00}\textbf{Transitive Closure}} & \multicolumn{2}{|c|}{\cellcolor[HTML]{FFFF00}\textbf{Dominant Tree}} \\ \hline
|
||||||
|
\multicolumn{1}{|c|}{\textbf{Node}} & \textbf{Value} & \multicolumn{1}{|c|}{\textbf{Node}} & \textbf{Value} & \multicolumn{1}{|c|}{\textbf{Node}} & \textbf{Value} \\ \hline
|
||||||
|
\multicolumn{1}{|c|}{250} & 0.01723395 & \multicolumn{1}{|c|}{0} & 0.0701156 & \multicolumn{1}{|c|}{0} & 0.0957149696 \\ \hline
|
||||||
|
\multicolumn{1}{|c|}{1313} & 0.01723395 & \multicolumn{1}{|c|}{1} & 0.06858208 & \multicolumn{1}{|c|}{1} & 0.004016468 \\ \hline
|
||||||
|
\multicolumn{1}{|c|}{2194} & 0.01723395 & \multicolumn{1}{|c|}{2} & 0.06240477 & \multicolumn{1}{|c|}{2} & 0.0004787209 \\ \hline
|
||||||
|
\multicolumn{1}{|c|}{396} & 0.01723395 & \multicolumn{1}{|c|}{11} & 0.06110052 & \multicolumn{1}{|c|}{3} & 0.0004787209 \\ \hline
|
||||||
|
\multicolumn{1}{|c|}{2300} & 0.01723395 & \multicolumn{1}{|c|}{24} & 0.06110052 & \multicolumn{1}{|c|}{4} & 0.0004787209 \\ \hline
|
||||||
|
\multicolumn{1}{|c|}{913} & 0.01723395 & \multicolumn{1}{|c|}{225} & 0.06110052 & \multicolumn{1}{|c|}{5} & 0.0004787209 \\ \hline
|
||||||
|
\multicolumn{1}{|c|}{983} & 0.01723395 & \multicolumn{1}{|c|}{101} & 0.06110052 & \multicolumn{1}{|c|}{8} & 0.0004787209 \\ \hline
|
||||||
|
\multicolumn{1}{|c|}{1048} & 0.01723395 & \multicolumn{1}{|c|}{45} & 0.06110052 & \multicolumn{1}{|c|}{10} & 0.0004787209 \\ \hline
|
||||||
|
\multicolumn{1}{|c|}{2268} & 0.01723395 & \multicolumn{1}{|c|}{76} & 0.06110052 & \multicolumn{1}{|c|}{11} & 0.0004787209 \\ \hline
|
||||||
|
\multicolumn{1}{|c|}{223} & 0.01723395 & \multicolumn{1}{|c|}{119} & 0.06110052 & \multicolumn{1}{|c|}{15} & 0.0004787209 \\ \hline
|
||||||
|
\multicolumn{1}{|c|}{385} & 0.01723395 & \multicolumn{1}{|c|}{15} & 0.06110052 & \multicolumn{1}{|c|}{20} & 0.0004787209 \\ \hline
|
||||||
|
\multicolumn{1}{|c|}{895} & 0.01723395 & \multicolumn{1}{|c|}{249} & 0.06110052 & \multicolumn{1}{|c|}{23} & 0.0004787209 \\ \hline
|
||||||
|
\multicolumn{1}{|c|}{1390} & 0.01723395 & \multicolumn{1}{|c|}{313} & 0.06110052 & \multicolumn{1}{|c|}{24} & 0.0004787208 \\ \hline
|
||||||
|
\multicolumn{1}{|c|}{1479} & 0.01723395 & \multicolumn{1}{|c|}{61} & 0.06110052 & \multicolumn{1}{|c|}{33} & 0.0004787208 \\ \hline
|
||||||
|
\multicolumn{1}{|c|}{1621} & 0.01723395 & \multicolumn{1}{|c|}{340} & 0.06110052 & \multicolumn{1}{|c|}{40} & 0.0004787208 \\ \hline
|
||||||
|
\end{tabular}
|
||||||
|
\caption{Top 15 Nodes with Katz Centrality}
|
||||||
|
\label{table:hipaa-katz}
|
||||||
|
\end{table}
|
||||||
|
|
||||||
|
\begin{table}[]
|
||||||
|
\centering
|
||||||
|
\begin{tabular}{|cc|cc|cc|}
|
||||||
|
\hline
|
||||||
|
\multicolumn{2}{|c|}{\cellcolor[HTML]{FFFF00}\textbf{Base}} & \multicolumn{2}{|c|}{\cellcolor[HTML]{FFFF00}\textbf{Transitive Closure}} & \multicolumn{2}{|c|}{\cellcolor[HTML]{FFFF00}\textbf{Dominant Tree}} \\ \hline
|
||||||
|
\multicolumn{1}{|c|}{\textbf{Node}} & \textbf{Value} & \multicolumn{1}{|c|}{\textbf{Node}} & \textbf{Value} & \multicolumn{1}{|c|}{\textbf{Node}} & \textbf{Value} \\ \hline
|
||||||
|
\multicolumn{1}{|c|}{1} & 29 & \multicolumn{1}{|c|}{0} & 2320 & \multicolumn{1}{|c|}{0} & 2292 \\ \hline
|
||||||
|
\multicolumn{1}{|c|}{4} & 29 & \multicolumn{1}{|c|}{1} & 2199 & \multicolumn{1}{|c|}{1} & 87 \\ \hline
|
||||||
|
\multicolumn{1}{|c|}{5} & 29 & \multicolumn{1}{|c|}{2} & 2109 & \multicolumn{1}{|c|}{2} & 3 \\ \hline
|
||||||
|
\multicolumn{1}{|c|}{6} & 29 & \multicolumn{1}{|c|}{6} & 1999 & \multicolumn{1}{|c|}{3} & 3 \\ \hline
|
||||||
|
\multicolumn{1}{|c|}{11} & 29 & \multicolumn{1}{|c|}{4} & 1979 & \multicolumn{1}{|c|}{4} & 3 \\ \hline
|
||||||
|
\multicolumn{1}{|c|}{12} & 29 & \multicolumn{1}{|c|}{5} & 1979 & \multicolumn{1}{|c|}{5} & 3 \\ \hline
|
||||||
|
\multicolumn{1}{|c|}{13} & 29 & \multicolumn{1}{|c|}{11} & 1979 & \multicolumn{1}{|c|}{8} & 3 \\ \hline
|
||||||
|
\multicolumn{1}{|c|}{15} & 29 & \multicolumn{1}{|c|}{15} & 1979 & \multicolumn{1}{|c|}{10} & 3 \\ \hline
|
||||||
|
\multicolumn{1}{|c|}{16} & 29 & \multicolumn{1}{|c|}{24} & 1979 & \multicolumn{1}{|c|}{11} & 3 \\ \hline
|
||||||
|
\multicolumn{1}{|c|}{18} & 29 & \multicolumn{1}{|c|}{33} & 1979 & \multicolumn{1}{|c|}{15} & 3 \\ \hline
|
||||||
|
\multicolumn{1}{|c|}{24} & 29 & \multicolumn{1}{|c|}{45} & 1979 & \multicolumn{1}{|c|}{20} & 3 \\ \hline
|
||||||
|
\multicolumn{1}{|c|}{25} & 29 & \multicolumn{1}{|c|}{61} & 1979 & \multicolumn{1}{|c|}{23} & 3 \\ \hline
|
||||||
|
\multicolumn{1}{|c|}{26} & 29 & \multicolumn{1}{|c|}{76} & 1979 & \multicolumn{1}{|c|}{24} & 3 \\ \hline
|
||||||
|
\multicolumn{1}{|c|}{28} & 29 & \multicolumn{1}{|c|}{101} & 1979 & \multicolumn{1}{|c|}{33} & 3 \\ \hline
|
||||||
|
\multicolumn{1}{|c|}{29} & 29 & \multicolumn{1}{|c|}{119} & 1979 & \multicolumn{1}{|c|}{40} & 3 \\ \hline
|
||||||
|
\end{tabular}
|
||||||
|
\caption{Top 15 Nodes with K-path Edge Centrality}
|
||||||
|
\label{table:hipaa-kpe}
|
||||||
|
\end{table}
|
||||||
|
|
||||||
|
\begin{table}[]
|
||||||
|
\centering
|
||||||
|
\begin{tabular}{|cc|cc|cc|}
|
||||||
|
\hline
|
||||||
|
\multicolumn{2}{|c|}{\cellcolor[HTML]{FFFF00}\textbf{Base}} & \multicolumn{2}{|c|}{\cellcolor[HTML]{FFFF00}\textbf{Transitive Closure}} & \multicolumn{2}{|c|}{\cellcolor[HTML]{FFFF00}\textbf{Dominant Tree}} \\ \hline
|
||||||
|
\multicolumn{1}{|c|}{\textbf{Node}} & \textbf{Value} & \multicolumn{1}{|c|}{\textbf{Node}} & \textbf{Value} & \multicolumn{1}{|c|}{\textbf{Node}} & \textbf{Value} \\ \hline
|
||||||
|
\multicolumn{1}{|c|}{98} & 0.001622572 & \multicolumn{1}{|c|}{98} & 0.001149403 & \multicolumn{1}{|c|}{440} & 0.002213066 \\ \hline
|
||||||
|
\multicolumn{1}{|c|}{150} & 0.001517908 & \multicolumn{1}{|c|}{141} & 0.001149403 & \multicolumn{1}{|c|}{450} & 0.002213066 \\ \hline
|
||||||
|
\multicolumn{1}{|c|}{141} & 0.001473917 & \multicolumn{1}{|c|}{150} & 0.001149403 & \multicolumn{1}{|c|}{340} & 0.002118449 \\ \hline
|
||||||
|
\multicolumn{1}{|c|}{152} & 0.001458482 & \multicolumn{1}{|c|}{152} & 0.001149403 & \multicolumn{1}{|c|}{421} & 0.002118449 \\ \hline
|
||||||
|
\multicolumn{1}{|c|}{218} & 0.001430206 & \multicolumn{1}{|c|}{198} & 0.001149403 & \multicolumn{1}{|c|}{330} & 0.002117339 \\ \hline
|
||||||
|
\multicolumn{1}{|c|}{207} & 0.001394885 & \multicolumn{1}{|c|}{207} & 0.001149403 & \multicolumn{1}{|c|}{339} & 0.002117339 \\ \hline
|
||||||
|
\multicolumn{1}{|c|}{220} & 0.001378205 & \multicolumn{1}{|c|}{209} & 0.001149403 & \multicolumn{1}{|c|}{249} & 0.002006025 \\ \hline
|
||||||
|
\multicolumn{1}{|c|}{304} & 0.001370904 & \multicolumn{1}{|c|}{218} & 0.001149403 & \multicolumn{1}{|c|}{313} & 0.002006025 \\ \hline
|
||||||
|
\multicolumn{1}{|c|}{198} & 0.001363898 & \multicolumn{1}{|c|}{220} & 0.001149403 & \multicolumn{1}{|c|}{240} & 0.002004719 \\ \hline
|
||||||
|
\multicolumn{1}{|c|}{209} & 0.001340868 & \multicolumn{1}{|c|}{222} & 0.001149403 & \multicolumn{1}{|c|}{248} & 0.002004719 \\ \hline
|
||||||
|
\multicolumn{1}{|c|}{222} & 0.001338749 & \multicolumn{1}{|c|}{271} & 0.001149403 & \multicolumn{1}{|c|}{176} & 0.001873761 \\ \hline
|
||||||
|
\multicolumn{1}{|c|}{410} & 0.001334312 & \multicolumn{1}{|c|}{280} & 0.001149403 & \multicolumn{1}{|c|}{225} & 0.001873761 \\ \hline
|
||||||
|
\multicolumn{1}{|c|}{291} & 0.001321592 & \multicolumn{1}{|c|}{282} & 0.001149403 & \multicolumn{1}{|c|}{168} & 0.001872224 \\ \hline
|
||||||
|
\multicolumn{1}{|c|}{537} & 0.001312566 & \multicolumn{1}{|c|}{291} & 0.001149403 & \multicolumn{1}{|c|}{175} & 0.001872224 \\ \hline
|
||||||
|
\multicolumn{1}{|c|}{306} & 0.001304744 & \multicolumn{1}{|c|}{293} & 0.001149403 & \multicolumn{1}{|c|}{119} & 0.001718156 \\ \hline
|
||||||
|
\end{tabular}
|
||||||
|
\caption{Top 15 Nodes with PageRank Centrality}
|
||||||
|
\label{table:hipaa-APC}
|
||||||
|
\end{table}
|
||||||
|
|
||||||
|
\begin{table}[]
|
||||||
|
\centering
|
||||||
|
\begin{tabular}{|cc|cc|cc|}
|
||||||
|
\hline
|
||||||
|
\multicolumn{2}{|c|}{\cellcolor[HTML]{FFFF00}\textbf{Base}} & \multicolumn{2}{|c|}{\cellcolor[HTML]{FFFF00}\textbf{Transitive Closure}} & \multicolumn{2}{|c|}{\cellcolor[HTML]{FFFF00}\textbf{Dominant Tree}} \\ \hline
|
||||||
|
\multicolumn{1}{|c|}{\textbf{Node}} & \textbf{Value} & \multicolumn{1}{|c|}{\textbf{Node}} & \textbf{Value} & \multicolumn{1}{|c|}{\textbf{Node}} & \textbf{Value} \\ \hline
|
||||||
|
\multicolumn{1}{|c|}{57} & 30159.36 & \multicolumn{1}{|c|}{0} & 0 & \multicolumn{1}{|c|}{1} & 99 \\ \hline
|
||||||
|
\multicolumn{1}{|c|}{98} & 29440.04 & \multicolumn{1}{|c|}{1} & 0 & \multicolumn{1}{|c|}{45} & 25 \\ \hline
|
||||||
|
\multicolumn{1}{|c|}{150} & 28358.55 & \multicolumn{1}{|c|}{2} & 0 & \multicolumn{1}{|c|}{61} & 25 \\ \hline
|
||||||
|
\multicolumn{1}{|c|}{88} & 28108.58 & \multicolumn{1}{|c|}{3} & 0 & \multicolumn{1}{|c|}{70} & 25 \\ \hline
|
||||||
|
\multicolumn{1}{|c|}{95} & 28093.87 & \multicolumn{1}{|c|}{4} & 0 & \multicolumn{1}{|c|}{75} & 25 \\ \hline
|
||||||
|
\multicolumn{1}{|c|}{141} & 27812.05 & \multicolumn{1}{|c|}{5} & 0 & \multicolumn{1}{|c|}{24} & 24 \\ \hline
|
||||||
|
\multicolumn{1}{|c|}{152} & 27774.25 & \multicolumn{1}{|c|}{6} & 0 & \multicolumn{1}{|c|}{33} & 24 \\ \hline
|
||||||
|
\multicolumn{1}{|c|}{97} & 27495.11 & \multicolumn{1}{|c|}{7} & 0 & \multicolumn{1}{|c|}{40} & 24 \\ \hline
|
||||||
|
\multicolumn{1}{|c|}{218} & 27411.69 & \multicolumn{1}{|c|}{8} & 0 & \multicolumn{1}{|c|}{44} & 24 \\ \hline
|
||||||
|
\multicolumn{1}{|c|}{207} & 26972.75 & \multicolumn{1}{|c|}{9} & 0 & \multicolumn{1}{|c|}{76} & 24 \\ \hline
|
||||||
|
\multicolumn{1}{|c|}{220} & 26927 & \multicolumn{1}{|c|}{10} & 0 & \multicolumn{1}{|c|}{101} & 24 \\ \hline
|
||||||
|
\multicolumn{1}{|c|}{131} & 26605.99 & \multicolumn{1}{|c|}{11} & 0 & \multicolumn{1}{|c|}{112} & 24 \\ \hline
|
||||||
|
\multicolumn{1}{|c|}{304} & 26604.49 & \multicolumn{1}{|c|}{12} & 0 & \multicolumn{1}{|c|}{118} & 24 \\ \hline
|
||||||
|
\multicolumn{1}{|c|}{147} & 26591 & \multicolumn{1}{|c|}{13} & 0 & \multicolumn{1}{|c|}{11} & 21 \\ \hline
|
||||||
|
\multicolumn{1}{|c|}{138} & 26507.64 & \multicolumn{1}{|c|}{14} & 0 & \multicolumn{1}{|c|}{15} & 21 \\ \hline
|
||||||
|
\end{tabular}
|
||||||
|
\caption{Top 15 Nodes with Betweenness Centrality}
|
||||||
|
\label{table:hipaa-btwn}
|
||||||
|
\end{table}
|
||||||
|
|
||||||
|
\clearpage
|
||||||
|
\section{PCI DSS Results} \label{apx:pci}
|
||||||
|
|
||||||
|
\begin{table}[]
|
||||||
|
\centering
|
||||||
|
\begin{tabular}{|cc|cc|cc|}
|
||||||
|
\hline
|
||||||
|
\multicolumn{2}{|c|}{\cellcolor[HTML]{FFFF00}\textbf{Base}} & \multicolumn{2}{|c|}{\cellcolor[HTML]{FFFF00}\textbf{Transitive Closure}} & \multicolumn{2}{|c|}{\cellcolor[HTML]{FFFF00}\textbf{Dominant Tree}} \\ \hline
|
||||||
|
\multicolumn{1}{|c|}{\textbf{Node}} & \textbf{Value} & \multicolumn{1}{|c|}{\textbf{Node}} & \textbf{Value} & \multicolumn{1}{|c|}{\textbf{Node}} & \textbf{Value} \\ \hline
|
||||||
|
\multicolumn{1}{|c|}{1} & 4 & \multicolumn{1}{|c|}{0} & 60 & \multicolumn{1}{|c|}{0} & 43 \\ \hline
|
||||||
|
\multicolumn{1}{|c|}{4} & 4 & \multicolumn{1}{|c|}{1} & 47 & \multicolumn{1}{|c|}{1} & 8 \\ \hline
|
||||||
|
\multicolumn{1}{|c|}{7} & 4 & \multicolumn{1}{|c|}{4} & 36 & \multicolumn{1}{|c|}{2} & 1 \\ \hline
|
||||||
|
\multicolumn{1}{|c|}{11} & 4 & \multicolumn{1}{|c|}{11} & 36 & \multicolumn{1}{|c|}{3} & 1 \\ \hline
|
||||||
|
\multicolumn{1}{|c|}{14} & 4 & \multicolumn{1}{|c|}{22} & 36 & \multicolumn{1}{|c|}{4} & 1 \\ \hline
|
||||||
|
\multicolumn{1}{|c|}{22} & 4 & \multicolumn{1}{|c|}{2} & 31 & \multicolumn{1}{|c|}{7} & 1 \\ \hline
|
||||||
|
\multicolumn{1}{|c|}{25} & 4 & \multicolumn{1}{|c|}{3} & 31 & \multicolumn{1}{|c|}{8} & 1 \\ \hline
|
||||||
|
\multicolumn{1}{|c|}{38} & 4 & \multicolumn{1}{|c|}{7} & 31 & \multicolumn{1}{|c|}{10} & 1 \\ \hline
|
||||||
|
\multicolumn{1}{|c|}{0} & 3 & \multicolumn{1}{|c|}{8} & 24 & \multicolumn{1}{|c|}{11} & 1 \\ \hline
|
||||||
|
\multicolumn{1}{|c|}{2} & 3 & \multicolumn{1}{|c|}{10} & 24 & \multicolumn{1}{|c|}{19} & 1 \\ \hline
|
||||||
|
\multicolumn{1}{|c|}{3} & 3 & \multicolumn{1}{|c|}{14} & 24 & \multicolumn{1}{|c|}{21} & 1 \\ \hline
|
||||||
|
\multicolumn{1}{|c|}{5} & 3 & \multicolumn{1}{|c|}{19} & 24 & \multicolumn{1}{|c|}{5} & 0 \\ \hline
|
||||||
|
\multicolumn{1}{|c|}{6} & 3 & \multicolumn{1}{|c|}{21} & 24 & \multicolumn{1}{|c|}{6} & 0 \\ \hline
|
||||||
|
\multicolumn{1}{|c|}{8} & 3 & \multicolumn{1}{|c|}{25} & 24 & \multicolumn{1}{|c|}{9} & 0 \\ \hline
|
||||||
|
\multicolumn{1}{|c|}{10} & 3 & \multicolumn{1}{|c|}{33} & 24 & \multicolumn{1}{|c|}{12} & 0 \\ \hline
|
||||||
|
\end{tabular}
|
||||||
|
\caption{Top 15 Nodes with Degree Centrality}
|
||||||
|
\label{table:pci-deg}
|
||||||
|
\end{table}
|
||||||
|
|
||||||
|
|
||||||
|
\begin{table}[]
|
||||||
|
\centering
|
||||||
|
\begin{tabular}{|cc|cc|cc|}
|
||||||
|
\hline
|
||||||
|
\multicolumn{2}{|c|}{\cellcolor[HTML]{FFFF00}\textbf{Base}} & \multicolumn{2}{|c|}{\cellcolor[HTML]{FFFF00}\textbf{Transitive Closure}} & \multicolumn{2}{|c|}{\cellcolor[HTML]{FFFF00}\textbf{Dominant Tree}} \\ \hline
|
||||||
|
\multicolumn{1}{|c|}{\textbf{Node}} & \textbf{Value} & \multicolumn{1}{|c|}{\textbf{Node}} & \textbf{Value} & \multicolumn{1}{|c|}{\textbf{Node}} & \textbf{Value} \\ \hline
|
||||||
|
\multicolumn{1}{|c|}{0} & 21672.0619 & \multicolumn{1}{|c|}{0} & 38118.0529 & \multicolumn{1}{|c|}{0} & 0.08859508 \\ \hline
|
||||||
|
\multicolumn{1}{|c|}{1} & 14435.569 & \multicolumn{1}{|c|}{1} & 17874.4534 & \multicolumn{1}{|c|}{1} & 0.02985246 \\ \hline
|
||||||
|
\multicolumn{1}{|c|}{4} & 14435.569 & \multicolumn{1}{|c|}{4} & 17278.6824 & \multicolumn{1}{|c|}{2} & 0.01821311 \\ \hline
|
||||||
|
\multicolumn{1}{|c|}{11} & 14435.569 & \multicolumn{1}{|c|}{11} & 17278.6824 & \multicolumn{1}{|c|}{3} & 0.01821311 \\ \hline
|
||||||
|
\multicolumn{1}{|c|}{22} & 14435.569 & \multicolumn{1}{|c|}{22} & 17278.6824 & \multicolumn{1}{|c|}{4} & 0.01819672 \\ \hline
|
||||||
|
\multicolumn{1}{|c|}{3} & 4822.2923 & \multicolumn{1}{|c|}{2} & 6274.702 & \multicolumn{1}{|c|}{8} & 0.01819672 \\ \hline
|
||||||
|
\multicolumn{1}{|c|}{10} & 4822.2923 & \multicolumn{1}{|c|}{3} & 6274.702 & \multicolumn{1}{|c|}{10} & 0.01819672 \\ \hline
|
||||||
|
\multicolumn{1}{|c|}{21} & 4822.2923 & \multicolumn{1}{|c|}{8} & 6065.5717 & \multicolumn{1}{|c|}{7} & 0.01803279 \\ \hline
|
||||||
|
\multicolumn{1}{|c|}{35} & 4822.2923 & \multicolumn{1}{|c|}{19} & 6065.5717 & \multicolumn{1}{|c|}{11} & 0.01803279 \\ \hline
|
||||||
|
\multicolumn{1}{|c|}{2} & 4822.2923 & \multicolumn{1}{|c|}{33} & 6065.5717 & \multicolumn{1}{|c|}{19} & 0.01803279 \\ \hline
|
||||||
|
\multicolumn{1}{|c|}{8} & 4822.2923 & \multicolumn{1}{|c|}{10} & 6065.5717 & \multicolumn{1}{|c|}{21} & 0.01803279 \\ \hline
|
||||||
|
\multicolumn{1}{|c|}{19} & 4822.2923 & \multicolumn{1}{|c|}{21} & 6065.5717 & \multicolumn{1}{|c|}{5} & 0.01639344 \\ \hline
|
||||||
|
\multicolumn{1}{|c|}{33} & 4822.2923 & \multicolumn{1}{|c|}{35} & 6065.5717 & \multicolumn{1}{|c|}{6} & 0.01639344 \\ \hline
|
||||||
|
\multicolumn{1}{|c|}{38} & 801.1816 & \multicolumn{1}{|c|}{7} & 917.4427 & \multicolumn{1}{|c|}{9} & 0.01639344 \\ \hline
|
||||||
|
\multicolumn{1}{|c|}{25} & 801.1816 & \multicolumn{1}{|c|}{38} & 886.885 & \multicolumn{1}{|c|}{12} & 0.01639344 \\ \hline
|
||||||
|
\end{tabular}
|
||||||
|
\caption{Top 15 Nodes with Katz Centrality}
|
||||||
|
\label{table:pci-katz}
|
||||||
|
\end{table}
|
||||||
|
|
||||||
|
\begin{table}[]
|
||||||
|
\centering
|
||||||
|
\begin{tabular}{|cc|cc|cc|}
|
||||||
|
\hline
|
||||||
|
\multicolumn{2}{|c|}{\cellcolor[HTML]{FFFF00}\textbf{Base}} & \multicolumn{2}{|c|}{\cellcolor[HTML]{FFFF00}\textbf{Transitive Closure}} & \multicolumn{2}{|c|}{\cellcolor[HTML]{FFFF00}\textbf{Dominant Tree}} \\ \hline
|
||||||
|
\multicolumn{1}{|c|}{\textbf{Node}} & \textbf{Value} & \multicolumn{1}{|c|}{\textbf{Node}} & \textbf{Value} & \multicolumn{1}{|c|}{\textbf{Node}} & \textbf{Value} \\ \hline
|
||||||
|
\multicolumn{1}{|c|}{1} & 23 & \multicolumn{1}{|c|}{0} & 60 & \multicolumn{1}{|c|}{0} & 57 \\ \hline
|
||||||
|
\multicolumn{1}{|c|}{4} & 22 & \multicolumn{1}{|c|}{1} & 47 & \multicolumn{1}{|c|}{1} & 11 \\ \hline
|
||||||
|
\multicolumn{1}{|c|}{11} & 22 & \multicolumn{1}{|c|}{4} & 35 & \multicolumn{1}{|c|}{2} & 3 \\ \hline
|
||||||
|
\multicolumn{1}{|c|}{22} & 22 & \multicolumn{1}{|c|}{11} & 35 & \multicolumn{1}{|c|}{3} & 3 \\ \hline
|
||||||
|
\multicolumn{1}{|c|}{0} & 21 & \multicolumn{1}{|c|}{22} & 35 & \multicolumn{1}{|c|}{4} & 2 \\ \hline
|
||||||
|
\multicolumn{1}{|c|}{7} & 19 & \multicolumn{1}{|c|}{2} & 31 & \multicolumn{1}{|c|}{8} & 2 \\ \hline
|
||||||
|
\multicolumn{1}{|c|}{14} & 18 & \multicolumn{1}{|c|}{3} & 31 & \multicolumn{1}{|c|}{10} & 2 \\ \hline
|
||||||
|
\multicolumn{1}{|c|}{25} & 18 & \multicolumn{1}{|c|}{7} & 31 & \multicolumn{1}{|c|}{7} & 1 \\ \hline
|
||||||
|
\multicolumn{1}{|c|}{38} & 18 & \multicolumn{1}{|c|}{5} & 23 & \multicolumn{1}{|c|}{11} & 1 \\ \hline
|
||||||
|
\multicolumn{1}{|c|}{2} & 15 & \multicolumn{1}{|c|}{6} & 23 & \multicolumn{1}{|c|}{19} & 1 \\ \hline
|
||||||
|
\multicolumn{1}{|c|}{3} & 15 & \multicolumn{1}{|c|}{8} & 23 & \multicolumn{1}{|c|}{21} & 1 \\ \hline
|
||||||
|
\multicolumn{1}{|c|}{5} & 14 & \multicolumn{1}{|c|}{10} & 23 & \multicolumn{1}{|c|}{5} & 0 \\ \hline
|
||||||
|
\multicolumn{1}{|c|}{6} & 14 & \multicolumn{1}{|c|}{14} & 23 & \multicolumn{1}{|c|}{6} & 0 \\ \hline
|
||||||
|
\multicolumn{1}{|c|}{8} & 14 & \multicolumn{1}{|c|}{19} & 23 & \multicolumn{1}{|c|}{9} & 0 \\ \hline
|
||||||
|
\multicolumn{1}{|c|}{10} & 14 & \multicolumn{1}{|c|}{21} & 23 & \multicolumn{1}{|c|}{12} & 0 \\ \hline
|
||||||
|
\end{tabular}
|
||||||
|
\caption{Top 15 Nodes with K-path Edge Centrality}
|
||||||
|
\label{table:pci-kpe}
|
||||||
|
\end{table}
|
||||||
|
|
||||||
|
\begin{table}[]
|
||||||
|
\centering
|
||||||
|
\begin{tabular}{|cc|cc|cc|}
|
||||||
|
\hline
|
||||||
|
\multicolumn{2}{|c|}{\cellcolor[HTML]{FFFF00}\textbf{Base}} & \multicolumn{2}{|c|}{\cellcolor[HTML]{FFFF00}\textbf{Transitive Closure}} & \multicolumn{2}{|c|}{\cellcolor[HTML]{FFFF00}\textbf{Dominant Tree}} \\ \hline
|
||||||
|
\multicolumn{1}{|c|}{\textbf{Node}} & \textbf{Value} & \multicolumn{1}{|c|}{\textbf{Node}} & \textbf{Value} & \multicolumn{1}{|c|}{\textbf{Node}} & \textbf{Value} \\ \hline
|
||||||
|
\multicolumn{1}{|c|}{55} & 0.18443558 & \multicolumn{1}{|c|}{55} & 0.226570132 & \multicolumn{1}{|c|}{33} & 0.04233607 \\ \hline
|
||||||
|
\multicolumn{1}{|c|}{59} & 0.18084037 & \multicolumn{1}{|c|}{59} & 0.226570132 & \multicolumn{1}{|c|}{35} & 0.04233607 \\ \hline
|
||||||
|
\multicolumn{1}{|c|}{60} & 0.17618635 & \multicolumn{1}{|c|}{60} & 0.226570132 & \multicolumn{1}{|c|}{22} & 0.03508347 \\ \hline
|
||||||
|
\multicolumn{1}{|c|}{43} & 0.03052713 & \multicolumn{1}{|c|}{43} & 0.020661622 & \multicolumn{1}{|c|}{19} & 0.0342364 \\ \hline
|
||||||
|
\multicolumn{1}{|c|}{52} & 0.02771085 & \multicolumn{1}{|c|}{52} & 0.020661622 & \multicolumn{1}{|c|}{21} & 0.0342364 \\ \hline
|
||||||
|
\multicolumn{1}{|c|}{56} & 0.02561868 & \multicolumn{1}{|c|}{56} & 0.020661622 & \multicolumn{1}{|c|}{11} & 0.02570392 \\ \hline
|
||||||
|
\multicolumn{1}{|c|}{26} & 0.02106378 & \multicolumn{1}{|c|}{44} & 0.011922406 & \multicolumn{1}{|c|}{18} & 0.02570392 \\ \hline
|
||||||
|
\multicolumn{1}{|c|}{39} & 0.01874426 & \multicolumn{1}{|c|}{45} & 0.011922406 & \multicolumn{1}{|c|}{8} & 0.02470738 \\ \hline
|
||||||
|
\multicolumn{1}{|c|}{48} & 0.01726353 & \multicolumn{1}{|c|}{53} & 0.011922406 & \multicolumn{1}{|c|}{10} & 0.02470738 \\ \hline
|
||||||
|
\multicolumn{1}{|c|}{44} & 0.01305759 & \multicolumn{1}{|c|}{54} & 0.011922406 & \multicolumn{1}{|c|}{4} & 0.01466916 \\ \hline
|
||||||
|
\multicolumn{1}{|c|}{45} & 0.01305759 & \multicolumn{1}{|c|}{57} & 0.011922406 & \multicolumn{1}{|c|}{7} & 0.01466916 \\ \hline
|
||||||
|
\multicolumn{1}{|c|}{53} & 0.01156941 & \multicolumn{1}{|c|}{58} & 0.011922406 & \multicolumn{1}{|c|}{14} & 0.01466916 \\ \hline
|
||||||
|
\multicolumn{1}{|c|}{54} & 0.01156941 & \multicolumn{1}{|c|}{26} & 0.008406702 & \multicolumn{1}{|c|}{25} & 0.01466916 \\ \hline
|
||||||
|
\multicolumn{1}{|c|}{57} & 0.01073539 & \multicolumn{1}{|c|}{39} & 0.008406702 & \multicolumn{1}{|c|}{29} & 0.01466916 \\ \hline
|
||||||
|
\multicolumn{1}{|c|}{58} & 0.01073539 & \multicolumn{1}{|c|}{48} & 0.008406702 & \multicolumn{1}{|c|}{38} & 0.01466916 \\ \hline
|
||||||
|
\end{tabular}
|
||||||
|
\caption{Top 15 Nodes with PageRank Centrality}
|
||||||
|
\label{table:pci-PR}
|
||||||
|
\end{table}
|
||||||
|
|
||||||
|
\begin{table}[]
|
||||||
|
\centering
|
||||||
|
\begin{tabular}{|cc|cc|cc|}
|
||||||
|
\hline
|
||||||
|
\multicolumn{2}{|c|}{\cellcolor[HTML]{FFFF00}\textbf{Base}} & \multicolumn{2}{|c|}{\cellcolor[HTML]{FFFF00}\textbf{Transitive Closure}} & \multicolumn{2}{|c|}{\cellcolor[HTML]{FFFF00}\textbf{Dominant Tree}} \\ \hline
|
||||||
|
\multicolumn{1}{|c|}{\textbf{Node}} & \textbf{Value} & \multicolumn{1}{|c|}{\textbf{Node}} & \textbf{Value} & \multicolumn{1}{|c|}{\textbf{Node}} & \textbf{Value} \\ \hline
|
||||||
|
\multicolumn{1}{|c|}{43} & 64.49143 & \multicolumn{1}{|c|}{0} & 0 & \multicolumn{1}{|c|}{1} & 11 \\ \hline
|
||||||
|
\multicolumn{1}{|c|}{27} & 61.97619 & \multicolumn{1}{|c|}{1} & 0 & \multicolumn{1}{|c|}{4} & 4 \\ \hline
|
||||||
|
\multicolumn{1}{|c|}{28} & 61.97619 & \multicolumn{1}{|c|}{2} & 0 & \multicolumn{1}{|c|}{8} & 4 \\ \hline
|
||||||
|
\multicolumn{1}{|c|}{26} & 60.86429 & \multicolumn{1}{|c|}{3} & 0 & \multicolumn{1}{|c|}{10} & 4 \\ \hline
|
||||||
|
\multicolumn{1}{|c|}{12} & 59.55619 & \multicolumn{1}{|c|}{4} & 0 & \multicolumn{1}{|c|}{2} & 3 \\ \hline
|
||||||
|
\multicolumn{1}{|c|}{13} & 59.55619 & \multicolumn{1}{|c|}{5} & 0 & \multicolumn{1}{|c|}{3} & 3 \\ \hline
|
||||||
|
\multicolumn{1}{|c|}{52} & 55.55238 & \multicolumn{1}{|c|}{6} & 0 & \multicolumn{1}{|c|}{11} & 3 \\ \hline
|
||||||
|
\multicolumn{1}{|c|}{14} & 55.4427 & \multicolumn{1}{|c|}{7} & 0 & \multicolumn{1}{|c|}{19} & 3 \\ \hline
|
||||||
|
\multicolumn{1}{|c|}{40} & 50.46952 & \multicolumn{1}{|c|}{8} & 0 & \multicolumn{1}{|c|}{21} & 3 \\ \hline
|
||||||
|
\multicolumn{1}{|c|}{41} & 50.46952 & \multicolumn{1}{|c|}{9} & 0 & \multicolumn{1}{|c|}{7} & 2 \\ \hline
|
||||||
|
\multicolumn{1}{|c|}{39} & 50.04095 & \multicolumn{1}{|c|}{10} & 0 & \multicolumn{1}{|c|}{0} & 0 \\ \hline
|
||||||
|
\multicolumn{1}{|c|}{23} & 45.18071 & \multicolumn{1}{|c|}{11} & 0 & \multicolumn{1}{|c|}{5} & 0 \\ \hline
|
||||||
|
\multicolumn{1}{|c|}{24} & 45.18071 & \multicolumn{1}{|c|}{12} & 0 & \multicolumn{1}{|c|}{6} & 0 \\ \hline
|
||||||
|
\multicolumn{1}{|c|}{4} & 42.77794 & \multicolumn{1}{|c|}{13} & 0 & \multicolumn{1}{|c|}{9} & 0 \\ \hline
|
||||||
|
\multicolumn{1}{|c|}{56} & 42.31905 & \multicolumn{1}{|c|}{14} & 0 & \multicolumn{1}{|c|}{12} & 0 \\ \hline
|
||||||
|
\end{tabular}
|
||||||
|
\caption{Top 15 Nodes with Betweenness Centrality}
|
||||||
|
\label{table:pci-btwn}
|
||||||
|
\end{table}
|
||||||
1437
Bibliography.bib
Normal file
1437
Bibliography.bib
Normal file
File diff suppressed because it is too large
Load Diff
118
Schrick-Noah_CS-7863_Final-Report.aux
Normal file
118
Schrick-Noah_CS-7863_Final-Report.aux
Normal file
@ -0,0 +1,118 @@
|
|||||||
|
\relax
|
||||||
|
\providecommand\hyper@newdestlabel[2]{}
|
||||||
|
\providecommand\babel@aux[2]{}
|
||||||
|
\@nameuse{bbl@beforestart}
|
||||||
|
\providecommand\HyperFirstAtBeginDocument{\AtBeginDocument}
|
||||||
|
\HyperFirstAtBeginDocument{\ifx\hyper@anchor\@undefined
|
||||||
|
\global\let\oldcontentsline\contentsline
|
||||||
|
\gdef\contentsline#1#2#3#4{\oldcontentsline{#1}{#2}{#3}}
|
||||||
|
\global\let\oldnewlabel\newlabel
|
||||||
|
\gdef\newlabel#1#2{\newlabelxx{#1}#2}
|
||||||
|
\gdef\newlabelxx#1#2#3#4#5#6{\oldnewlabel{#1}{{#2}{#3}}}
|
||||||
|
\AtEndDocument{\ifx\hyper@anchor\@undefined
|
||||||
|
\let\contentsline\oldcontentsline
|
||||||
|
\let\newlabel\oldnewlabel
|
||||||
|
\fi}
|
||||||
|
\fi}
|
||||||
|
\global\let\hyper@last\relax
|
||||||
|
\gdef\HyperFirstAtBeginDocument#1{#1}
|
||||||
|
\providecommand\HyField@AuxAddToFields[1]{}
|
||||||
|
\providecommand\HyField@AuxAddToCoFields[2]{}
|
||||||
|
\babel@aux{nil}{}
|
||||||
|
\citation{phillips_graph-based_1998}
|
||||||
|
\citation{schneier_modeling_1999}
|
||||||
|
\citation{j_hale_compliance_nodate}
|
||||||
|
\citation{baloyi_guidelines_2019}
|
||||||
|
\citation{allman_complying_2006}
|
||||||
|
\@writefile{toc}{\contentsline {section}{\numberline {1}Introduction}{2}{section.1}\protected@file@percent }
|
||||||
|
\@writefile{toc}{\contentsline {subsection}{\numberline {1.1}Attack Graphs}{2}{subsection.1.1}\protected@file@percent }
|
||||||
|
\@writefile{toc}{\contentsline {subsection}{\numberline {1.2}Compliance Graphs}{2}{subsection.1.2}\protected@file@percent }
|
||||||
|
\citation{newman2010networks}
|
||||||
|
\citation{Mieghem2018DirectedGA}
|
||||||
|
\citation{Mieghem2018DirectedGA}
|
||||||
|
\citation{ming_diss}
|
||||||
|
\citation{Guo2017HermitianAM}
|
||||||
|
\citation{Mieghem2018DirectedGA}
|
||||||
|
\citation{Brualdi2010SpectraOD}
|
||||||
|
\@writefile{toc}{\contentsline {subsection}{\numberline {1.3}Difficulties of Compliance Graph Analysis}{3}{subsection.1.3}\protected@file@percent }
|
||||||
|
\@writefile{toc}{\contentsline {section}{\numberline {2}Related Works}{3}{section.2}\protected@file@percent }
|
||||||
|
\citation{noauthor_health_1996}
|
||||||
|
\citation{PCI}
|
||||||
|
\citation{PMID:30064421}
|
||||||
|
\@writefile{lot}{\contentsline {table}{\numberline {1}{\ignorespaces Network Properties for the Three Networks Utilized\relax }}{4}{table.caption.2}\protected@file@percent }
|
||||||
|
\providecommand*\caption@xref[2]{\@setref\relax\@undefined{#1}}
|
||||||
|
\newlabel{table:networks}{{1}{4}{Network Properties for the Three Networks Utilized\relax }{table.caption.2}{}}
|
||||||
|
\@writefile{toc}{\contentsline {section}{\numberline {3}Experimental Networks}{4}{section.3}\protected@file@percent }
|
||||||
|
\newlabel{sec:networks}{{3}{4}{Experimental Networks}{section.3}{}}
|
||||||
|
\@writefile{toc}{\contentsline {section}{\numberline {4}Centralities and their Applications to Compliance Graphs}{5}{section.4}\protected@file@percent }
|
||||||
|
\newlabel{sec:centralities}{{4}{5}{Centralities and their Applications to Compliance Graphs}{section.4}{}}
|
||||||
|
\@writefile{toc}{\contentsline {subsection}{\numberline {4.1}Introduction}{5}{subsection.4.1}\protected@file@percent }
|
||||||
|
\@writefile{toc}{\contentsline {subsection}{\numberline {4.2}Degree}{5}{subsection.4.2}\protected@file@percent }
|
||||||
|
\@writefile{toc}{\contentsline {subsection}{\numberline {4.3}Betweenness}{5}{subsection.4.3}\protected@file@percent }
|
||||||
|
\newlabel{sec:between}{{4.3}{5}{Betweenness}{subsection.4.3}{}}
|
||||||
|
\citation{Katz}
|
||||||
|
\citation{K_Path_Edge}
|
||||||
|
\newlabel{eq:between}{{1}{6}{Betweenness}{equation.4.1}{}}
|
||||||
|
\@writefile{toc}{\contentsline {subsection}{\numberline {4.4}Katz}{6}{subsection.4.4}\protected@file@percent }
|
||||||
|
\newlabel{eq:Katz}{{2}{6}{Katz}{equation.4.2}{}}
|
||||||
|
\newlabel{eq:mod_katz}{{3}{6}{Katz}{equation.4.3}{}}
|
||||||
|
\citation{PageRank}
|
||||||
|
\citation{Adapted_PageRank}
|
||||||
|
\@writefile{toc}{\contentsline {subsection}{\numberline {4.5}K-Path Edge}{7}{subsection.4.5}\protected@file@percent }
|
||||||
|
\newlabel{eq:kpe}{{4}{7}{K-Path Edge}{equation.4.4}{}}
|
||||||
|
\@writefile{toc}{\contentsline {subsection}{\numberline {4.6}Adapted Page Rank}{7}{subsection.4.6}\protected@file@percent }
|
||||||
|
\citation{li_combining_2019}
|
||||||
|
\citation{zeng_cyber_2017}
|
||||||
|
\newlabel{eq:PR}{{5}{8}{Adapted Page Rank}{equation.4.5}{}}
|
||||||
|
\newlabel{eq:APC}{{6}{8}{Adapted Page Rank}{equation.4.6}{}}
|
||||||
|
\@writefile{toc}{\contentsline {section}{\numberline {5}Transitive Closure}{8}{section.5}\protected@file@percent }
|
||||||
|
\@writefile{toc}{\contentsline {subsection}{\numberline {5.1}Introduction and Application}{8}{subsection.5.1}\protected@file@percent }
|
||||||
|
\citation{dominance}
|
||||||
|
\@writefile{lof}{\contentsline {figure}{\numberline {1}{\ignorespaces Example of Transitive Closure\relax }}{9}{figure.caption.3}\protected@file@percent }
|
||||||
|
\newlabel{fig:TC}{{1}{9}{Example of Transitive Closure\relax }{figure.caption.3}{}}
|
||||||
|
\@writefile{toc}{\contentsline {section}{\numberline {6}Dominant Tree}{9}{section.6}\protected@file@percent }
|
||||||
|
\@writefile{toc}{\contentsline {subsection}{\numberline {6.1}Introduction and Application}{9}{subsection.6.1}\protected@file@percent }
|
||||||
|
\@writefile{toc}{\contentsline {section}{\numberline {7}Results and Result Analysis}{10}{section.7}\protected@file@percent }
|
||||||
|
\newlabel{sec:results}{{7}{10}{Results and Result Analysis}{section.7}{}}
|
||||||
|
\@writefile{toc}{\contentsline {subsection}{\numberline {7.1}Results}{10}{subsection.7.1}\protected@file@percent }
|
||||||
|
\@writefile{toc}{\contentsline {subsection}{\numberline {7.2}Result Analysis}{10}{subsection.7.2}\protected@file@percent }
|
||||||
|
\newlabel{fig:preDtree}{{\caption@xref {fig:preDtree}{ on input line 155}}{11}{Introduction and Application}{figure.caption.4}{}}
|
||||||
|
\newlabel{fig:post-Dtree}{{3}{12}{}{figure.caption.5}{}}
|
||||||
|
\@writefile{lot}{\contentsline {table}{\numberline {2}{\ignorespaces Top 15 Nodes with Degree Centrality\relax }}{12}{table.caption.6}\protected@file@percent }
|
||||||
|
\newlabel{table:car-deg}{{2}{12}{Top 15 Nodes with Degree Centrality\relax }{table.caption.6}{}}
|
||||||
|
\@writefile{lot}{\contentsline {table}{\numberline {3}{\ignorespaces Top 15 Nodes with Katz Centrality\relax }}{13}{table.caption.7}\protected@file@percent }
|
||||||
|
\newlabel{table:car-katz}{{3}{13}{Top 15 Nodes with Katz Centrality\relax }{table.caption.7}{}}
|
||||||
|
\@writefile{lot}{\contentsline {table}{\numberline {4}{\ignorespaces Top 15 Nodes with K-path Edge Centrality\relax }}{13}{table.caption.8}\protected@file@percent }
|
||||||
|
\newlabel{table:car-kpe}{{4}{13}{Top 15 Nodes with K-path Edge Centrality\relax }{table.caption.8}{}}
|
||||||
|
\@writefile{lot}{\contentsline {table}{\numberline {5}{\ignorespaces Top 15 Nodes with PageRank Centrality\relax }}{14}{table.caption.9}\protected@file@percent }
|
||||||
|
\newlabel{table:car-APC}{{5}{14}{Top 15 Nodes with PageRank Centrality\relax }{table.caption.9}{}}
|
||||||
|
\@writefile{lot}{\contentsline {table}{\numberline {6}{\ignorespaces Top 15 Nodes with Betweenness Centrality\relax }}{14}{table.caption.10}\protected@file@percent }
|
||||||
|
\newlabel{table:car-betweenness}{{6}{14}{Top 15 Nodes with Betweenness Centrality\relax }{table.caption.10}{}}
|
||||||
|
\@writefile{toc}{\contentsline {section}{\numberline {8}Conclusions and Future Work}{15}{section.8}\protected@file@percent }
|
||||||
|
\@writefile{toc}{\contentsline {subsection}{\numberline {8.1}Conclusions}{15}{subsection.8.1}\protected@file@percent }
|
||||||
|
\@writefile{toc}{\contentsline {subsection}{\numberline {8.2}Future Work}{16}{subsection.8.2}\protected@file@percent }
|
||||||
|
\bibdata{Bibliography}
|
||||||
|
\bibcite{phillips_graph-based_1998}{1}
|
||||||
|
\bibcite{schneier_modeling_1999}{2}
|
||||||
|
\bibcite{j_hale_compliance_nodate}{3}
|
||||||
|
\bibcite{baloyi_guidelines_2019}{4}
|
||||||
|
\bibcite{allman_complying_2006}{5}
|
||||||
|
\bibcite{newman2010networks}{6}
|
||||||
|
\bibcite{Mieghem2018DirectedGA}{7}
|
||||||
|
\bibcite{ming_diss}{8}
|
||||||
|
\bibcite{Guo2017HermitianAM}{9}
|
||||||
|
\bibcite{Brualdi2010SpectraOD}{10}
|
||||||
|
\bibcite{noauthor_health_1996}{11}
|
||||||
|
\bibcite{PCI}{12}
|
||||||
|
\bibcite{PMID:30064421}{13}
|
||||||
|
\bibcite{Katz}{14}
|
||||||
|
\bibcite{K_Path_Edge}{15}
|
||||||
|
\@writefile{toc}{\contentsline {section}{Bibliography}{17}{subsection.8.2}\protected@file@percent }
|
||||||
|
\bibcite{PageRank}{16}
|
||||||
|
\bibcite{Adapted_PageRank}{17}
|
||||||
|
\bibcite{li_combining_2019}{18}
|
||||||
|
\bibcite{zeng_cyber_2017}{19}
|
||||||
|
\bibcite{dominance}{20}
|
||||||
|
\bibstyle{ieeetr}
|
||||||
|
\@input{Appendices.aux}
|
||||||
|
\gdef \@abspage@last{25}
|
||||||
100
Schrick-Noah_CS-7863_Final-Report.bbl
Normal file
100
Schrick-Noah_CS-7863_Final-Report.bbl
Normal file
@ -0,0 +1,100 @@
|
|||||||
|
\begin{thebibliography}{10}
|
||||||
|
|
||||||
|
\bibitem{phillips_graph-based_1998}
|
||||||
|
C.~Phillips and L.~P. Swiler, ``A graph-based system for network-vulnerability
|
||||||
|
analysis,'' {\em Proceedings New Security Paradigms Workshop}, vol.~Part
|
||||||
|
F1292, pp.~71--79, 1998.
|
||||||
|
\newblock doi: 10.1145/310889.310919.
|
||||||
|
|
||||||
|
\bibitem{schneier_modeling_1999}
|
||||||
|
B.~Schneier, ``Modeling {Security} {Threats},'' {\em Dr. Dobb's Journal}, 1999.
|
||||||
|
\newblock vol. 24, no.12.
|
||||||
|
|
||||||
|
\bibitem{j_hale_compliance_nodate}
|
||||||
|
{J. Hale}, P.~Hawrylak, and M.~Papa, ``Compliance {Method} for a
|
||||||
|
{Cyber}-{Physical} {System}.''
|
||||||
|
\newblock U.S. Patent Number 9,471,789, Oct. 18, 2016.
|
||||||
|
|
||||||
|
\bibitem{baloyi_guidelines_2019}
|
||||||
|
N.~Baloyi and P.~Kotzé, ``Guidelines for {Data} {Privacy} {Compliance}: {A}
|
||||||
|
{Focus} on {Cyberphysical} {Systems} and {Internet} of {Things},'' in {\em
|
||||||
|
{SAICSIT} '19: {Proceedings} of the {South} {African} {Institute} of
|
||||||
|
{Computer} {Scientists} and {Information} {Technologists} 2019}, (Skukuza
|
||||||
|
South Africa), Association for Computing Machinery, 2019.
|
||||||
|
|
||||||
|
\bibitem{allman_complying_2006}
|
||||||
|
E.~Allman, ``Complying with {Compliance}: {Blowing} it off is not an option.,''
|
||||||
|
{\em ACM Queue}, vol.~4, no.~7, 2006.
|
||||||
|
|
||||||
|
\bibitem{newman2010networks}
|
||||||
|
M.~Newman, {\em Networks: An Introduction}.
|
||||||
|
\newblock Oxford University Press, 2010.
|
||||||
|
|
||||||
|
\bibitem{Mieghem2018DirectedGA}
|
||||||
|
P.~V. Mieghem, ``Directed graphs and mysterious complex eigenvalues,'' 2018.
|
||||||
|
|
||||||
|
\bibitem{ming_diss}
|
||||||
|
M.~Li, {\em {A} {System} for {Attack} {Graph} {Generation} and {Analysis}}.
|
||||||
|
\newblock PhD thesis, The {University} of {Tulsa}, 2021.
|
||||||
|
|
||||||
|
\bibitem{Guo2017HermitianAM}
|
||||||
|
K.~Guo and B.~Mohar, ``Hermitian adjacency matrix of digraphs and mixed
|
||||||
|
graphs,'' {\em Journal of Graph Theory}, vol.~85, 2017.
|
||||||
|
|
||||||
|
\bibitem{Brualdi2010SpectraOD}
|
||||||
|
R.~A. Brualdi, ``Spectra of digraphs,'' {\em Linear Algebra and its
|
||||||
|
Applications}, vol.~432, pp.~2181--2213, 2010.
|
||||||
|
|
||||||
|
\bibitem{noauthor_health_1996}
|
||||||
|
``Health {Insurance} {Portability} and {Accountability} {Act} of 1996.''
|
||||||
|
\newblock Pub. L. No. 104-191. 1996 [Online]. Available:
|
||||||
|
https://www.govinfo.gov/content/pkg/PLAW-104publ191/html/PLAW-104publ191.htm.
|
||||||
|
|
||||||
|
\bibitem{PCI}
|
||||||
|
P.~S.~S. Council, ``Payment {Card} {Industry} {(PCI)} {Data} {Security}
|
||||||
|
{Standard},'' May 2018.
|
||||||
|
\newblock {Available:
|
||||||
|
https://www.pcisecuritystandards.org/documents/PCI$\_$DSS$\_$v3-2-1.pdf}.
|
||||||
|
|
||||||
|
\bibitem{PMID:30064421}
|
||||||
|
M.~Ashtiani, A.~Salehzadeh-Yazdi, Z.~Razaghi-Moghadam, H.~Hennig,
|
||||||
|
O.~Wolkenhauer, M.~Mirzaie, and M.~Jafari, ``A systematic survey of
|
||||||
|
centrality measures for protein-protein interaction networks,'' {\em BMC
|
||||||
|
systems biology}, vol.~12, p.~80, July 2018.
|
||||||
|
|
||||||
|
\bibitem{Katz}
|
||||||
|
L.~Katz, ``{A new status index derived from sociometric analysis},'' {\em
|
||||||
|
Psychometrika}, vol.~18, pp.~39--43, March 1953.
|
||||||
|
|
||||||
|
\bibitem{K_Path_Edge}
|
||||||
|
P.~D. Meo, E.~Ferrara, G.~Fiumara, and A.~Ricciardello, ``A novel measure of
|
||||||
|
edge centrality in social networks,'' {\em Knowledge-Based Systems}, vol.~30,
|
||||||
|
pp.~136--150, jun 2012.
|
||||||
|
|
||||||
|
\bibitem{PageRank}
|
||||||
|
S.~Brin and L.~Page, ``The anatomy of a large-scale hypertextual web search
|
||||||
|
engine,'' {\em Computer Networks and ISDN Systems}, vol.~30, no.~1,
|
||||||
|
pp.~107--117, 1998.
|
||||||
|
\newblock Proceedings of the Seventh International World Wide Web Conference.
|
||||||
|
|
||||||
|
\bibitem{Adapted_PageRank}
|
||||||
|
T.~Agryzkov, J.~L. Oliver, L.~Tortosa, and J.-F. Vicent, ``An algorithm for
|
||||||
|
ranking the nodes of an urban network based on the concept of pagerank
|
||||||
|
vector,'' {\em Appl. Math. Comput.}, vol.~219, pp.~2186--2193, 2012.
|
||||||
|
|
||||||
|
\bibitem{li_combining_2019}
|
||||||
|
M.~Li, P.~Hawrylak, and J.~Hale, ``Combining {OpenCL} and {MPI} to support
|
||||||
|
heterogeneous computing on a cluster,'' {\em ACM International Conference
|
||||||
|
Proceeding Series}, 2019.
|
||||||
|
|
||||||
|
\bibitem{zeng_cyber_2017}
|
||||||
|
K.~Zeng, ``Cyber {Attack} {Analysis} {Based} on {Markov} {Process} {Model},''
|
||||||
|
2017.
|
||||||
|
|
||||||
|
\bibitem{dominance}
|
||||||
|
R.~T. Prosser, ``Applications of boolean matrices to the analysis of flow
|
||||||
|
diagrams,'' in {\em Papers Presented at the December 1-3, 1959, Eastern Joint
|
||||||
|
IRE-AIEE-ACM Computer Conference}, IRE-AIEE-ACM '59 (Eastern), (New York, NY,
|
||||||
|
USA), p.~133–138, Association for Computing Machinery, 1959.
|
||||||
|
|
||||||
|
\end{thebibliography}
|
||||||
49
Schrick-Noah_CS-7863_Final-Report.blg
Normal file
49
Schrick-Noah_CS-7863_Final-Report.blg
Normal file
@ -0,0 +1,49 @@
|
|||||||
|
This is BibTeX, Version 0.99d (TeX Live 2022/Arch Linux)
|
||||||
|
Capacity: max_strings=200000, hash_size=200000, hash_prime=170003
|
||||||
|
The top-level auxiliary file: Schrick-Noah_CS-7863_Final-Report.aux
|
||||||
|
The style file: ieeetr.bst
|
||||||
|
Database file #1: Bibliography.bib
|
||||||
|
Warning--empty booktitle in Mieghem2018DirectedGA
|
||||||
|
Warning--empty journal in zeng_cyber_2017
|
||||||
|
You've used 20 entries,
|
||||||
|
1876 wiz_defined-function locations,
|
||||||
|
600 strings with 6995 characters,
|
||||||
|
and the built_in function-call counts, 4345 in all, are:
|
||||||
|
= -- 431
|
||||||
|
> -- 146
|
||||||
|
< -- 0
|
||||||
|
+ -- 59
|
||||||
|
- -- 39
|
||||||
|
* -- 272
|
||||||
|
:= -- 621
|
||||||
|
add.period$ -- 26
|
||||||
|
call.type$ -- 20
|
||||||
|
change.case$ -- 18
|
||||||
|
chr.to.int$ -- 0
|
||||||
|
cite$ -- 22
|
||||||
|
duplicate$ -- 241
|
||||||
|
empty$ -- 445
|
||||||
|
format.name$ -- 39
|
||||||
|
if$ -- 1078
|
||||||
|
int.to.chr$ -- 0
|
||||||
|
int.to.str$ -- 20
|
||||||
|
missing$ -- 17
|
||||||
|
newline$ -- 71
|
||||||
|
num.names$ -- 19
|
||||||
|
pop$ -- 78
|
||||||
|
preamble$ -- 1
|
||||||
|
purify$ -- 0
|
||||||
|
quote$ -- 0
|
||||||
|
skip$ -- 147
|
||||||
|
stack$ -- 0
|
||||||
|
substring$ -- 198
|
||||||
|
swap$ -- 85
|
||||||
|
text.length$ -- 0
|
||||||
|
text.prefix$ -- 0
|
||||||
|
top$ -- 0
|
||||||
|
type$ -- 0
|
||||||
|
warning$ -- 2
|
||||||
|
while$ -- 35
|
||||||
|
width$ -- 22
|
||||||
|
write$ -- 193
|
||||||
|
(There were 2 warnings)
|
||||||
723
Schrick-Noah_CS-7863_Final-Report.log
Normal file
723
Schrick-Noah_CS-7863_Final-Report.log
Normal file
@ -0,0 +1,723 @@
|
|||||||
|
This is pdfTeX, Version 3.141592653-2.6-1.40.24 (TeX Live 2022/Arch Linux) (preloaded format=pdflatex 2022.4.29) 3 MAY 2022 00:28
|
||||||
|
entering extended mode
|
||||||
|
restricted \write18 enabled.
|
||||||
|
%&-line parsing enabled.
|
||||||
|
**Schrick-Noah_CS-7863_Final-Report.tex
|
||||||
|
(./Schrick-Noah_CS-7863_Final-Report.tex
|
||||||
|
LaTeX2e <2021-11-15> patch level 1
|
||||||
|
L3 programming layer <2022-04-10>
|
||||||
|
(/usr/share/texmf-dist/tex/latex/setspace/setspace.sty
|
||||||
|
Package: setspace 2011/12/19 v6.7a set line spacing
|
||||||
|
)
|
||||||
|
(/usr/share/texmf-dist/tex/latex/base/article.cls
|
||||||
|
Document Class: article 2021/10/04 v1.4n Standard LaTeX document class
|
||||||
|
(/usr/share/texmf-dist/tex/latex/base/size10.clo
|
||||||
|
File: size10.clo 2021/10/04 v1.4n Standard LaTeX file (size option)
|
||||||
|
)
|
||||||
|
\c@part=\count185
|
||||||
|
\c@section=\count186
|
||||||
|
\c@subsection=\count187
|
||||||
|
\c@subsubsection=\count188
|
||||||
|
\c@paragraph=\count189
|
||||||
|
\c@subparagraph=\count190
|
||||||
|
\c@figure=\count191
|
||||||
|
\c@table=\count192
|
||||||
|
\abovecaptionskip=\skip47
|
||||||
|
\belowcaptionskip=\skip48
|
||||||
|
\bibindent=\dimen138
|
||||||
|
)
|
||||||
|
(/usr/share/texmf-dist/tex/latex/boxedminipage/boxedminipage.sty
|
||||||
|
Package: boxedminipage 2020/04/19 v1.1 Boxed LaTeX2e minipages
|
||||||
|
\bmp@box=\box50
|
||||||
|
\bmp@width=\skip49
|
||||||
|
\bmp@height=\skip50
|
||||||
|
)
|
||||||
|
(/usr/share/texmf-dist/tex/latex/graphics/graphicx.sty
|
||||||
|
Package: graphicx 2021/09/16 v1.2d Enhanced LaTeX Graphics (DPC,SPQR)
|
||||||
|
|
||||||
|
(/usr/share/texmf-dist/tex/latex/graphics/keyval.sty
|
||||||
|
Package: keyval 2014/10/28 v1.15 key=value parser (DPC)
|
||||||
|
\KV@toks@=\toks16
|
||||||
|
)
|
||||||
|
(/usr/share/texmf-dist/tex/latex/graphics/graphics.sty
|
||||||
|
Package: graphics 2021/03/04 v1.4d Standard LaTeX Graphics (DPC,SPQR)
|
||||||
|
|
||||||
|
(/usr/share/texmf-dist/tex/latex/graphics/trig.sty
|
||||||
|
Package: trig 2021/08/11 v1.11 sin cos tan (DPC)
|
||||||
|
)
|
||||||
|
(/usr/share/texmf-dist/tex/latex/graphics-cfg/graphics.cfg
|
||||||
|
File: graphics.cfg 2016/06/04 v1.11 sample graphics configuration
|
||||||
|
)
|
||||||
|
Package graphics Info: Driver file: pdftex.def on input line 107.
|
||||||
|
|
||||||
|
(/usr/share/texmf-dist/tex/latex/graphics-def/pdftex.def
|
||||||
|
File: pdftex.def 2020/10/05 v1.2a Graphics/color driver for pdftex
|
||||||
|
))
|
||||||
|
\Gin@req@height=\dimen139
|
||||||
|
\Gin@req@width=\dimen140
|
||||||
|
)
|
||||||
|
(/usr/share/texmf-dist/tex/latex/caption/subcaption.sty
|
||||||
|
Package: subcaption 2022/01/07 v1.5 Sub-captions (AR)
|
||||||
|
|
||||||
|
(/usr/share/texmf-dist/tex/latex/caption/caption.sty
|
||||||
|
Package: caption 2022/03/01 v3.6b Customizing captions (AR)
|
||||||
|
|
||||||
|
(/usr/share/texmf-dist/tex/latex/caption/caption3.sty
|
||||||
|
Package: caption3 2022/03/17 v2.3b caption3 kernel (AR)
|
||||||
|
\caption@tempdima=\dimen141
|
||||||
|
\captionmargin=\dimen142
|
||||||
|
\caption@leftmargin=\dimen143
|
||||||
|
\caption@rightmargin=\dimen144
|
||||||
|
\caption@width=\dimen145
|
||||||
|
\caption@indent=\dimen146
|
||||||
|
\caption@parindent=\dimen147
|
||||||
|
\caption@hangindent=\dimen148
|
||||||
|
Package caption Info: Standard document class detected.
|
||||||
|
)
|
||||||
|
\c@caption@flags=\count193
|
||||||
|
\c@continuedfloat=\count194
|
||||||
|
)
|
||||||
|
\c@subfigure=\count195
|
||||||
|
\c@subtable=\count196
|
||||||
|
)
|
||||||
|
(/usr/share/texmf-dist/tex/latex/algorithms/algorithm.sty
|
||||||
|
Package: algorithm 2009/08/24 v0.1 Document Style `algorithm' - floating enviro
|
||||||
|
nment
|
||||||
|
|
||||||
|
(/usr/share/texmf-dist/tex/latex/float/float.sty
|
||||||
|
Package: float 2001/11/08 v1.3d Float enhancements (AL)
|
||||||
|
\c@float@type=\count197
|
||||||
|
\float@exts=\toks17
|
||||||
|
\float@box=\box51
|
||||||
|
\@float@everytoks=\toks18
|
||||||
|
\@floatcapt=\box52
|
||||||
|
)
|
||||||
|
(/usr/share/texmf-dist/tex/latex/base/ifthen.sty
|
||||||
|
Package: ifthen 2020/11/24 v1.1c Standard LaTeX ifthen package (DPC)
|
||||||
|
)
|
||||||
|
\@float@every@algorithm=\toks19
|
||||||
|
\c@algorithm=\count198
|
||||||
|
)
|
||||||
|
(/usr/share/texmf-dist/tex/latex/algorithmicx/algpseudocode.sty
|
||||||
|
Package: algpseudocode
|
||||||
|
|
||||||
|
(/usr/share/texmf-dist/tex/latex/algorithmicx/algorithmicx.sty
|
||||||
|
Package: algorithmicx 2005/04/27 v1.2 Algorithmicx
|
||||||
|
|
||||||
|
Document Style algorithmicx 1.2 - a greatly improved `algorithmic' style
|
||||||
|
\c@ALG@line=\count199
|
||||||
|
\c@ALG@rem=\count266
|
||||||
|
\c@ALG@nested=\count267
|
||||||
|
\ALG@tlm=\skip51
|
||||||
|
\ALG@thistlm=\skip52
|
||||||
|
\c@ALG@Lnr=\count268
|
||||||
|
\c@ALG@blocknr=\count269
|
||||||
|
\c@ALG@storecount=\count270
|
||||||
|
\c@ALG@tmpcounter=\count271
|
||||||
|
\ALG@tmplength=\skip53
|
||||||
|
)
|
||||||
|
Document Style - pseudocode environments for use with the `algorithmicx' style
|
||||||
|
) (/usr/share/texmf-dist/tex/generic/iftex/ifpdf.sty
|
||||||
|
Package: ifpdf 2019/10/25 v3.4 ifpdf legacy package. Use iftex instead.
|
||||||
|
|
||||||
|
(/usr/share/texmf-dist/tex/generic/iftex/iftex.sty
|
||||||
|
Package: iftex 2022/02/03 v1.0f TeX engine tests
|
||||||
|
))
|
||||||
|
(/usr/share/texmf-dist/tex/generic/babel/babel.sty
|
||||||
|
Package: babel 2022/02/26 3.73 The Babel package
|
||||||
|
\babel@savecnt=\count272
|
||||||
|
\U@D=\dimen149
|
||||||
|
\l@unhyphenated=\language87
|
||||||
|
|
||||||
|
(/usr/share/texmf-dist/tex/generic/babel/txtbabel.def)
|
||||||
|
\bbl@readstream=\read2
|
||||||
|
\bbl@dirlevel=\count273
|
||||||
|
Package babel Info: You haven't specified a language. I'll use 'nil'
|
||||||
|
(babel) as the main language. Reported on input line 4305.
|
||||||
|
|
||||||
|
(/usr/share/texmf-dist/tex/generic/babel/nil.ldf
|
||||||
|
Language: nil 2022/02/26 3.73 Nil language
|
||||||
|
\l@nil=\language88
|
||||||
|
))
|
||||||
|
(/usr/share/texmf-dist/tex/latex/doublestroke/dsfont.sty
|
||||||
|
Package: dsfont 1995/08/01 v0.1 Double stroke roman fonts
|
||||||
|
)
|
||||||
|
(/usr/share/texmf-dist/tex/latex/xcolor/xcolor.sty
|
||||||
|
Package: xcolor 2021/10/31 v2.13 LaTeX color extensions (UK)
|
||||||
|
|
||||||
|
(/usr/share/texmf-dist/tex/latex/graphics-cfg/color.cfg
|
||||||
|
File: color.cfg 2016/01/02 v1.6 sample color configuration
|
||||||
|
)
|
||||||
|
Package xcolor Info: Driver file: pdftex.def on input line 227.
|
||||||
|
|
||||||
|
(/usr/share/texmf-dist/tex/latex/colortbl/colortbl.sty
|
||||||
|
Package: colortbl 2020/01/04 v1.0e Color table columns (DPC)
|
||||||
|
|
||||||
|
(/usr/share/texmf-dist/tex/latex/tools/array.sty
|
||||||
|
Package: array 2021/10/04 v2.5f Tabular extension package (FMi)
|
||||||
|
\col@sep=\dimen150
|
||||||
|
\ar@mcellbox=\box53
|
||||||
|
\extrarowheight=\dimen151
|
||||||
|
\NC@list=\toks20
|
||||||
|
\extratabsurround=\skip54
|
||||||
|
\backup@length=\skip55
|
||||||
|
\ar@cellbox=\box54
|
||||||
|
)
|
||||||
|
\everycr=\toks21
|
||||||
|
\minrowclearance=\skip56
|
||||||
|
)
|
||||||
|
\rownum=\count274
|
||||||
|
Package xcolor Info: Model `cmy' substituted by `cmy0' on input line 1352.
|
||||||
|
Package xcolor Info: Model `hsb' substituted by `rgb' on input line 1356.
|
||||||
|
Package xcolor Info: Model `RGB' extended on input line 1368.
|
||||||
|
Package xcolor Info: Model `HTML' substituted by `rgb' on input line 1370.
|
||||||
|
Package xcolor Info: Model `Hsb' substituted by `hsb' on input line 1371.
|
||||||
|
Package xcolor Info: Model `tHsb' substituted by `hsb' on input line 1372.
|
||||||
|
Package xcolor Info: Model `HSB' substituted by `hsb' on input line 1373.
|
||||||
|
Package xcolor Info: Model `Gray' substituted by `gray' on input line 1374.
|
||||||
|
Package xcolor Info: Model `wave' substituted by `hsb' on input line 1375.
|
||||||
|
)
|
||||||
|
(/usr/share/texmf-dist/tex/latex/hyperref/hyperref.sty
|
||||||
|
Package: hyperref 2022-02-21 v7.00n Hypertext links for LaTeX
|
||||||
|
|
||||||
|
(/usr/share/texmf-dist/tex/generic/ltxcmds/ltxcmds.sty
|
||||||
|
Package: ltxcmds 2020-05-10 v1.25 LaTeX kernel commands for general use (HO)
|
||||||
|
)
|
||||||
|
(/usr/share/texmf-dist/tex/generic/pdftexcmds/pdftexcmds.sty
|
||||||
|
Package: pdftexcmds 2020-06-27 v0.33 Utility functions of pdfTeX for LuaTeX (HO
|
||||||
|
)
|
||||||
|
|
||||||
|
(/usr/share/texmf-dist/tex/generic/infwarerr/infwarerr.sty
|
||||||
|
Package: infwarerr 2019/12/03 v1.5 Providing info/warning/error messages (HO)
|
||||||
|
)
|
||||||
|
Package pdftexcmds Info: \pdf@primitive is available.
|
||||||
|
Package pdftexcmds Info: \pdf@ifprimitive is available.
|
||||||
|
Package pdftexcmds Info: \pdfdraftmode found.
|
||||||
|
)
|
||||||
|
(/usr/share/texmf-dist/tex/generic/kvsetkeys/kvsetkeys.sty
|
||||||
|
Package: kvsetkeys 2019/12/15 v1.18 Key value parser (HO)
|
||||||
|
)
|
||||||
|
(/usr/share/texmf-dist/tex/generic/kvdefinekeys/kvdefinekeys.sty
|
||||||
|
Package: kvdefinekeys 2019-12-19 v1.6 Define keys (HO)
|
||||||
|
)
|
||||||
|
(/usr/share/texmf-dist/tex/generic/pdfescape/pdfescape.sty
|
||||||
|
Package: pdfescape 2019/12/09 v1.15 Implements pdfTeX's escape features (HO)
|
||||||
|
)
|
||||||
|
(/usr/share/texmf-dist/tex/latex/hycolor/hycolor.sty
|
||||||
|
Package: hycolor 2020-01-27 v1.10 Color options for hyperref/bookmark (HO)
|
||||||
|
)
|
||||||
|
(/usr/share/texmf-dist/tex/latex/letltxmacro/letltxmacro.sty
|
||||||
|
Package: letltxmacro 2019/12/03 v1.6 Let assignment for LaTeX macros (HO)
|
||||||
|
)
|
||||||
|
(/usr/share/texmf-dist/tex/latex/auxhook/auxhook.sty
|
||||||
|
Package: auxhook 2019-12-17 v1.6 Hooks for auxiliary files (HO)
|
||||||
|
)
|
||||||
|
(/usr/share/texmf-dist/tex/latex/kvoptions/kvoptions.sty
|
||||||
|
Package: kvoptions 2020-10-07 v3.14 Key value format for package options (HO)
|
||||||
|
)
|
||||||
|
\@linkdim=\dimen152
|
||||||
|
\Hy@linkcounter=\count275
|
||||||
|
\Hy@pagecounter=\count276
|
||||||
|
|
||||||
|
(/usr/share/texmf-dist/tex/latex/hyperref/pd1enc.def
|
||||||
|
File: pd1enc.def 2022-02-21 v7.00n Hyperref: PDFDocEncoding definition (HO)
|
||||||
|
Now handling font encoding PD1 ...
|
||||||
|
... no UTF-8 mapping file for font encoding PD1
|
||||||
|
)
|
||||||
|
(/usr/share/texmf-dist/tex/generic/intcalc/intcalc.sty
|
||||||
|
Package: intcalc 2019/12/15 v1.3 Expandable calculations with integers (HO)
|
||||||
|
)
|
||||||
|
(/usr/share/texmf-dist/tex/generic/etexcmds/etexcmds.sty
|
||||||
|
Package: etexcmds 2019/12/15 v1.7 Avoid name clashes with e-TeX commands (HO)
|
||||||
|
)
|
||||||
|
\Hy@SavedSpaceFactor=\count277
|
||||||
|
|
||||||
|
(/usr/share/texmf-dist/tex/latex/hyperref/puenc.def
|
||||||
|
File: puenc.def 2022-02-21 v7.00n Hyperref: PDF Unicode definition (HO)
|
||||||
|
Now handling font encoding PU ...
|
||||||
|
... no UTF-8 mapping file for font encoding PU
|
||||||
|
)
|
||||||
|
Package hyperref Info: Hyper figures OFF on input line 4137.
|
||||||
|
Package hyperref Info: Link nesting OFF on input line 4142.
|
||||||
|
Package hyperref Info: Hyper index ON on input line 4145.
|
||||||
|
Package hyperref Info: Plain pages OFF on input line 4152.
|
||||||
|
Package hyperref Info: Backreferencing OFF on input line 4157.
|
||||||
|
Package hyperref Info: Implicit mode ON; LaTeX internals redefined.
|
||||||
|
Package hyperref Info: Bookmarks ON on input line 4390.
|
||||||
|
\c@Hy@tempcnt=\count278
|
||||||
|
|
||||||
|
(/usr/share/texmf-dist/tex/latex/url/url.sty
|
||||||
|
\Urlmuskip=\muskip16
|
||||||
|
Package: url 2013/09/16 ver 3.4 Verb mode for urls, etc.
|
||||||
|
)
|
||||||
|
LaTeX Info: Redefining \url on input line 4749.
|
||||||
|
\XeTeXLinkMargin=\dimen153
|
||||||
|
|
||||||
|
(/usr/share/texmf-dist/tex/generic/bitset/bitset.sty
|
||||||
|
Package: bitset 2019/12/09 v1.3 Handle bit-vector datatype (HO)
|
||||||
|
|
||||||
|
(/usr/share/texmf-dist/tex/generic/bigintcalc/bigintcalc.sty
|
||||||
|
Package: bigintcalc 2019/12/15 v1.5 Expandable calculations on big integers (HO
|
||||||
|
)
|
||||||
|
))
|
||||||
|
\Fld@menulength=\count279
|
||||||
|
\Field@Width=\dimen154
|
||||||
|
\Fld@charsize=\dimen155
|
||||||
|
Package hyperref Info: Hyper figures OFF on input line 6027.
|
||||||
|
Package hyperref Info: Link nesting OFF on input line 6032.
|
||||||
|
Package hyperref Info: Hyper index ON on input line 6035.
|
||||||
|
Package hyperref Info: backreferencing OFF on input line 6042.
|
||||||
|
Package hyperref Info: Link coloring OFF on input line 6047.
|
||||||
|
Package hyperref Info: Link coloring with OCG OFF on input line 6052.
|
||||||
|
Package hyperref Info: PDF/A mode OFF on input line 6057.
|
||||||
|
LaTeX Info: Redefining \ref on input line 6097.
|
||||||
|
LaTeX Info: Redefining \pageref on input line 6101.
|
||||||
|
|
||||||
|
(/usr/share/texmf-dist/tex/latex/base/atbegshi-ltx.sty
|
||||||
|
Package: atbegshi-ltx 2021/01/10 v1.0c Emulation of the original atbegshi
|
||||||
|
package with kernel methods
|
||||||
|
)
|
||||||
|
\Hy@abspage=\count280
|
||||||
|
\c@Item=\count281
|
||||||
|
\c@Hfootnote=\count282
|
||||||
|
)
|
||||||
|
Package hyperref Info: Driver (autodetected): hpdftex.
|
||||||
|
|
||||||
|
(/usr/share/texmf-dist/tex/latex/hyperref/hpdftex.def
|
||||||
|
File: hpdftex.def 2022-02-21 v7.00n Hyperref driver for pdfTeX
|
||||||
|
|
||||||
|
(/usr/share/texmf-dist/tex/latex/base/atveryend-ltx.sty
|
||||||
|
Package: atveryend-ltx 2020/08/19 v1.0a Emulation of the original atveryend pac
|
||||||
|
kage
|
||||||
|
with kernel methods
|
||||||
|
)
|
||||||
|
\Fld@listcount=\count283
|
||||||
|
\c@bookmark@seq@number=\count284
|
||||||
|
|
||||||
|
(/usr/share/texmf-dist/tex/latex/rerunfilecheck/rerunfilecheck.sty
|
||||||
|
Package: rerunfilecheck 2019/12/05 v1.9 Rerun checks for auxiliary files (HO)
|
||||||
|
|
||||||
|
(/usr/share/texmf-dist/tex/generic/uniquecounter/uniquecounter.sty
|
||||||
|
Package: uniquecounter 2019/12/15 v1.4 Provide unlimited unique counter (HO)
|
||||||
|
)
|
||||||
|
Package uniquecounter Info: New unique counter `rerunfilecheck' on input line 2
|
||||||
|
86.
|
||||||
|
)
|
||||||
|
\Hy@SectionHShift=\skip57
|
||||||
|
)
|
||||||
|
Package hyperref Info: Option `colorlinks' set `true' on input line 20.
|
||||||
|
|
||||||
|
(/usr/share/texmf-dist/tex/latex/base/inputenc.sty
|
||||||
|
Package: inputenc 2021/02/14 v1.3d Input encoding file
|
||||||
|
\inpenc@prehook=\toks22
|
||||||
|
\inpenc@posthook=\toks23
|
||||||
|
)
|
||||||
|
(/usr/share/texmf-dist/tex/latex/tools/indentfirst.sty
|
||||||
|
Package: indentfirst 1995/11/23 v1.03 Indent first paragraph (DPC)
|
||||||
|
)
|
||||||
|
(/usr/share/texmf-dist/tex/latex/tocloft/tocloft.sty
|
||||||
|
Package: tocloft 2017/08/31 v2.3i parameterised ToC, etc., typesetting
|
||||||
|
Package tocloft Info: The document has section divisions on input line 51.
|
||||||
|
\cftparskip=\skip58
|
||||||
|
\cftbeforetoctitleskip=\skip59
|
||||||
|
\cftaftertoctitleskip=\skip60
|
||||||
|
\cftbeforepartskip=\skip61
|
||||||
|
\cftpartnumwidth=\skip62
|
||||||
|
\cftpartindent=\skip63
|
||||||
|
\cftbeforesecskip=\skip64
|
||||||
|
\cftsecindent=\skip65
|
||||||
|
\cftsecnumwidth=\skip66
|
||||||
|
\cftbeforesubsecskip=\skip67
|
||||||
|
\cftsubsecindent=\skip68
|
||||||
|
\cftsubsecnumwidth=\skip69
|
||||||
|
\cftbeforesubsubsecskip=\skip70
|
||||||
|
\cftsubsubsecindent=\skip71
|
||||||
|
\cftsubsubsecnumwidth=\skip72
|
||||||
|
\cftbeforeparaskip=\skip73
|
||||||
|
\cftparaindent=\skip74
|
||||||
|
\cftparanumwidth=\skip75
|
||||||
|
\cftbeforesubparaskip=\skip76
|
||||||
|
\cftsubparaindent=\skip77
|
||||||
|
\cftsubparanumwidth=\skip78
|
||||||
|
\cftbeforeloftitleskip=\skip79
|
||||||
|
\cftafterloftitleskip=\skip80
|
||||||
|
\cftbeforefigskip=\skip81
|
||||||
|
\cftfigindent=\skip82
|
||||||
|
\cftfignumwidth=\skip83
|
||||||
|
\c@lofdepth=\count285
|
||||||
|
\c@lotdepth=\count286
|
||||||
|
\cftbeforelottitleskip=\skip84
|
||||||
|
\cftafterlottitleskip=\skip85
|
||||||
|
\cftbeforetabskip=\skip86
|
||||||
|
\cfttabindent=\skip87
|
||||||
|
\cfttabnumwidth=\skip88
|
||||||
|
)
|
||||||
|
(/usr/share/texmf-dist/tex/latex/l3backend/l3backend-pdftex.def
|
||||||
|
File: l3backend-pdftex.def 2022-04-14 L3 backend support: PDF output (pdfTeX)
|
||||||
|
\l__color_backend_stack_int=\count287
|
||||||
|
\l__pdf_internal_box=\box55
|
||||||
|
)
|
||||||
|
(./Schrick-Noah_CS-7863_Final-Report.aux (./Appendices.aux))
|
||||||
|
\openout1 = `Schrick-Noah_CS-7863_Final-Report.aux'.
|
||||||
|
|
||||||
|
LaTeX Font Info: Checking defaults for OML/cmm/m/it on input line 36.
|
||||||
|
LaTeX Font Info: ... okay on input line 36.
|
||||||
|
LaTeX Font Info: Checking defaults for OMS/cmsy/m/n on input line 36.
|
||||||
|
LaTeX Font Info: ... okay on input line 36.
|
||||||
|
LaTeX Font Info: Checking defaults for OT1/cmr/m/n on input line 36.
|
||||||
|
LaTeX Font Info: ... okay on input line 36.
|
||||||
|
LaTeX Font Info: Checking defaults for T1/cmr/m/n on input line 36.
|
||||||
|
LaTeX Font Info: ... okay on input line 36.
|
||||||
|
LaTeX Font Info: Checking defaults for TS1/cmr/m/n on input line 36.
|
||||||
|
LaTeX Font Info: ... okay on input line 36.
|
||||||
|
LaTeX Font Info: Checking defaults for OMX/cmex/m/n on input line 36.
|
||||||
|
LaTeX Font Info: ... okay on input line 36.
|
||||||
|
LaTeX Font Info: Checking defaults for U/cmr/m/n on input line 36.
|
||||||
|
LaTeX Font Info: ... okay on input line 36.
|
||||||
|
LaTeX Font Info: Checking defaults for PD1/pdf/m/n on input line 36.
|
||||||
|
LaTeX Font Info: ... okay on input line 36.
|
||||||
|
LaTeX Font Info: Checking defaults for PU/pdf/m/n on input line 36.
|
||||||
|
LaTeX Font Info: ... okay on input line 36.
|
||||||
|
|
||||||
|
(/usr/share/texmf-dist/tex/context/base/mkii/supp-pdf.mkii
|
||||||
|
[Loading MPS to PDF converter (version 2006.09.02).]
|
||||||
|
\scratchcounter=\count288
|
||||||
|
\scratchdimen=\dimen156
|
||||||
|
\scratchbox=\box56
|
||||||
|
\nofMPsegments=\count289
|
||||||
|
\nofMParguments=\count290
|
||||||
|
\everyMPshowfont=\toks24
|
||||||
|
\MPscratchCnt=\count291
|
||||||
|
\MPscratchDim=\dimen157
|
||||||
|
\MPnumerator=\count292
|
||||||
|
\makeMPintoPDFobject=\count293
|
||||||
|
\everyMPtoPDFconversion=\toks25
|
||||||
|
) (/usr/share/texmf-dist/tex/latex/epstopdf-pkg/epstopdf-base.sty
|
||||||
|
Package: epstopdf-base 2020-01-24 v2.11 Base part for package epstopdf
|
||||||
|
|
||||||
|
(/usr/share/texmf-dist/tex/latex/grfext/grfext.sty
|
||||||
|
Package: grfext 2019/12/03 v1.3 Manage graphics extensions (HO)
|
||||||
|
)
|
||||||
|
Package epstopdf-base Info: Redefining graphics rule for `.eps' on input line 4
|
||||||
|
85.
|
||||||
|
Package grfext Info: Graphics extension search list:
|
||||||
|
(grfext) [.pdf,.png,.jpg,.mps,.jpeg,.jbig2,.jb2,.PDF,.PNG,.JPG,.JPE
|
||||||
|
G,.JBIG2,.JB2,.eps]
|
||||||
|
(grfext) \AppendGraphicsExtensions on input line 504.
|
||||||
|
|
||||||
|
(/usr/share/texmf-dist/tex/latex/latexconfig/epstopdf-sys.cfg
|
||||||
|
File: epstopdf-sys.cfg 2010/07/13 v1.3 Configuration of (r)epstopdf for TeX Liv
|
||||||
|
e
|
||||||
|
))
|
||||||
|
Package caption Info: Begin \AtBeginDocument code.
|
||||||
|
Package caption Info: float package is loaded.
|
||||||
|
Package caption Info: hyperref package is loaded.
|
||||||
|
Package caption Info: End \AtBeginDocument code.
|
||||||
|
Package hyperref Info: Link coloring ON on input line 36.
|
||||||
|
|
||||||
|
(/usr/share/texmf-dist/tex/latex/hyperref/nameref.sty
|
||||||
|
Package: nameref 2021-04-02 v2.47 Cross-referencing by name of section
|
||||||
|
|
||||||
|
(/usr/share/texmf-dist/tex/latex/refcount/refcount.sty
|
||||||
|
Package: refcount 2019/12/15 v3.6 Data extraction from label references (HO)
|
||||||
|
)
|
||||||
|
(/usr/share/texmf-dist/tex/generic/gettitlestring/gettitlestring.sty
|
||||||
|
Package: gettitlestring 2019/12/15 v1.6 Cleanup title references (HO)
|
||||||
|
)
|
||||||
|
\c@section@level=\count294
|
||||||
|
)
|
||||||
|
LaTeX Info: Redefining \ref on input line 36.
|
||||||
|
LaTeX Info: Redefining \pageref on input line 36.
|
||||||
|
LaTeX Info: Redefining \nameref on input line 36.
|
||||||
|
|
||||||
|
(./Schrick-Noah_CS-7863_Final-Report.out)
|
||||||
|
(./Schrick-Noah_CS-7863_Final-Report.out)
|
||||||
|
\@outlinefile=\write3
|
||||||
|
\openout3 = `Schrick-Noah_CS-7863_Final-Report.out'.
|
||||||
|
|
||||||
|
LaTeX Font Info: External font `cmex10' loaded for size
|
||||||
|
(Font) <12> on input line 39.
|
||||||
|
LaTeX Font Info: External font `cmex10' loaded for size
|
||||||
|
(Font) <8> on input line 39.
|
||||||
|
LaTeX Font Info: External font `cmex10' loaded for size
|
||||||
|
(Font) <6> on input line 39.
|
||||||
|
|
||||||
|
(./Schrick-Noah_CS-7863_Final-Report.toc
|
||||||
|
LaTeX Font Info: External font `cmex10' loaded for size
|
||||||
|
(Font) <7> on input line 2.
|
||||||
|
LaTeX Font Info: External font `cmex10' loaded for size
|
||||||
|
(Font) <5> on input line 2.
|
||||||
|
[1
|
||||||
|
|
||||||
|
{/var/lib/texmf/fonts/map/pdftex/updmap/pdftex.map}])
|
||||||
|
\tf@toc=\write4
|
||||||
|
\openout4 = `Schrick-Noah_CS-7863_Final-Report.toc'.
|
||||||
|
|
||||||
|
|
||||||
|
Overfull \hbox (21.08397pt too wide) in paragraph at lines 43--44
|
||||||
|
[]\OT1/cmr/m/n/10 To address the rising risks of computing and threats to cyber
|
||||||
|
security, vulnerability
|
||||||
|
[]
|
||||||
|
|
||||||
|
|
||||||
|
Overfull \hbox (3.02843pt too wide) in paragraph at lines 45--46
|
||||||
|
[]\OT1/cmr/m/n/10 Attack graphs begin with a root node that contains all the cu
|
||||||
|
rrent information
|
||||||
|
[]
|
||||||
|
|
||||||
|
|
||||||
|
Overfull \hbox (2.19508pt too wide) in paragraph at lines 48--49
|
||||||
|
[]\OT1/cmr/m/n/10 Compliance graphs are an alternate form of attack graphs, uti
|
||||||
|
lized specifically
|
||||||
|
[]
|
||||||
|
|
||||||
|
|
||||||
|
Overfull \hbox (0.79698pt too wide) in paragraph at lines 48--49
|
||||||
|
\OT1/cmr/m/n/10 for examining compliance and regulation statuses of systems. Li
|
||||||
|
ke attack graphs,
|
||||||
|
[]
|
||||||
|
|
||||||
|
[2]
|
||||||
|
Overfull \hbox (10.93585pt too wide) in paragraph at lines 50--51
|
||||||
|
\OT1/cmr/m/n/10 to also examine administrative policies and properties of syste
|
||||||
|
ms. Since compliance
|
||||||
|
[]
|
||||||
|
|
||||||
|
|
||||||
|
Overfull \hbox (2.69524pt too wide) in paragraph at lines 50--51
|
||||||
|
\OT1/cmr/m/n/10 and regulation is broad and can vary by industry and applicatio
|
||||||
|
n, the information
|
||||||
|
[]
|
||||||
|
|
||||||
|
[3]
|
||||||
|
Overfull \hbox (10.74141pt too wide) in paragraph at lines 59--60
|
||||||
|
\OT1/cmr/m/n/10 cooperation to training and administrative policies. This netwo
|
||||||
|
rk is also progressed
|
||||||
|
[]
|
||||||
|
|
||||||
|
|
||||||
|
LaTeX Warning: No positions in optional float specifier.
|
||||||
|
Default added (so using `tbp') on input line 61.
|
||||||
|
|
||||||
|
|
||||||
|
Overfull \hbox (24.76286pt too wide) in paragraph at lines 74--74
|
||||||
|
[]\OT1/cmr/bx/n/14.4 Centralities and their Applications to Compliance
|
||||||
|
[]
|
||||||
|
|
||||||
|
|
||||||
|
Overfull \hbox (14.1025pt too wide) in paragraph at lines 76--77
|
||||||
|
\OT1/cmr/m/n/10 opportunities for compliance violation. This work discusses fiv
|
||||||
|
e centrality measures,
|
||||||
|
[]
|
||||||
|
|
||||||
|
[4] [5] [6] [7]
|
||||||
|
LaTeX Font Info: Trying to load font information for U+dsrom on input line 1
|
||||||
|
26.
|
||||||
|
(/usr/share/texmf-dist/tex/latex/doublestroke/Udsrom.fd
|
||||||
|
File: Udsrom.fd 1995/08/01 v0.1 Double stroke roman font definitions
|
||||||
|
)
|
||||||
|
[8]
|
||||||
|
<./images/Transitive-closure.png, id=247, 1927.2pt x 1027.84pt>
|
||||||
|
File: ./images/Transitive-closure.png Graphic file (type png)
|
||||||
|
<use ./images/Transitive-closure.png>
|
||||||
|
Package pdftex.def Info: ./images/Transitive-closure.png used on input line 14
|
||||||
|
1.
|
||||||
|
(pdftex.def) Requested size: 345.0pt x 183.99947pt.
|
||||||
|
[9 <./images/Transitive-closure.png>]
|
||||||
|
<./images/pre-Dtree.png, id=256, 673.51625pt x 770.88pt>
|
||||||
|
File: ./images/pre-Dtree.png Graphic file (type png)
|
||||||
|
<use ./images/pre-Dtree.png>
|
||||||
|
Package pdftex.def Info: ./images/pre-Dtree.png used on input line 156.
|
||||||
|
(pdftex.def) Requested size: 345.0pt x 394.87271pt.
|
||||||
|
|
||||||
|
Overfull \hbox (71.59012pt too wide) in paragraph at lines 158--158
|
||||||
|
[][][]\OT1/cmr/m/n/8 Image origin can be located at: https://commons.wikimedia.
|
||||||
|
org/wiki/File:Dominator$[]$control$[]$flow$[]$graph.svg,
|
||||||
|
[]
|
||||||
|
|
||||||
|
<./images/post-Dtree.png, id=258, 642.4pt x 435.6275pt>
|
||||||
|
File: ./images/post-Dtree.png Graphic file (type png)
|
||||||
|
<use ./images/post-Dtree.png>
|
||||||
|
Package pdftex.def Info: ./images/post-Dtree.png used on input line 162.
|
||||||
|
(pdftex.def) Requested size: 345.0pt x 233.95909pt.
|
||||||
|
|
||||||
|
Overfull \hbox (17.76799pt too wide) in paragraph at lines 164--164
|
||||||
|
[][][]\OT1/cmr/m/n/8 Image origin can be located at: https://commons.wikimedia.
|
||||||
|
org/wiki/File:Dominator$[]$tree.svg,
|
||||||
|
[]
|
||||||
|
|
||||||
|
|
||||||
|
LaTeX Warning: No positions in optional float specifier.
|
||||||
|
Default added (so using `tbp') on input line 174.
|
||||||
|
|
||||||
|
|
||||||
|
LaTeX Warning: No positions in optional float specifier.
|
||||||
|
Default added (so using `tbp') on input line 200.
|
||||||
|
|
||||||
|
|
||||||
|
LaTeX Warning: No positions in optional float specifier.
|
||||||
|
Default added (so using `tbp') on input line 226.
|
||||||
|
|
||||||
|
|
||||||
|
LaTeX Warning: No positions in optional float specifier.
|
||||||
|
Default added (so using `tbp') on input line 254.
|
||||||
|
|
||||||
|
|
||||||
|
LaTeX Warning: No positions in optional float specifier.
|
||||||
|
Default added (so using `tbp') on input line 281.
|
||||||
|
|
||||||
|
[10] [11 <./images/pre-Dtree.png>] [12 <./images/post-Dtree.png>] [13] [14]
|
||||||
|
Overfull \hbox (1.47293pt too wide) in paragraph at lines 312--313
|
||||||
|
\OT1/cmr/m/n/10 the dominant tree rankings also vary greatly from the original
|
||||||
|
compliance graph's
|
||||||
|
[]
|
||||||
|
|
||||||
|
|
||||||
|
Overfull \hbox (8.02841pt too wide) in paragraph at lines 316--317
|
||||||
|
[]\OT1/cmr/m/n/10 Each centrality measure implemented in this work provides var
|
||||||
|
ious information
|
||||||
|
[]
|
||||||
|
|
||||||
|
[15]
|
||||||
|
Overfull \hbox (4.695pt too wide) in paragraph at lines 319--320
|
||||||
|
[]\OT1/cmr/m/n/10 Based on the results of this work, there is ample room to con
|
||||||
|
tinue investigation
|
||||||
|
[]
|
||||||
|
|
||||||
|
|
||||||
|
Overfull \hbox (12.05623pt too wide) in paragraph at lines 319--320
|
||||||
|
\OT1/cmr/m/n/10 generated for three different networks along with various node
|
||||||
|
importance rankings,
|
||||||
|
[]
|
||||||
|
|
||||||
|
[16] (./Schrick-Noah_CS-7863_Final-Report.bbl
|
||||||
|
Underfull \hbox (badness 1237) in paragraph at lines 4--8
|
||||||
|
[]\OT1/cmr/m/n/10 C. Phillips and L. P. Swiler, ``A graph-based system for netw
|
||||||
|
ork-
|
||||||
|
[]
|
||||||
|
|
||||||
|
|
||||||
|
Underfull \hbox (badness 10000) in paragraph at lines 49--52
|
||||||
|
[]\OT1/cmr/m/n/10 ``Health Insurance Portability and Accountability Act of
|
||||||
|
[]
|
||||||
|
|
||||||
|
|
||||||
|
Underfull \hbox (badness 10000) in paragraph at lines 49--52
|
||||||
|
\OT1/cmr/m/n/10 1996.'' Pub. L. No. 104-191. 1996 [Online]. Available:
|
||||||
|
[]
|
||||||
|
|
||||||
|
|
||||||
|
Underfull \hbox (badness 10000) in paragraph at lines 49--52
|
||||||
|
\OT1/cmr/m/n/10 https://www.govinfo.gov/content/pkg/PLAW-104publ191/html/PLAW-
|
||||||
|
[]
|
||||||
|
|
||||||
|
|
||||||
|
Underfull \hbox (badness 10000) in paragraph at lines 54--58
|
||||||
|
[]\OT1/cmr/m/n/10 P. S. S. Council, ``Payment Card Industry (PCI)
|
||||||
|
[]
|
||||||
|
|
||||||
|
|
||||||
|
Underfull \hbox (badness 10000) in paragraph at lines 54--58
|
||||||
|
\OT1/cmr/m/n/10 Data Security Standard,'' May 2018. Available:
|
||||||
|
[]
|
||||||
|
|
||||||
|
|
||||||
|
Underfull \hbox (badness 1571) in paragraph at lines 66--68
|
||||||
|
[]\OT1/cmr/m/n/10 L. Katz, ``A new status index derived from sociometric analys
|
||||||
|
is,''
|
||||||
|
[]
|
||||||
|
|
||||||
|
[17
|
||||||
|
|
||||||
|
]) [18]
|
||||||
|
\openout2 = `Appendices.aux'.
|
||||||
|
|
||||||
|
(./Appendices.tex [19
|
||||||
|
|
||||||
|
]
|
||||||
|
|
||||||
|
LaTeX Warning: No positions in optional float specifier.
|
||||||
|
Default added (so using `tbp') on input line 6.
|
||||||
|
|
||||||
|
|
||||||
|
LaTeX Warning: No positions in optional float specifier.
|
||||||
|
Default added (so using `tbp') on input line 32.
|
||||||
|
|
||||||
|
|
||||||
|
LaTeX Warning: No positions in optional float specifier.
|
||||||
|
Default added (so using `tbp') on input line 58.
|
||||||
|
|
||||||
|
|
||||||
|
LaTeX Warning: No positions in optional float specifier.
|
||||||
|
Default added (so using `tbp') on input line 84.
|
||||||
|
|
||||||
|
|
||||||
|
LaTeX Warning: No positions in optional float specifier.
|
||||||
|
Default added (so using `tbp') on input line 110.
|
||||||
|
|
||||||
|
[20] [21] [22]
|
||||||
|
|
||||||
|
LaTeX Warning: No positions in optional float specifier.
|
||||||
|
Default added (so using `tbp') on input line 139.
|
||||||
|
|
||||||
|
|
||||||
|
LaTeX Warning: No positions in optional float specifier.
|
||||||
|
Default added (so using `tbp') on input line 166.
|
||||||
|
|
||||||
|
|
||||||
|
LaTeX Warning: No positions in optional float specifier.
|
||||||
|
Default added (so using `tbp') on input line 192.
|
||||||
|
|
||||||
|
|
||||||
|
LaTeX Warning: No positions in optional float specifier.
|
||||||
|
Default added (so using `tbp') on input line 218.
|
||||||
|
|
||||||
|
|
||||||
|
LaTeX Warning: No positions in optional float specifier.
|
||||||
|
Default added (so using `tbp') on input line 244.
|
||||||
|
|
||||||
|
) [23
|
||||||
|
|
||||||
|
|
||||||
|
] [24] [25] (./Schrick-Noah_CS-7863_Final-Report.aux (./Appendices.aux))
|
||||||
|
Package rerunfilecheck Info: File `Schrick-Noah_CS-7863_Final-Report.out' has n
|
||||||
|
ot changed.
|
||||||
|
(rerunfilecheck) Checksum: E5AEAF0A6E8A0CF55ECE4AA5C0B0D1FA;3749.
|
||||||
|
)
|
||||||
|
Here is how much of TeX's memory you used:
|
||||||
|
12392 strings out of 478238
|
||||||
|
203490 string characters out of 5850456
|
||||||
|
556244 words of memory out of 5000000
|
||||||
|
30357 multiletter control sequences out of 15000+600000
|
||||||
|
474340 words of font info for 48 fonts, out of 8000000 for 9000
|
||||||
|
1141 hyphenation exceptions out of 8191
|
||||||
|
67i,12n,77p,1807b,457s stack positions out of 5000i,500n,10000p,200000b,80000s
|
||||||
|
|
||||||
|
pdfTeX warning (dest): name{Hfootnote.3} has been referenced but does not exist
|
||||||
|
, replaced by a fixed one
|
||||||
|
|
||||||
|
|
||||||
|
pdfTeX warning (dest): name{Hfootnote.2} has been referenced but does not exist
|
||||||
|
, replaced by a fixed one
|
||||||
|
|
||||||
|
</usr/share/texmf-dist/fonts/type1/public/amsfonts/cm/cmbx10.pfb></usr/share/te
|
||||||
|
xmf-dist/fonts/type1/public/amsfonts/cm/cmbx12.pfb></usr/share/texmf-dist/fonts
|
||||||
|
/type1/public/amsfonts/cm/cmex10.pfb></usr/share/texmf-dist/fonts/type1/public/
|
||||||
|
amsfonts/cm/cmmi10.pfb></usr/share/texmf-dist/fonts/type1/public/amsfonts/cm/cm
|
||||||
|
mi7.pfb></usr/share/texmf-dist/fonts/type1/public/amsfonts/cm/cmr10.pfb></usr/s
|
||||||
|
hare/texmf-dist/fonts/type1/public/amsfonts/cm/cmr12.pfb></usr/share/texmf-dist
|
||||||
|
/fonts/type1/public/amsfonts/cm/cmr17.pfb></usr/share/texmf-dist/fonts/type1/pu
|
||||||
|
blic/amsfonts/cm/cmr6.pfb></usr/share/texmf-dist/fonts/type1/public/amsfonts/cm
|
||||||
|
/cmr7.pfb></usr/share/texmf-dist/fonts/type1/public/amsfonts/cm/cmr8.pfb></usr/
|
||||||
|
share/texmf-dist/fonts/type1/public/amsfonts/cm/cmsy10.pfb></usr/share/texmf-di
|
||||||
|
st/fonts/type1/public/amsfonts/cm/cmsy7.pfb></usr/share/texmf-dist/fonts/type1/
|
||||||
|
public/amsfonts/cm/cmti10.pfb></usr/share/texmf-dist/fonts/type1/public/doubles
|
||||||
|
troke/dsrom10.pfb>
|
||||||
|
Output written on Schrick-Noah_CS-7863_Final-Report.pdf (25 pages, 375109 bytes
|
||||||
|
).
|
||||||
|
PDF statistics:
|
||||||
|
444 PDF objects out of 1000 (max. 8388607)
|
||||||
|
378 compressed objects within 4 object streams
|
||||||
|
101 named destinations out of 1000 (max. 500000)
|
||||||
|
224 words of extra memory for PDF output out of 10000 (max. 10000000)
|
||||||
|
|
||||||
26
Schrick-Noah_CS-7863_Final-Report.out
Normal file
26
Schrick-Noah_CS-7863_Final-Report.out
Normal file
@ -0,0 +1,26 @@
|
|||||||
|
\BOOKMARK [1][-]{section.1}{\376\377\000I\000n\000t\000r\000o\000d\000u\000c\000t\000i\000o\000n}{}% 1
|
||||||
|
\BOOKMARK [2][-]{subsection.1.1}{\376\377\000A\000t\000t\000a\000c\000k\000\040\000G\000r\000a\000p\000h\000s}{section.1}% 2
|
||||||
|
\BOOKMARK [2][-]{subsection.1.2}{\376\377\000C\000o\000m\000p\000l\000i\000a\000n\000c\000e\000\040\000G\000r\000a\000p\000h\000s}{section.1}% 3
|
||||||
|
\BOOKMARK [2][-]{subsection.1.3}{\376\377\000D\000i\000f\000f\000i\000c\000u\000l\000t\000i\000e\000s\000\040\000o\000f\000\040\000C\000o\000m\000p\000l\000i\000a\000n\000c\000e\000\040\000G\000r\000a\000p\000h\000\040\000A\000n\000a\000l\000y\000s\000i\000s}{section.1}% 4
|
||||||
|
\BOOKMARK [1][-]{section.2}{\376\377\000R\000e\000l\000a\000t\000e\000d\000\040\000W\000o\000r\000k\000s}{}% 5
|
||||||
|
\BOOKMARK [1][-]{section.3}{\376\377\000E\000x\000p\000e\000r\000i\000m\000e\000n\000t\000a\000l\000\040\000N\000e\000t\000w\000o\000r\000k\000s}{}% 6
|
||||||
|
\BOOKMARK [1][-]{section.4}{\376\377\000C\000e\000n\000t\000r\000a\000l\000i\000t\000i\000e\000s\000\040\000a\000n\000d\000\040\000t\000h\000e\000i\000r\000\040\000A\000p\000p\000l\000i\000c\000a\000t\000i\000o\000n\000s\000\040\000t\000o\000\040\000C\000o\000m\000p\000l\000i\000a\000n\000c\000e\000\040\000G\000r\000a\000p\000h\000s}{}% 7
|
||||||
|
\BOOKMARK [2][-]{subsection.4.1}{\376\377\000I\000n\000t\000r\000o\000d\000u\000c\000t\000i\000o\000n}{section.4}% 8
|
||||||
|
\BOOKMARK [2][-]{subsection.4.2}{\376\377\000D\000e\000g\000r\000e\000e}{section.4}% 9
|
||||||
|
\BOOKMARK [2][-]{subsection.4.3}{\376\377\000B\000e\000t\000w\000e\000e\000n\000n\000e\000s\000s}{section.4}% 10
|
||||||
|
\BOOKMARK [2][-]{subsection.4.4}{\376\377\000K\000a\000t\000z}{section.4}% 11
|
||||||
|
\BOOKMARK [2][-]{subsection.4.5}{\376\377\000K\000-\000P\000a\000t\000h\000\040\000E\000d\000g\000e}{section.4}% 12
|
||||||
|
\BOOKMARK [2][-]{subsection.4.6}{\376\377\000A\000d\000a\000p\000t\000e\000d\000\040\000P\000a\000g\000e\000\040\000R\000a\000n\000k}{section.4}% 13
|
||||||
|
\BOOKMARK [1][-]{section.5}{\376\377\000T\000r\000a\000n\000s\000i\000t\000i\000v\000e\000\040\000C\000l\000o\000s\000u\000r\000e}{}% 14
|
||||||
|
\BOOKMARK [2][-]{subsection.5.1}{\376\377\000I\000n\000t\000r\000o\000d\000u\000c\000t\000i\000o\000n\000\040\000a\000n\000d\000\040\000A\000p\000p\000l\000i\000c\000a\000t\000i\000o\000n}{section.5}% 15
|
||||||
|
\BOOKMARK [1][-]{section.6}{\376\377\000D\000o\000m\000i\000n\000a\000n\000t\000\040\000T\000r\000e\000e}{}% 16
|
||||||
|
\BOOKMARK [2][-]{subsection.6.1}{\376\377\000I\000n\000t\000r\000o\000d\000u\000c\000t\000i\000o\000n\000\040\000a\000n\000d\000\040\000A\000p\000p\000l\000i\000c\000a\000t\000i\000o\000n}{section.6}% 17
|
||||||
|
\BOOKMARK [1][-]{section.7}{\376\377\000R\000e\000s\000u\000l\000t\000s\000\040\000a\000n\000d\000\040\000R\000e\000s\000u\000l\000t\000\040\000A\000n\000a\000l\000y\000s\000i\000s}{}% 18
|
||||||
|
\BOOKMARK [2][-]{subsection.7.1}{\376\377\000R\000e\000s\000u\000l\000t\000s}{section.7}% 19
|
||||||
|
\BOOKMARK [2][-]{subsection.7.2}{\376\377\000R\000e\000s\000u\000l\000t\000\040\000A\000n\000a\000l\000y\000s\000i\000s}{section.7}% 20
|
||||||
|
\BOOKMARK [1][-]{section.8}{\376\377\000C\000o\000n\000c\000l\000u\000s\000i\000o\000n\000s\000\040\000a\000n\000d\000\040\000F\000u\000t\000u\000r\000e\000\040\000W\000o\000r\000k}{}% 21
|
||||||
|
\BOOKMARK [2][-]{subsection.8.1}{\376\377\000C\000o\000n\000c\000l\000u\000s\000i\000o\000n\000s}{section.8}% 22
|
||||||
|
\BOOKMARK [2][-]{subsection.8.2}{\376\377\000F\000u\000t\000u\000r\000e\000\040\000W\000o\000r\000k}{section.8}% 23
|
||||||
|
\BOOKMARK [1][-]{subsection.8.2}{\376\377\000B\000i\000b\000l\000i\000o\000g\000r\000a\000p\000h\000y}{}% 24
|
||||||
|
\BOOKMARK [1][-]{appendix.A}{\376\377\000H\000I\000P\000A\000A\000\040\000R\000e\000s\000u\000l\000t\000s}{}% 25
|
||||||
|
\BOOKMARK [1][-]{appendix.B}{\376\377\000P\000C\000I\000\040\000D\000S\000S\000\040\000R\000e\000s\000u\000l\000t\000s}{}% 26
|
||||||
BIN
Schrick-Noah_CS-7863_Final-Report.pdf
Normal file
BIN
Schrick-Noah_CS-7863_Final-Report.pdf
Normal file
Binary file not shown.
329
Schrick-Noah_CS-7863_Final-Report.tex
Normal file
329
Schrick-Noah_CS-7863_Final-Report.tex
Normal file
@ -0,0 +1,329 @@
|
|||||||
|
\RequirePackage{setspace}
|
||||||
|
\documentclass{article}
|
||||||
|
\usepackage{boxedminipage}
|
||||||
|
\usepackage{graphicx} % Images
|
||||||
|
\graphicspath{ {./images/} }
|
||||||
|
\usepackage{subcaption} % Captions on subfigures
|
||||||
|
\usepackage{algorithm} % Math and Big Oh
|
||||||
|
\usepackage[noend]{algpseudocode}
|
||||||
|
\usepackage{ifpdf} % Detect PDF or DVI mode
|
||||||
|
\usepackage{babel} % Bibliography
|
||||||
|
\usepackage{dsfont} % mathbb
|
||||||
|
\usepackage[table,xcdraw]{xcolor} % Highlighted cells for tables
|
||||||
|
\usepackage[hidelinks]{hyperref} % Clickable TOC Links
|
||||||
|
\hypersetup{
|
||||||
|
colorlinks,
|
||||||
|
citecolor=black,
|
||||||
|
filecolor=black,
|
||||||
|
linkcolor=black,
|
||||||
|
urlcolor=black
|
||||||
|
}
|
||||||
|
|
||||||
|
\usepackage[utf8]{inputenc}
|
||||||
|
\usepackage{float}
|
||||||
|
\usepackage{indentfirst}
|
||||||
|
\setlength{\parskip}{\baselineskip}
|
||||||
|
|
||||||
|
% Table of Contents/Figure Spacing
|
||||||
|
\usepackage[titles]{tocloft}
|
||||||
|
\cftsetindents{figure}{0em}{3.5em}
|
||||||
|
\cftsetindents{table}{0em}{3.5em}
|
||||||
|
|
||||||
|
\title{CS 7863: Network Theory Final Project: Compliance Graph Analysis}
|
||||||
|
\author{Noah Schrick}
|
||||||
|
\date{May 3, 2022}
|
||||||
|
|
||||||
|
\begin{document}
|
||||||
|
|
||||||
|
\maketitle
|
||||||
|
\tableofcontents
|
||||||
|
|
||||||
|
\section{Introduction}
|
||||||
|
\subsection{Attack Graphs}
|
||||||
|
To address the rising risks of computing and threats to cybersecurity, vulnerability analysis modeling is a technique employed by experts to identify weak points in a system or set of systems. One such modeling approach is to represent the system or set of systems through graphical means, with system information encoded into the nodes and edges of the graph. This modeling approach was first utilized in the 1990s in a format called attack trees, and can be seen through the works of the authors of \cite{phillips_graph-based_1998} and \cite{schneier_modeling_1999}. These attack trees would later be expanded into attack graphs.
|
||||||
|
|
||||||
|
Attack graphs begin with a root node that contains all the current information of the system or set of systems. From this initial root state, all assets in the system are examined to see if any single modification can be made, where a modification is typically a change in system policy or security settings. If a modification can be made, an edge is drawn from the previous state to a new state that includes all of the previous state's information, but now reflects the change in the system. This edge is labeled to reflect which change was made to the system. This process is exhaustively repeated, where all system properties are examined, all attack options are fully enumerated, all permutations are examined, and all changes to a system are encoded into their own independent states, where these states are then individually analyzed through the process.
|
||||||
|
|
||||||
|
\subsection{Compliance Graphs}
|
||||||
|
Compliance graphs are an alternate form of attack graphs, utilized specifically for examining compliance and regulation statuses of systems. Like attack graphs, compliance graphs can also be used to determine all ways that systems may fall out of compliance or violate regulations. These graphs are notably useful for cyber-physical systems due to the increased need for compliance. As the authors of \cite{j_hale_compliance_nodate}, \cite{baloyi_guidelines_2019}, and \cite{allman_complying_2006} discuss, cyber-physical systems have seen greater usage, especially in areas such as critical infrastructure and Internet of Things.
|
||||||
|
|
||||||
|
The semantics of compliance graphs are similar to that of attack graphs, but with a few differences regarding the information at each state. While security and compliance statuses are related, the information that is analyzed in compliance graphs is focused less on certain security properties, and is expanded to also examine administrative policies and properties of systems. Since compliance and regulation is broad and can vary by industry and application, the information to analyze can range from safety regulations, maintenance compliance, or any other regulatory compliance. However, the graph structure of compliance graphs is identical to that of attack graphs, where edges represent a modification to the systems, and nodes represent all current information in the system.
|
||||||
|
|
||||||
|
\subsection{Difficulties of Compliance Graph Analysis}
|
||||||
|
Analysis of directed graphs is not as simple as their undirected counterparts, and attack and compliance graphs are directed acyclic graphs. The primary contributor to the increased difficulty is due to the asymmetric adjacency matrix present in directed graphs. With undirected graphs, simplifications can be made in the analysis process both computationally and conceptually. Since the ``in" degrees are equal to the ``out" degrees, less work is required both in terms of parsing the adjacency matrix, but also in terms of determining importance of nodes. The author of \cite{newman2010networks} discusses that common analysis techniques such as eigenvector centrality is often unapplicable to directed acyclic graphs. As the author of \cite{Mieghem2018DirectedGA} discusses, the difficulty of directed graphs also extends to the graph Laplacian, where the definition for asymmetric adjacency matrices is not uniquely defined, and is based on either row or column sums computing to zero, but both cannot. The author of \cite{Mieghem2018DirectedGA} continues to discuss that directed graphs lead to complex eigenvalues, and can lead to adjacency matrices that are unable to be diagonalized. These challenges require different approaches for typical clustering or centrality measures.
|
||||||
|
|
||||||
|
\section{Related Works}
|
||||||
|
The author of \cite{ming_diss} presents three centrality measures that were applied to various attack graphs. The centrality measures implemented were Katz, K-path Edge, and Adapted PageRank. Each of these centrality measures are applicable to the directed format of attack graphs, and conclusions can be drawn regarding patching schemes for preventing exploits. As an approach for avoiding complex eigenvalues, the authors of \cite{Guo2017HermitianAM} present work examining directed, undirected, and mixed graphs using its Hermitian adjacency matrix. Other works, such as that discussed by the author of \cite{Mieghem2018DirectedGA} include mathematical manipulation of directed graph spectra (originally presented by the author of \cite{Brualdi2010SpectraOD}) with Schur's Theorem to bound eigenvalues and allow for explicit computation, which can then be used for additional analysis metrics.
|
||||||
|
|
||||||
|
\section{Experimental Networks} \label{sec:networks}
|
||||||
|
The work conducted in this approach utilized three compliance graphs, with their properties displayed in Table \ref{table:networks}. Connectivity in this table refers to the mean degree, divided by the number of nodes in the network, multiplied by 100 to get the number in a percentage form. Network 1 is a vehicle maintenance network. This network has one car asset that is deemed ``brand new", and has no mileage. This network is examined at its current state, and progresses through time with time steps of 1 month, up to 12 months total. At each time step the car gains mileage and increases its age property, and is reexamined to evaluate its standing in regards to its vehicular regulatory maintenance schedule. Network 2 is an artificial company network that is attempting to maintain HIPAA compliance \cite{noauthor_health_1996}. This network examines its standing in relation to security properties that are required per HIPAA guidelines, as well as employee cooperation to training and administrative policies. This network is also progressed through time to illustrate the company's standing in relation to yearly audits and trainings that must be followed. Employees are also added and removed through the network at set points during the time progression process. Network 3 is another artificial company network. This company is attempting to maintain PCI DSS compliance \cite{PCI}. This network generation was static and did not progress through time. This network examined the company and its current state, and examined all changes that could occur. These changes were primarily tied to security properties such as physical break-ins on the property, firewalls being disabled, default system settings, and encryption expiration.
|
||||||
|
|
||||||
|
\begin{table}[]
|
||||||
|
\centering
|
||||||
|
\begin{tabular}{|c|c|c|c|}
|
||||||
|
\hline
|
||||||
|
\textbf{Network} & \textbf{Nodes} & \textbf{Edges} & \textbf{Connectivity (\%)} \\ \hline
|
||||||
|
Car & 2491 & 12968 & 0.209 \\ \hline
|
||||||
|
HIPAA & 2321 & 8063 & 0.150 \\ \hline
|
||||||
|
PCI DSS & 61 & 163 & 4.381 \\ \hline
|
||||||
|
\end{tabular}
|
||||||
|
\caption{Network Properties for the Three Networks Utilized}
|
||||||
|
\label{table:networks}
|
||||||
|
\end{table}
|
||||||
|
|
||||||
|
\section{Centralities and their Applications to Compliance Graphs} \label{sec:centralities}
|
||||||
|
\subsection{Introduction}
|
||||||
|
The author of \cite{PMID:30064421} provides a survey of centrality measures, and discusses how various centrality measures have been implemented and brought forth in order to determine node importance in networks. By determining the importance of nodes, various conclusions can be drawn regarding the network. In the case of compliance graphs, conclusions can be drawn regarding the prioritization of patching or correction schemes. If one node is known to lead to the creation of many other nodes, it may be said that a patch is imperative to prevent further opportunities for compliance violation. This work discusses five centrality measures, and discusses their application to compliance graphs.
|
||||||
|
|
||||||
|
\subsection{Degree}
|
||||||
|
Degree centrality is a trivial, localized measure of node importance based on the number of edges that a node has. In an undirected graph, the degree centrality is predicated solely on the number of edges. However, in the case of a directed graph, a distinction is drawn with a degree centrality oriented on the number of edges coming into a node, and another measure focused on the number of edges leaving a node. Both of these cases provide useful information for compliance graphs. When a node has a large number of other nodes it points to, this node may be prioritized since it creates further opportunity for violation. When a node has a large number of edges pointing to it, this node may be prioritized since the probability that systems may enter this state is higher due to the increased number of ways that a system could lead to this state.
|
||||||
|
|
||||||
|
\subsection{Betweenness}\label{sec:between}
|
||||||
|
Betweenness centrality ranks node importance based on its ability to transfer information flow in a network. For all pairs of nodes in a network, a shortest path is determined. A node that is in this shortest path is considered to have importance. The total betweenness centrality is based on the number of shortest paths that pass through a given node. For compliance graphs, the shortest paths are useful to identify the quickest way that systems may fall out of compliance. By prioritizing the nodes that fall in the highest number of shortest paths, correction schemes can be employed to prolong or prevent systems from falling out of compliance.
|
||||||
|
|
||||||
|
Betweenness centrality is given in Equation \ref{eq:between}, where \textit{i} and \textit{j} are two different, individual nodes in the network, $\sigma_{ij}$ is the total number of shortest paths from \textit{i} to \textit{j}, and $\sigma _{ij}(v)$ is the number of shortest paths that include a node \textit{v}.
|
||||||
|
|
||||||
|
\begin{equation}
|
||||||
|
\sum_{i \neq i \neq v} \frac{\sigma_{ij}(v)}{\sigma_{ij}}
|
||||||
|
\label{eq:between}
|
||||||
|
\end{equation}
|
||||||
|
|
||||||
|
\subsection{Katz}
|
||||||
|
Katz centrality was first introduced by the author of \cite{Katz}, and measures the importance of nodes through all paths in a network. Katz centrality varies in that its centrality measure is not limited to solely the shortest path between any two given nodes. The original work by the author defines Katz as seen in Equation \ref{eq:Katz}, where \textit{i} and \textit{j} are nodes in the network, \textit{n} is the total number of nodes in the network, \textit{A} is the adjacency matrix, and $\alpha$ is an attenuation factor and has a value between 0 and 1. From this, a value of 1 is assigned if node \textit{i} is connected to node \textit{j}.
|
||||||
|
|
||||||
|
\begin{equation}
|
||||||
|
C_{\mathrm {Katz} }(i)=\sum _{k=1}^{\infty }\sum _{j=1}^{n}\alpha ^{k}(A^{k})_{ji}
|
||||||
|
\label{eq:Katz}
|
||||||
|
\end{equation}
|
||||||
|
|
||||||
|
Later works have expanded on the original Katz to include a $\beta$ vector that allows for additional scaling in the instance that prior knowledge of the network exists. The modified equation can be seen in Equation \ref{eq:mod_katz}.
|
||||||
|
|
||||||
|
\begin{equation}
|
||||||
|
\vec{x} = \left(I - \alpha A \right)^{-1}\vec{\beta}
|
||||||
|
\label{eq:mod_katz}
|
||||||
|
\end{equation}
|
||||||
|
|
||||||
|
For compliance graphs, Katz centrality represents the total number of paths that exist from a given node to any other downstream nodes, and is scaled based on the attenuation factor as well as the prior knowledge vector $\beta$. When the Katz centrality of a given node is high, prioritizing a correction scheme for the node would be useful to prevent opportunity of future compliance violations that may be many steps ahead, but still reachable from the current state.
|
||||||
|
|
||||||
|
\subsection{K-Path Edge}
|
||||||
|
K-path edge centrality, as discussed by the authors of \cite{K_Path_Edge}, is predicated on information passing through a network as a means of generalizing k-path centrality. With K-path edge centrality, importance is based on the edges of the network. One difference from betweenness centrality, is that as discussed in Section \ref{sec:between}, betweenness centrality is global and counts all nodes in a the shortest path. K-path edge centrality is localized, and is constrained by \textit{k} steps from a given node. Equation \ref{eq:kpe} displays the centrality measure for K-path edge centrality, where \textit{m} is a given edge in the network, \textit{N} is the total number of nodes in the network, $\delta_{n}^{(K)}$ is the number of K-paths from node \textit{n}, and $\delta_{n}^{(K)}(m)$ is the number of K-paths from node \textit{n} that include edge \textit{m}.
|
||||||
|
|
||||||
|
\begin{equation}
|
||||||
|
L^{(K)}(m) = \sum_{n = 1}^{N}\frac{\delta_{n}^{(K)}(m)}{\delta_{n}^{(K)}}
|
||||||
|
\label{eq:kpe}
|
||||||
|
\end{equation}
|
||||||
|
|
||||||
|
For compliance graphs, K-path edge centrality is useful to identify a short chain of changes that may result in a compliance violation. If a node has a high K-path edge centrality and it is likely that the system will be put into that node, then a series of changes could occur that could then put the system in a different states. Prioritizing nodes that have a high K-path edge centrality could be useful in deterring a short chain of changes that could cripple the system further. It is also useful to prevent states where the system is near a compliance violation.
|
||||||
|
|
||||||
|
\subsection{Adapted Page Rank}
|
||||||
|
The original PageRank algorithm was first designed by the authors of \cite{PageRank} for the Google prototype for ranking web pages. The authors of \cite{Adapted_PageRank} later introduced an Adapated PageRank that was designed to measure both the number and quality of connections specifically for an urban network. Equation \ref{eq:PR} displays the PageRank algorithm, where $\gamma$ is a damping factor with a value between 0 and 1, \textit{n} is the total number of nodes in the network, \textit{A} is the adjacency matrix of the network, \textit{i} and \textit{j} represent the row and column of the adjacency matrix, \textit{x} is a given node in the network, and \textit{k} is the row sum out degree. Since the Adapted PageRank algorithm measures the quality of connections, there is increased application to directed networks such as compliance graphs. As seen in Equation \ref{eq:PR}, the \textit{k$_j$} term is a penalizing factor. Importance is based on the in degree of a node, with a penalty for the out degree. If many nodes point to a given node, then that node is said to be important due to its accessibility.
|
||||||
|
|
||||||
|
\begin{equation}
|
||||||
|
x_i = \frac{1-\gamma}{n} + \gamma\sum_{j = 1}^{n}\frac{A_{ij}}{k_j}x_j
|
||||||
|
\label{eq:PR}
|
||||||
|
\end{equation}
|
||||||
|
|
||||||
|
The adapted PageRank algorithm includes additional data that may be present in an urban network, such as geographical position, resource availability, and proximity to facilities. This data is user-defined, and may not be present in the network. Equation \ref{eq:APC} displays the Adapated PageRank algorithm in matrix form where \textit{D} is the user-defined data matrix, \textit{I} is the identity matrix, and $\mathds{1}$ is a column matrix comprised of 1s.
|
||||||
|
|
||||||
|
\begin{equation}
|
||||||
|
(I-\gamma A D)\vec{x} = \frac{1-\gamma}{n}\mathds{1}
|
||||||
|
\label{eq:APC}
|
||||||
|
\end{equation}
|
||||||
|
|
||||||
|
For compliance graphs, the Adapted Page Rank algorithm is useful for a few reasons. First, it is able to include user-defined data regarding the network. This could include scaling certain nodes to have greater weight, such as those known to be a compromised state. Second, since nodes are penalized for pointing to other nodes, this algorithm is useful for determining nodes that are likely to be visited. If a state has a greater in degree, it may need prioritization since the system has a higher likelihood of being placed in this state.
|
||||||
|
|
||||||
|
\section{Transitive Closure}
|
||||||
|
\subsection{Introduction and Application}
|
||||||
|
Transitive closure represents a transitive relation on a given binary set, and can be used to determine reachability of a given network. Figure \ref{fig:TC} \footnote{Image origin can be located at: https://commons.wikimedia.org/wiki/File:Transitive-closure.svg, and this image has been licensed under the terms of the GNU Free Documentation License.} displays an example output when performing transitive closure. In context of compliance graphs, it is useful to consider that an adversary (whether an internal or external malicious actor, poor policy execution by an organization, accidental misuse, or any other adversarial occurrence) could have no time constraints. That is, for any given state of the system or set of systems, an adversarial act could have ``infinite" time to perform a series of actions. If no prior knowledge is known about the network, it can be assumed that all changes performed on the systems are equally likely. In practice, specifying a probability that a change can occur has been performed through a Markov Decision Process, such as that seen by the authors of \cite{li_combining_2019} and \cite{zeng_cyber_2017}. When under these assumptions, it is useful to then consider which nodes are important, assuming they have 1-step reachability to any downstream node they may have a transitive connection to. As a result, a transitive closure was identified for all networks described in
|
||||||
|
Section \ref{sec:networks}, and this transitive closure was then analyzed through the five centrality methods discussed in Section \ref{sec:centralities}. Results and a discussion of the results can be seen in Section \ref{sec:results}.
|
||||||
|
|
||||||
|
\begin{figure}[htp]
|
||||||
|
\includegraphics[width=\linewidth]{"./images/Transitive-closure.png"}
|
||||||
|
\vspace{.2truein} \centerline{}
|
||||||
|
\caption{Example of Transitive Closure}
|
||||||
|
\label{fig:TC}
|
||||||
|
\end{figure}
|
||||||
|
|
||||||
|
|
||||||
|
\section{Dominant Tree}
|
||||||
|
\subsection{Introduction and Application}
|
||||||
|
|
||||||
|
Dominance, as initially introduced by the author of \cite{dominance} in terms of flow, is defined as a node that is in every path to another node. For instance, if a node \textit{i} is a destination node, and every path to \textit{i} from a source node includes node \textit{j}, then node \textit{j} is said to dominate node \textit{i}. Figure 2 displays an example starting network. With node 1 being the source node, it is evident that node 2 immediately dominates nodes 3, 4, 5, and 6, since all messages from node 1 must pass through node 2. By definition, each node must also dominate itself, so node 2 also dominates node 2.
|
||||||
|
|
||||||
|
Following the properties of dominance, a dominator tree can be derived. In a dominator tree, each node has children that it immediately dominates. Immediate dominance is referred to nodes that strictly dominate a given node, but do not strictly dominate any other node that may strictly dominate a node. Figure 3 displays the dominant tree of the network seen in Figure 2.
|
||||||
|
|
||||||
|
\begin{figure}[htp] \label{fig:preDtree}
|
||||||
|
\includegraphics[width=\linewidth]{"./images/pre-Dtree.png"}
|
||||||
|
\vspace{.2truein} \centerline{}
|
||||||
|
\caption[]{Example Network for Illustrating Dominance \footnote{Image origin can be located at: https://commons.wikimedia.org/wiki/File:Dominator$\_$control$\_$flow$\_$graph.svg, and this image has been released into the public domain for use for any purpose, unless such conditions are required by law.}}
|
||||||
|
\end{figure}
|
||||||
|
|
||||||
|
\begin{figure}[htp]
|
||||||
|
\includegraphics[width=\linewidth]{"./images/post-Dtree.png"}
|
||||||
|
\vspace{.2truein} \centerline{}
|
||||||
|
\caption[]{Dominant Tree Derived from the Network Displayed in Figure 2 \footnote{Image origin can be located at: https://commons.wikimedia.org/wiki/File:Dominator$\_$tree.svg, and this image has been released into the public domain for use for any purpose, unless such conditions are required by law.}}
|
||||||
|
\label{fig:post-Dtree}
|
||||||
|
\end{figure}
|
||||||
|
|
||||||
|
Dominant trees do alter the structure of compliance graphs, and leads to leaf nodes and branches that do not exist in the original network. As a result, some nodes that have directed edges to other nodes may be moved to a position where the edge no longer points to the original nodes. However, in dominant trees, all node parents dominate their children. In this format, the information flow is guided predominantly by the upstream nodes, and all parents in the dominant tree exist as upstream nodes in the original compliance graph. While some downstream nodes may be altered, the importance of nodes can be reexamined in the dominant tree to see how importance differs when information flow is refined. To this end, dominant trees were identified for all networks described in Section \ref{sec:networks}, and these dominant trees were then analyzed through the five centrality methods discussed in Section \ref{sec:centralities}. Results and a discussion of the results can be seen in Section \ref{sec:results}.
|
||||||
|
|
||||||
|
\section{Results and Result Analysis} \label{sec:results}
|
||||||
|
\subsection{Results}
|
||||||
|
In this section, only results for the car network are displayed for brevity. These results can be seen in Tables \ref{table:car-deg} through \ref{table:car-betweenness}. For the HIPAA and PCI DSS networks, results can be seen in Appendices \ref{apx:hipaa} and \ref{apx:pci}, respectively.
|
||||||
|
|
||||||
|
\begin{table}[]
|
||||||
|
\centering
|
||||||
|
\begin{tabular}{|cc|cc|cc|}
|
||||||
|
\hline
|
||||||
|
\multicolumn{2}{|c|}{\cellcolor[HTML]{FFFF00}\textbf{Base}} & \multicolumn{2}{|c|}{\cellcolor[HTML]{FFFF00}\textbf{Transitive Closure}} & \multicolumn{2}{|c|}{\cellcolor[HTML]{FFFF00}\textbf{Dominant Tree}} \\ \hline
|
||||||
|
\multicolumn{1}{|c|}{\textbf{Node}} & \textbf{Value} & \multicolumn{1}{|c|}{\textbf{Node}} & \textbf{Value} & \multicolumn{1}{|c|}{\textbf{Node}} & \textbf{Value} \\ \hline
|
||||||
|
\multicolumn{1}{|c|}{314} & 11 & \multicolumn{1}{|c|}{0} & \multicolumn{1}{|c|}{2490} & \multicolumn{1}{|c|}{1} & \multicolumn{1}{|c|}{1246} \\ \hline
|
||||||
|
\multicolumn{1}{|c|}{346} & 10 & \multicolumn{1}{|c|}{1} & \multicolumn{1}{|c|}{2489} & \multicolumn{1}{|c|}{3} & \multicolumn{1}{|c|}{934} \\ \hline
|
||||||
|
\multicolumn{1}{|c|}{362} & 10 & \multicolumn{1}{|c|}{3} & \multicolumn{1}{|c|}{2487} & \multicolumn{1}{|c|}{7} & \multicolumn{1}{|c|}{156} \\ \hline
|
||||||
|
\multicolumn{1}{|c|}{370} & 10 & \multicolumn{1}{|c|}{7} & \multicolumn{1}{|c|}{2479} & \multicolumn{1}{|c|}{42} & \multicolumn{1}{|c|}{115} \\ \hline
|
||||||
|
\multicolumn{1}{|c|}{374} & 10 & \multicolumn{1}{|c|}{15} & \multicolumn{1}{|c|}{2463} & \multicolumn{1}{|c|}{314} & \multicolumn{1}{|c|}{31} \\ \hline
|
||||||
|
\multicolumn{1}{|c|}{376} & 10 & \multicolumn{1}{|c|}{27} & \multicolumn{1}{|c|}{2447} & \multicolumn{1}{|c|}{0} & \multicolumn{1}{|c|}{1} \\ \hline
|
||||||
|
\multicolumn{1}{|c|}{377} & 10 & \multicolumn{1}{|c|}{42} & \multicolumn{1}{|c|}{2431} & \multicolumn{1}{|c|}{15} & \multicolumn{1}{|c|}{1} \\ \hline
|
||||||
|
\multicolumn{1}{|c|}{378} & 10 & \multicolumn{1}{|c|}{60} & \multicolumn{1}{|c|}{2367} & \multicolumn{1}{|c|}{27} & \multicolumn{1}{|c|}{1} \\ \hline
|
||||||
|
\multicolumn{1}{|c|}{379} & 10 & \multicolumn{1}{|c|}{87} & \multicolumn{1}{|c|}{2303} & \multicolumn{1}{|c|}{60} & \multicolumn{1}{|c|}{1} \\ \hline
|
||||||
|
\multicolumn{1}{|c|}{380} & 10 & \multicolumn{1}{|c|}{130} & \multicolumn{1}{|c|}{2239} & \multicolumn{1}{|c|}{87} & \multicolumn{1}{|c|}{1} \\ \hline
|
||||||
|
\multicolumn{1}{|c|}{381} & 10 & \multicolumn{1}{|c|}{187} & \multicolumn{1}{|c|}{2175} & \multicolumn{1}{|c|}{130} & \multicolumn{1}{|c|}{1} \\ \hline
|
||||||
|
\multicolumn{1}{|c|}{382} & 10 & \multicolumn{1}{|c|}{250} & \multicolumn{1}{|c|}{2111} & \multicolumn{1}{|c|}{187} & \multicolumn{1}{|c|}{1} \\ \hline
|
||||||
|
\multicolumn{1}{|c|}{398} & 9 & \multicolumn{1}{|c|}{314} & \multicolumn{1}{|c|}{2047} & \multicolumn{1}{|c|}{250} & \multicolumn{1}{|c|}{1} \\ \hline
|
||||||
|
\multicolumn{1}{|c|}{406} & 9 & \multicolumn{1}{|c|}{2} & \multicolumn{1}{|c|}{1244} & \multicolumn{1}{|c|}{2} & \multicolumn{1}{|c|}{0} \\ \hline
|
||||||
|
\multicolumn{1}{|c|}{410} & 9 & \multicolumn{1}{|c|}{4} & \multicolumn{1}{|c|}{1243} & \multicolumn{1}{|c|}{4} & \multicolumn{1}{|c|}{0} \\ \hline
|
||||||
|
\end{tabular}
|
||||||
|
\caption{Top 15 Nodes with Degree Centrality}
|
||||||
|
\label{table:car-deg}
|
||||||
|
\end{table}
|
||||||
|
|
||||||
|
\begin{table}[]
|
||||||
|
\centering
|
||||||
|
\begin{tabular}{|cc|cc|cc|}
|
||||||
|
\hline
|
||||||
|
\multicolumn{2}{|c|}{\cellcolor[HTML]{FFFF00}\textbf{Base}} & \multicolumn{2}{|c|}{\cellcolor[HTML]{FFFF00}\textbf{Transitive Closure}} & \multicolumn{2}{|c|}{\cellcolor[HTML]{FFFF00}\textbf{Dominant Tree}} \\ \hline
|
||||||
|
\multicolumn{1}{|c|}{\textbf{Node}} & \textbf{Value} & \multicolumn{1}{|c|}{\textbf{Node}} & \textbf{Value} & \multicolumn{1}{|c|}{\textbf{Node}} & \textbf{Value} \\ \hline
|
||||||
|
\multicolumn{1}{|c|}{314} & 0.002459349 & \multicolumn{1}{|c|}{0} & 74.447935 & \multicolumn{1}{|c|}{1} & 0.0542337315 \\ \hline
|
||||||
|
\multicolumn{1}{|c|}{377} & 0.001870821 & \multicolumn{1}{|c|}{1} & 67.679941 & \multicolumn{1}{|c|}{3} & 0.0385235854 \\ \hline
|
||||||
|
\multicolumn{1}{|c|}{346} & 0.001870821 & \multicolumn{1}{|c|}{3} & 60.55317 & \multicolumn{1}{|c|}{7} & 0.0066730273 \\ \hline
|
||||||
|
\multicolumn{1}{|c|}{376} & 0.001870821 & \multicolumn{1}{|c|}{7} & 51.894146 & \multicolumn{1}{|c|}{0} & 0.0058248184 \\ \hline
|
||||||
|
\multicolumn{1}{|c|}{374} & 0.001870821 & \multicolumn{1}{|c|}{15} & 43.13118 & \multicolumn{1}{|c|}{42} & 0.0050225267 \\ \hline
|
||||||
|
\multicolumn{1}{|c|}{378} & 0.001870821 & \multicolumn{1}{|c|}{27} & 35.752083 & \multicolumn{1}{|c|}{314} & 0.0016459253 \\ \hline
|
||||||
|
\multicolumn{1}{|c|}{380} & 0.001870821 & \multicolumn{1}{|c|}{42} & 29.550411 & \multicolumn{1}{|c|}{27} & 0.0009036979 \\ \hline
|
||||||
|
\multicolumn{1}{|c|}{381} & 0.001870821 & \multicolumn{1}{|c|}{60} & 22.205831 & \multicolumn{1}{|c|}{250} & 0.0005660377 \\ \hline
|
||||||
|
\multicolumn{1}{|c|}{382} & 0.001870821 & \multicolumn{1}{|c|}{87} & 16.522142 & \multicolumn{1}{|c|}{15} & 0.000491815 \\ \hline
|
||||||
|
\multicolumn{1}{|c|}{262} & 0.001870821 & \multicolumn{1}{|c|}{130} & 12.155237 & \multicolumn{1}{|c|}{187} & 0.000458049 \\ \hline
|
||||||
|
\multicolumn{1}{|c|}{370} & 0.001870821 & \multicolumn{1}{|c|}{2} & 10.714534 & \multicolumn{1}{|c|}{130} & 0.0004472501 \\ \hline
|
||||||
|
\multicolumn{1}{|c|}{379} & 0.001870821 & \multicolumn{1}{|c|}{4} & 9.740485 & \multicolumn{1}{|c|}{87} & 0.0004461702 \\ \hline
|
||||||
|
\multicolumn{1}{|c|}{418} & 0.001469376 & \multicolumn{1}{|c|}{5} & 9.740485 & \multicolumn{1}{|c|}{60} & 0.0004460622 \\ \hline
|
||||||
|
\multicolumn{1}{|c|}{459} & 0.001469376 & \multicolumn{1}{|c|}{6} & 9.740485 & \multicolumn{1}{|c|}{2} & 0.0004014452 \\ \hline
|
||||||
|
\multicolumn{1}{|c|}{467} & 0.001469376 & \multicolumn{1}{|c|}{187} & 8.82693 & \multicolumn{1}{|c|}{4} & 0.0004014452 \\ \hline
|
||||||
|
\end{tabular}
|
||||||
|
\caption{Top 15 Nodes with Katz Centrality}
|
||||||
|
\label{table:car-katz}
|
||||||
|
\end{table}
|
||||||
|
|
||||||
|
\begin{table}[]
|
||||||
|
\centering
|
||||||
|
\begin{tabular}{|cc|cc|cc|}
|
||||||
|
\hline
|
||||||
|
\multicolumn{2}{|c|}{\cellcolor[HTML]{FFFF00}\textbf{Base}} & \multicolumn{2}{|c|}{\cellcolor[HTML]{FFFF00}\textbf{Transitive Closure}} & \multicolumn{2}{|c|}{\cellcolor[HTML]{FFFF00}\textbf{Dominant Tree}} \\ \hline
|
||||||
|
\multicolumn{1}{|c|}{\textbf{Node}} & \multicolumn{1}{|c|}{\textbf{Value}} & \multicolumn{1}{|c|}{\textbf{Node}} & \multicolumn{1}{|c|}{\textbf{Value}} & \multicolumn{1}{|c|}{\textbf{Node}} & \multicolumn{1}{|c|}{\textbf{Value}} \\ \hline
|
||||||
|
\multicolumn{1}{|c|}{314} & \multicolumn{1}{|c|}{231} & \multicolumn{1}{|c|}{0} & \multicolumn{1}{|c|}{2490} & \multicolumn{1}{|c|}{1} & \multicolumn{1}{|c|}{2336} \\ \hline
|
||||||
|
\multicolumn{1}{|c|}{346} & \multicolumn{1}{|c|}{175} & \multicolumn{1}{|c|}{1} & \multicolumn{1}{|c|}{1489} & \multicolumn{1}{|c|}{0} & \multicolumn{1}{|c|}{2181} \\ \hline
|
||||||
|
\multicolumn{1}{|c|}{362} & \multicolumn{1}{|c|}{175} & \multicolumn{1}{|c|}{3} & \multicolumn{1}{|c|}{2487} & \multicolumn{1}{|c|}{3} & \multicolumn{1}{|c|}{1091} \\ \hline
|
||||||
|
\multicolumn{1}{|c|}{370} & \multicolumn{1}{|c|}{175} & \multicolumn{1}{|c|}{7} & \multicolumn{1}{|c|}{2479} & \multicolumn{1}{|c|}{7} & \multicolumn{1}{|c|}{158} \\ \hline
|
||||||
|
\multicolumn{1}{|c|}{374} & \multicolumn{1}{|c|}{175} & \multicolumn{1}{|c|}{15} & \multicolumn{1}{|c|}{2463} & \multicolumn{1}{|c|}{15} & \multicolumn{1}{|c|}{117} \\ \hline
|
||||||
|
\multicolumn{1}{|c|}{376} & \multicolumn{1}{|c|}{175} & \multicolumn{1}{|c|}{27} & \multicolumn{1}{|c|}{2447} & \multicolumn{1}{|c|}{27} & \multicolumn{1}{|c|}{117} \\ \hline
|
||||||
|
\multicolumn{1}{|c|}{377} & \multicolumn{1}{|c|}{175} & \multicolumn{1}{|c|}{42} & \multicolumn{1}{|c|}{2431} & \multicolumn{1}{|c|}{42} & \multicolumn{1}{|c|}{117} \\ \hline
|
||||||
|
\multicolumn{1}{|c|}{378} & \multicolumn{1}{|c|}{175} & \multicolumn{1}{|c|}{60} & \multicolumn{1}{|c|}{2367} & \multicolumn{1}{|c|}{187} & \multicolumn{1}{|c|}{33} \\ \hline
|
||||||
|
\multicolumn{1}{|c|}{379} & \multicolumn{1}{|c|}{175} & \multicolumn{1}{|c|}{87} & \multicolumn{1}{|c|}{2303} & \multicolumn{1}{|c|}{250} & \multicolumn{1}{|c|}{32} \\ \hline
|
||||||
|
\multicolumn{1}{|c|}{380} & \multicolumn{1}{|c|}{175} & \multicolumn{1}{|c|}{130} & \multicolumn{1}{|c|}{2239} & \multicolumn{1}{|c|}{314} & \multicolumn{1}{|c|}{31} \\ \hline
|
||||||
|
\multicolumn{1}{|c|}{381} & \multicolumn{1}{|c|}{175} & \multicolumn{1}{|c|}{187} & \multicolumn{1}{|c|}{2175} & \multicolumn{1}{|c|}{60} & \multicolumn{1}{|c|}{3} \\ \hline
|
||||||
|
\multicolumn{1}{|c|}{382} & \multicolumn{1}{|c|}{175} & \multicolumn{1}{|c|}{250} & \multicolumn{1}{|c|}{2111} & \multicolumn{1}{|c|}{86} & \multicolumn{1}{|c|}{3} \\ \hline
|
||||||
|
\multicolumn{1}{|c|}{398} & \multicolumn{1}{|c|}{129} & \multicolumn{1}{|c|}{314} & \multicolumn{1}{|c|}{2047} & \multicolumn{1}{|c|}{130} & \multicolumn{1}{|c|}{3} \\ \hline
|
||||||
|
\multicolumn{1}{|c|}{406} & \multicolumn{1}{|c|}{129} & \multicolumn{1}{|c|}{2} & \multicolumn{1}{|c|}{1244} & \multicolumn{1}{|c|}{2} & \multicolumn{1}{|c|}{0} \\ \hline
|
||||||
|
\multicolumn{1}{|c|}{410} & \multicolumn{1}{|c|}{129} & \multicolumn{1}{|c|}{4} & \multicolumn{1}{|c|}{1243} & \multicolumn{1}{|c|}{4} & \multicolumn{1}{|c|}{0} \\ \hline
|
||||||
|
\end{tabular}
|
||||||
|
\caption{Top 15 Nodes with K-path Edge Centrality}
|
||||||
|
\label{table:car-kpe}
|
||||||
|
\end{table}
|
||||||
|
|
||||||
|
|
||||||
|
|
||||||
|
\begin{table}[]
|
||||||
|
\centering
|
||||||
|
\begin{tabular}{|cc|cc|cc|}
|
||||||
|
\hline
|
||||||
|
\multicolumn{2}{|c|}{\cellcolor[HTML]{FFFF00}\textbf{Base}} & \multicolumn{2}{|c|}{\cellcolor[HTML]{FFFF00}\textbf{Transitive Closure}} & \multicolumn{2}{|c|}{\cellcolor[HTML]{FFFF00}\textbf{Dominant Tree}} \\ \hline
|
||||||
|
\multicolumn{1}{|c|}{\textbf{Node}} & \textbf{Value} & \multicolumn{1}{|c|}{\textbf{Node}} & \textbf{Value} & \multicolumn{1}{|c|}{\textbf{Node}} & \textbf{Value} \\ \hline
|
||||||
|
\multicolumn{1}{|c|}{2490} & 0.0827 & \multicolumn{1}{|c|}{2490} & 0.1992 & \multicolumn{1}{|c|}{314} & 0.001655 \\ \hline
|
||||||
|
\multicolumn{1}{|c|}{1004} & 0.01506 & \multicolumn{1}{|c|}{2479} & 0.0158 & \multicolumn{1}{|c|}{250} & 0.001479 \\ \hline
|
||||||
|
\multicolumn{1}{|c|}{1467} & 0.00969 & \multicolumn{1}{|c|}{2480} & 0.0158 & \multicolumn{1}{|c|}{187} & 0.001272 \\ \hline
|
||||||
|
\multicolumn{1}{|c|}{2479} & 0.00948 & \multicolumn{1}{|c|}{2481} & 0.0158 & \multicolumn{1}{|c|}{130} & 0.001028 \\ \hline
|
||||||
|
\multicolumn{1}{|c|}{2480} & 0.00948 & \multicolumn{1}{|c|}{2482} & 0.0158 & \multicolumn{1}{|c|}{42} & 0.001025 \\ \hline
|
||||||
|
\multicolumn{1}{|c|}{2481} & 0.00948 & \multicolumn{1}{|c|}{2483} & 0.0158 & \multicolumn{1}{|c|}{87} & 0.00074 \\ \hline
|
||||||
|
\multicolumn{1}{|c|}{2482} & 0.00948 & \multicolumn{1}{|c|}{2484} & 0.014 & \multicolumn{1}{|c|}{27} & 0.00074 \\ \hline
|
||||||
|
\multicolumn{1}{|c|}{2483} & 0.00948 & \multicolumn{1}{|c|}{2485} & 0.014 & \multicolumn{1}{|c|}{1} & 0.00074 \\ \hline
|
||||||
|
\multicolumn{1}{|c|}{667} & 0.00919 & \multicolumn{1}{|c|}{2486} & 0.0139 & \multicolumn{1}{|c|}{378} & 0.00044 \\ \hline
|
||||||
|
\multicolumn{1}{|c|}{2484} & 0.0083 & \multicolumn{1}{|c|}{2487} & 0.0139 & \multicolumn{1}{|c|}{379} & 0.00044 \\ \hline
|
||||||
|
\multicolumn{1}{|c|}{2485} & 0.0083 & \multicolumn{1}{|c|}{2488} & 0.0139 & \multicolumn{1}{|c|}{380} & 0.00044 \\ \hline
|
||||||
|
\multicolumn{1}{|c|}{2486} & 0.0083 & \multicolumn{1}{|c|}{2489} & 0.0139 & \multicolumn{1}{|c|}{381} & 0.00044 \\ \hline
|
||||||
|
\multicolumn{1}{|c|}{2487} & 0.0083 & \multicolumn{1}{|c|}{2424} & 0.0029 & \multicolumn{1}{|c|}{382} & 0.00044 \\ \hline
|
||||||
|
\multicolumn{1}{|c|}{2488} & 0.0083 & \multicolumn{1}{|c|}{2425} & 0.0029 & \multicolumn{1}{|c|}{470} & 0.00044 \\ \hline
|
||||||
|
\multicolumn{1}{|c|}{2489} & 0.0083 & \multicolumn{1}{|c|}{2426} & 0.0029 & \multicolumn{1}{|c|}{471} & 0.00044 \\ \hline
|
||||||
|
\end{tabular}
|
||||||
|
\caption{Top 15 Nodes with PageRank Centrality}
|
||||||
|
\label{table:car-APC}
|
||||||
|
\end{table}
|
||||||
|
|
||||||
|
|
||||||
|
\begin{table}[]
|
||||||
|
\centering
|
||||||
|
\begin{tabular}{|cc|cc|cc|}
|
||||||
|
\hline
|
||||||
|
\multicolumn{2}{|c|}{\cellcolor[HTML]{FFFF00}\textbf{Base}} & \multicolumn{2}{|c|}{\cellcolor[HTML]{FFFF00}\textbf{Transitive Closure}} & \multicolumn{2}{|c|}{\cellcolor[HTML]{FFFF00}\textbf{Dominant Tree}} \\ \hline
|
||||||
|
\multicolumn{1}{|c|}{\textbf{Node}} & \textbf{Value} & \multicolumn{1}{|c|}{\textbf{Node}} & \textbf{Value} & \multicolumn{1}{|c|}{\textbf{Node}} & \textbf{Value} \\ \hline
|
||||||
|
\multicolumn{1}{|c|}{42} & 9067.205 & \multicolumn{1}{|c|}{0} & 0 & \multicolumn{1}{|c|}{1} & 2489 \\ \hline
|
||||||
|
\multicolumn{1}{|c|}{27} & 8442.166 & \multicolumn{1}{|c|}{1} & 0 & \multicolumn{1}{|c|}{3} & 2486 \\ \hline
|
||||||
|
\multicolumn{1}{|c|}{60} & 8279.62 & \multicolumn{1}{|c|}{2} & 0 & \multicolumn{1}{|c|}{7} & 927 \\ \hline
|
||||||
|
\multicolumn{1}{|c|}{87} & 7580.359 & \multicolumn{1}{|c|}{3} & 0 & \multicolumn{1}{|c|}{42} & 906 \\ \hline
|
||||||
|
\multicolumn{1}{|c|}{15} & 7578.523 & \multicolumn{1}{|c|}{4} & 0 & \multicolumn{1}{|c|}{27} & 760 \\ \hline
|
||||||
|
\multicolumn{1}{|c|}{130} & 6868.21 & \multicolumn{1}{|c|}{5} & 0 & \multicolumn{1}{|c|}{15} & 612 \\ \hline
|
||||||
|
\multicolumn{1}{|c|}{7} & 6482.031 & \multicolumn{1}{|c|}{6} & 0 & \multicolumn{1}{|c|}{314} & 372 \\ \hline
|
||||||
|
\multicolumn{1}{|c|}{187} & 6111.862 & \multicolumn{1}{|c|}{7} & 0 & \multicolumn{1}{|c|}{250} & 352 \\ \hline
|
||||||
|
\multicolumn{1}{|c|}{50} & 5950.928 & \multicolumn{1}{|c|}{8} & 0 & \multicolumn{1}{|c|}{187} & 330 \\ \hline
|
||||||
|
\multicolumn{1}{|c|}{70} & 5822.054 & \multicolumn{1}{|c|}{9} & 0 & \multicolumn{1}{|c|}{130} & 306 \\ \hline
|
||||||
|
\multicolumn{1}{|c|}{104} & 5683.944 & \multicolumn{1}{|c|}{10} & 0 & \multicolumn{1}{|c|}{87} & 280 \\ \hline
|
||||||
|
\multicolumn{1}{|c|}{156} & 5474.525 & \multicolumn{1}{|c|}{11} & 0 & \multicolumn{1}{|c|}{60} & 252 \\ \hline
|
||||||
|
\multicolumn{1}{|c|}{1467} & 5299.985 & \multicolumn{1}{|c|}{12} & 0 & \multicolumn{1}{|c|}{0} & 0 \\ \hline
|
||||||
|
\multicolumn{1}{|c|}{250} & 5296.964 & \multicolumn{1}{|c|}{13} & 0 & \multicolumn{1}{|c|}{2} & 0 \\ \hline
|
||||||
|
\multicolumn{1}{|c|}{115} & 5196.398 & \multicolumn{1}{|c|}{14} & 0 & \multicolumn{1}{|c|}{4} & 0 \\ \hline
|
||||||
|
\end{tabular}
|
||||||
|
\caption{Top 15 Nodes with Betweenness Centrality}
|
||||||
|
\label{table:car-betweenness}
|
||||||
|
\end{table}
|
||||||
|
|
||||||
|
\subsection{Result Analysis}
|
||||||
|
When viewing the results of the car networks, unsurprisingly, each centrality method ranks nodes in a different order. These differences in rankings can be used based on additional metrics, such as severity, cost, or disturbance of systems, to identify correction schemes best suited for a given network. However, degree centrality and K-path edge centrality rankings for the top 15 were identical for the car network. This also extends to the HIPAA network, as seen in Appendix \ref{apx:hipaa}, but does not extend to the PCI DSS network. The value for \textit{k} in K-path edge centrality was set to 3. With a relatively small \textit{k} value in comparison to the overall size of the car and HIPAA networks, coupled with the high degree count of the top 15 nodes ranked with degree centrality, it is likely that the high degree count correlates to the K-path edge centrality scoring. This reasoning extends to the PCI DSS network, where the network is substantially smaller and there is a greater connectivity percent.
|
||||||
|
|
||||||
|
Comparing the transitive closure format of compliance graphs, the associated centrality rankings greatly vary from their original compliance graph rankings. As expected however, the root or leaf node has the highest centrality value. Since the root node can reach all nodes, and the leaf node can be reached by all nodes, these two nodes are expectedly ranked high. What is unexpected, however, is that the top 15 rankings are not comprised of the most upstream 15 nodes or the 15 most downstream nodes. While rankings do tend to be higher for more upstream for K-path edge, Katz, and degree centralities, nodes in the 100s, 200s, and 300s all make appearances. Betweenness centrality for the transitive closure representation yielded no valuable insight, since shortest paths to a node from any given node is reachable in 1 step.
|
||||||
|
|
||||||
|
For the dominant tree representation, it was initially hypothesized that nodes ranked highly in the original compliance graph's betweenness centrality or Katz centrality measures would closely relate to the dominant tree results. However, the dominant tree rankings also vary greatly from the original compliance graph's rankings. Even nodes that saw no appearances in the top 15 of the base compliance graph or transitive closure representation made appearances in the dominant tree results. Since the dominant tree format does favor the upstream nodes due to a lesser reordering effect caused by dominance, the PageRank ordering were not predominantly downstream nodes, but mostly nodes in the 300s.
|
||||||
|
|
||||||
|
\section{Conclusions and Future Work}
|
||||||
|
\subsection{Conclusions}
|
||||||
|
Each centrality measure implemented in this work provides various information that is useful for identifying correction schemes based on a network science approach. The results from the centrality methods differ, and each network can determine which rankings should be preferred based on prior knowledge of the network and the overhead of implementing correction measures. In addition, transitive closure representations and dominant trees were derived from the original compliance graphs, and unique rankings were identified. Transitive closure rankings are useful for determining which nodes are most important when an adversarial action can be considered to have infinite time and resources to perform changes to the original system. Dominant tree rankings are useful for determining which nodes are most important from an information flow perspective, where adversarial actions must pass though a series of nodes to reach any other node in the network. By applying correction schemes to the bottlenecks of the network, it may be possible to eliminate branches of the dominant tree entirely, leading to a removal of nodes in the original compliance graph.
|
||||||
|
|
||||||
|
\subsection{Future Work}
|
||||||
|
Based on the results of this work, there is ample room to continue investigation of centrality methods for compliance graphs. With three compliance graphs generated for three different networks along with various node importance rankings, it would be useful to artificially implement correction schemes based on the rankings to see their effects on the compliance graph. Likewise, using a user-defined data matrix in centrality methods like PageRank, further research could examine how node importance varies based on user-defined metrics. Edge weights could also be assigned to the original compliance graphs to represent the probability that a given change in the network could occur. Edge weights would be reflected in the adjacency matrices of the graphs, and centrality methods could be reexamined to determine node importance when probabilities are given. Transitive closures and dominant trees derived from the compliance graphs present a new approach for examining compliance graphs. Further research can be conducted to determine the effects of correction schemes when employed on nodes ranked highly in their respective centrality measures.
|
||||||
|
|
||||||
|
\clearpage
|
||||||
|
\addcontentsline{toc}{section}{Bibliography}
|
||||||
|
\bibliography{Bibliography}
|
||||||
|
\bibliographystyle{ieeetr}
|
||||||
|
|
||||||
|
\include{Appendices}
|
||||||
|
|
||||||
|
|
||||||
|
\end{document}
|
||||||
27
Schrick-Noah_CS-7863_Final-Report.toc
Normal file
27
Schrick-Noah_CS-7863_Final-Report.toc
Normal file
@ -0,0 +1,27 @@
|
|||||||
|
\babel@toc {nil}{}\relax
|
||||||
|
\contentsline {section}{\numberline {1}Introduction}{2}{section.1}%
|
||||||
|
\contentsline {subsection}{\numberline {1.1}Attack Graphs}{2}{subsection.1.1}%
|
||||||
|
\contentsline {subsection}{\numberline {1.2}Compliance Graphs}{2}{subsection.1.2}%
|
||||||
|
\contentsline {subsection}{\numberline {1.3}Difficulties of Compliance Graph Analysis}{3}{subsection.1.3}%
|
||||||
|
\contentsline {section}{\numberline {2}Related Works}{3}{section.2}%
|
||||||
|
\contentsline {section}{\numberline {3}Experimental Networks}{4}{section.3}%
|
||||||
|
\contentsline {section}{\numberline {4}Centralities and their Applications to Compliance Graphs}{5}{section.4}%
|
||||||
|
\contentsline {subsection}{\numberline {4.1}Introduction}{5}{subsection.4.1}%
|
||||||
|
\contentsline {subsection}{\numberline {4.2}Degree}{5}{subsection.4.2}%
|
||||||
|
\contentsline {subsection}{\numberline {4.3}Betweenness}{5}{subsection.4.3}%
|
||||||
|
\contentsline {subsection}{\numberline {4.4}Katz}{6}{subsection.4.4}%
|
||||||
|
\contentsline {subsection}{\numberline {4.5}K-Path Edge}{7}{subsection.4.5}%
|
||||||
|
\contentsline {subsection}{\numberline {4.6}Adapted Page Rank}{7}{subsection.4.6}%
|
||||||
|
\contentsline {section}{\numberline {5}Transitive Closure}{8}{section.5}%
|
||||||
|
\contentsline {subsection}{\numberline {5.1}Introduction and Application}{8}{subsection.5.1}%
|
||||||
|
\contentsline {section}{\numberline {6}Dominant Tree}{9}{section.6}%
|
||||||
|
\contentsline {subsection}{\numberline {6.1}Introduction and Application}{9}{subsection.6.1}%
|
||||||
|
\contentsline {section}{\numberline {7}Results and Result Analysis}{10}{section.7}%
|
||||||
|
\contentsline {subsection}{\numberline {7.1}Results}{10}{subsection.7.1}%
|
||||||
|
\contentsline {subsection}{\numberline {7.2}Result Analysis}{10}{subsection.7.2}%
|
||||||
|
\contentsline {section}{\numberline {8}Conclusions and Future Work}{15}{section.8}%
|
||||||
|
\contentsline {subsection}{\numberline {8.1}Conclusions}{15}{subsection.8.1}%
|
||||||
|
\contentsline {subsection}{\numberline {8.2}Future Work}{16}{subsection.8.2}%
|
||||||
|
\contentsline {section}{Bibliography}{17}{subsection.8.2}%
|
||||||
|
\contentsline {section}{\numberline {A}HIPAA Results}{19}{appendix.A}%
|
||||||
|
\contentsline {section}{\numberline {B}PCI DSS Results}{23}{appendix.B}%
|
||||||
BIN
images/Transitive-closure.png
Normal file
BIN
images/Transitive-closure.png
Normal file
Binary file not shown.
|
After Width: | Height: | Size: 100 KiB |
BIN
images/post-Dtree.png
Normal file
BIN
images/post-Dtree.png
Normal file
Binary file not shown.
|
After Width: | Height: | Size: 29 KiB |
BIN
images/pre-Dtree.png
Normal file
BIN
images/pre-Dtree.png
Normal file
Binary file not shown.
|
After Width: | Height: | Size: 25 KiB |
Loading…
x
Reference in New Issue
Block a user