Abstract v1
This commit is contained in:
parent
bf92fdb33f
commit
9e02c8720b
@ -24,23 +24,23 @@
|
|||||||
\citation{newman2010networks}
|
\citation{newman2010networks}
|
||||||
\citation{Mieghem2018DirectedGA}
|
\citation{Mieghem2018DirectedGA}
|
||||||
\citation{Mieghem2018DirectedGA}
|
\citation{Mieghem2018DirectedGA}
|
||||||
\citation{10.1145/3491257}
|
|
||||||
\citation{Guo2017HermitianAM}
|
|
||||||
\citation{Mieghem2018DirectedGA}
|
|
||||||
\citation{Brualdi2010SpectraOD}
|
|
||||||
\babel@aux{nil}{}
|
\babel@aux{nil}{}
|
||||||
\@writefile{toc}{\contentsline {section}{\numberline {I}Introduction}{1}{section.1}\protected@file@percent }
|
\@writefile{toc}{\contentsline {section}{\numberline {I}Introduction}{1}{section.1}\protected@file@percent }
|
||||||
\@writefile{toc}{\contentsline {subsection}{\numberline {\mbox {I-A}}Compliance Graphs}{1}{subsection.1.1}\protected@file@percent }
|
\@writefile{toc}{\contentsline {subsection}{\numberline {\mbox {I-A}}Compliance Graphs}{1}{subsection.1.1}\protected@file@percent }
|
||||||
\@writefile{toc}{\contentsline {subsection}{\numberline {\mbox {I-B}}Difficulties of Attack and Compliance Graph Analysis}{1}{subsection.1.2}\protected@file@percent }
|
\@writefile{toc}{\contentsline {subsection}{\numberline {\mbox {I-B}}Difficulties of Attack and Compliance Graph Analysis}{1}{subsection.1.2}\protected@file@percent }
|
||||||
\@writefile{toc}{\contentsline {section}{\numberline {II}Related Works}{1}{section.2}\protected@file@percent }
|
\citation{10.1145/3491257}
|
||||||
|
\citation{Guo2017HermitianAM}
|
||||||
|
\citation{Mieghem2018DirectedGA}
|
||||||
|
\citation{Brualdi2010SpectraOD}
|
||||||
\citation{noauthor_health_1996}
|
\citation{noauthor_health_1996}
|
||||||
\citation{PCI}
|
\citation{PCI}
|
||||||
\citation{PMID:30064421}
|
\citation{PMID:30064421}
|
||||||
|
\@writefile{toc}{\contentsline {section}{\numberline {II}Related Works}{2}{section.2}\protected@file@percent }
|
||||||
|
\@writefile{toc}{\contentsline {section}{\numberline {III}Experimental Networks}{2}{section.3}\protected@file@percent }
|
||||||
|
\newlabel{sec:networks}{{III}{2}{Experimental Networks}{section.3}{}}
|
||||||
\@writefile{lot}{\contentsline {table}{\numberline {I}{\ignorespaces Network Properties for the Three Networks Utilized\relax }}{2}{table.1}\protected@file@percent }
|
\@writefile{lot}{\contentsline {table}{\numberline {I}{\ignorespaces Network Properties for the Three Networks Utilized\relax }}{2}{table.1}\protected@file@percent }
|
||||||
\providecommand*\caption@xref[2]{\@setref\relax\@undefined{#1}}
|
\providecommand*\caption@xref[2]{\@setref\relax\@undefined{#1}}
|
||||||
\newlabel{table:networks}{{I}{2}{Network Properties for the Three Networks Utilized\relax }{table.1}{}}
|
\newlabel{table:networks}{{I}{2}{Network Properties for the Three Networks Utilized\relax }{table.1}{}}
|
||||||
\@writefile{toc}{\contentsline {section}{\numberline {III}Experimental Networks}{2}{section.3}\protected@file@percent }
|
|
||||||
\newlabel{sec:networks}{{III}{2}{Experimental Networks}{section.3}{}}
|
|
||||||
\@writefile{toc}{\contentsline {section}{\numberline {IV}Centralities and their Contextualizations to Compliance Graphs}{2}{section.4}\protected@file@percent }
|
\@writefile{toc}{\contentsline {section}{\numberline {IV}Centralities and their Contextualizations to Compliance Graphs}{2}{section.4}\protected@file@percent }
|
||||||
\newlabel{sec:centralities}{{IV}{2}{Centralities and their Contextualizations to Compliance Graphs}{section.4}{}}
|
\newlabel{sec:centralities}{{IV}{2}{Centralities and their Contextualizations to Compliance Graphs}{section.4}{}}
|
||||||
\@writefile{toc}{\contentsline {subsection}{\numberline {\mbox {IV-A}}Introduction}{2}{subsection.4.1}\protected@file@percent }
|
\@writefile{toc}{\contentsline {subsection}{\numberline {\mbox {IV-A}}Introduction}{2}{subsection.4.1}\protected@file@percent }
|
||||||
@ -59,28 +59,28 @@
|
|||||||
\newlabel{eq:kpe}{{4}{3}{K-Path Edge}{equation.4.4}{}}
|
\newlabel{eq:kpe}{{4}{3}{K-Path Edge}{equation.4.4}{}}
|
||||||
\@writefile{toc}{\contentsline {subsection}{\numberline {\mbox {IV-F}}Adapted Page Rank}{3}{subsection.4.6}\protected@file@percent }
|
\@writefile{toc}{\contentsline {subsection}{\numberline {\mbox {IV-F}}Adapted Page Rank}{3}{subsection.4.6}\protected@file@percent }
|
||||||
\newlabel{eq:PR}{{5}{3}{Adapted Page Rank}{equation.4.5}{}}
|
\newlabel{eq:PR}{{5}{3}{Adapted Page Rank}{equation.4.5}{}}
|
||||||
\newlabel{eq:APC}{{6}{3}{Adapted Page Rank}{equation.4.6}{}}
|
|
||||||
\citation{li_combining_2019}
|
\citation{li_combining_2019}
|
||||||
\citation{zeng_cyber_2017}
|
\citation{zeng_cyber_2017}
|
||||||
\citation{dominance}
|
\citation{dominance}
|
||||||
|
\newlabel{eq:APC}{{6}{4}{Adapted Page Rank}{equation.4.6}{}}
|
||||||
\@writefile{toc}{\contentsline {section}{\numberline {V}Transitive Closure}{4}{section.5}\protected@file@percent }
|
\@writefile{toc}{\contentsline {section}{\numberline {V}Transitive Closure}{4}{section.5}\protected@file@percent }
|
||||||
\@writefile{toc}{\contentsline {subsection}{\numberline {\mbox {V-A}}Introduction and Application}{4}{subsection.5.1}\protected@file@percent }
|
\@writefile{toc}{\contentsline {subsection}{\numberline {\mbox {V-A}}Introduction and Application}{4}{subsection.5.1}\protected@file@percent }
|
||||||
\@writefile{toc}{\contentsline {section}{\numberline {VI}Dominant Tree}{4}{section.6}\protected@file@percent }
|
\@writefile{toc}{\contentsline {section}{\numberline {VI}Dominant Tree}{4}{section.6}\protected@file@percent }
|
||||||
\@writefile{toc}{\contentsline {subsection}{\numberline {\mbox {VI-A}}Introduction and Application}{4}{subsection.6.1}\protected@file@percent }
|
\@writefile{toc}{\contentsline {subsection}{\numberline {\mbox {VI-A}}Introduction and Application}{4}{subsection.6.1}\protected@file@percent }
|
||||||
\@writefile{lof}{\contentsline {figure}{\numberline {1}{\ignorespaces Example of Transitive Closure\relax }}{4}{figure.caption.1}\protected@file@percent }
|
\@writefile{lof}{\contentsline {figure}{\numberline {1}{\ignorespaces Transitive Closure Illustration\relax }}{4}{figure.caption.1}\protected@file@percent }
|
||||||
\newlabel{fig:TC}{{1}{4}{Example of Transitive Closure\relax }{figure.caption.1}{}}
|
\newlabel{fig:TC}{{1}{4}{Transitive Closure Illustration\relax }{figure.caption.1}{}}
|
||||||
\@writefile{lof}{\contentsline {figure}{\numberline {2}{\ignorespaces Example Network for Illustrating Dominance\relax }}{5}{figure.caption.2}\protected@file@percent }
|
\@writefile{lof}{\contentsline {figure}{\numberline {2}{\ignorespaces Example Network for Illustrating Dominance\relax }}{5}{figure.caption.2}\protected@file@percent }
|
||||||
\newlabel{fig:domNet}{{2}{5}{Example Network for Illustrating Dominance\relax }{figure.caption.2}{}}
|
\newlabel{fig:domNet}{{2}{5}{Example Network for Illustrating Dominance\relax }{figure.caption.2}{}}
|
||||||
\@writefile{lof}{\contentsline {figure}{\numberline {3}{\ignorespaces Dominant Tree Derived from the Network Displayed in Figure \ref {fig:domNet}\relax }}{5}{figure.caption.3}\protected@file@percent }
|
\@writefile{lof}{\contentsline {figure}{\numberline {3}{\ignorespaces Dominant Tree Derived from the Network Displayed in Figure \ref {fig:domNet}\relax }}{5}{figure.caption.3}\protected@file@percent }
|
||||||
\newlabel{fig:domTree}{{3}{5}{Dominant Tree Derived from the Network Displayed in Figure \ref {fig:domNet}\relax }{figure.caption.3}{}}
|
\newlabel{fig:domTree}{{3}{5}{Dominant Tree Derived from the Network Displayed in Figure \ref {fig:domNet}\relax }{figure.caption.3}{}}
|
||||||
\@writefile{lot}{\contentsline {table}{\numberline {II}{\ignorespaces Top 15 Nodes with Degree Centrality\relax }}{5}{table.2}\protected@file@percent }
|
\@writefile{lot}{\contentsline {table}{\numberline {II}{\ignorespaces Top 15 Nodes with Degree Centrality\relax }}{5}{table.2}\protected@file@percent }
|
||||||
\newlabel{table:car-deg}{{II}{5}{Top 15 Nodes with Degree Centrality\relax }{table.2}{}}
|
\newlabel{table:car-deg}{{II}{5}{Top 15 Nodes with Degree Centrality\relax }{table.2}{}}
|
||||||
\@writefile{lot}{\contentsline {table}{\numberline {III}{\ignorespaces Top 15 Nodes with Katz Centrality\relax }}{5}{table.3}\protected@file@percent }
|
|
||||||
\newlabel{table:car-katz}{{III}{5}{Top 15 Nodes with Katz Centrality\relax }{table.3}{}}
|
|
||||||
\@writefile{toc}{\contentsline {section}{\numberline {VII}Results and Result Analysis}{5}{section.7}\protected@file@percent }
|
\@writefile{toc}{\contentsline {section}{\numberline {VII}Results and Result Analysis}{5}{section.7}\protected@file@percent }
|
||||||
\newlabel{sec:results}{{VII}{5}{Results and Result Analysis}{section.7}{}}
|
\newlabel{sec:results}{{VII}{5}{Results and Result Analysis}{section.7}{}}
|
||||||
\@writefile{toc}{\contentsline {subsection}{\numberline {\mbox {VII-A}}Results}{5}{subsection.7.1}\protected@file@percent }
|
\@writefile{toc}{\contentsline {subsection}{\numberline {\mbox {VII-A}}Results}{5}{subsection.7.1}\protected@file@percent }
|
||||||
\@writefile{toc}{\contentsline {subsection}{\numberline {\mbox {VII-B}}Result Analysis}{5}{subsection.7.2}\protected@file@percent }
|
\@writefile{toc}{\contentsline {subsection}{\numberline {\mbox {VII-B}}Result Analysis}{5}{subsection.7.2}\protected@file@percent }
|
||||||
|
\@writefile{lot}{\contentsline {table}{\numberline {III}{\ignorespaces Top 15 Nodes with Katz Centrality\relax }}{6}{table.3}\protected@file@percent }
|
||||||
|
\newlabel{table:car-katz}{{III}{6}{Top 15 Nodes with Katz Centrality\relax }{table.3}{}}
|
||||||
\@writefile{lot}{\contentsline {table}{\numberline {IV}{\ignorespaces Top 15 Nodes with K-path Edge Centrality\relax }}{6}{table.4}\protected@file@percent }
|
\@writefile{lot}{\contentsline {table}{\numberline {IV}{\ignorespaces Top 15 Nodes with K-path Edge Centrality\relax }}{6}{table.4}\protected@file@percent }
|
||||||
\newlabel{table:car-kpe}{{IV}{6}{Top 15 Nodes with K-path Edge Centrality\relax }{table.4}{}}
|
\newlabel{table:car-kpe}{{IV}{6}{Top 15 Nodes with K-path Edge Centrality\relax }{table.4}{}}
|
||||||
\@writefile{lot}{\contentsline {table}{\numberline {V}{\ignorespaces Top 15 Nodes with PageRank Centrality\relax }}{6}{table.5}\protected@file@percent }
|
\@writefile{lot}{\contentsline {table}{\numberline {V}{\ignorespaces Top 15 Nodes with PageRank Centrality\relax }}{6}{table.5}\protected@file@percent }
|
||||||
|
|||||||
@ -1,4 +1,4 @@
|
|||||||
This is pdfTeX, Version 3.141592653-2.6-1.40.24 (TeX Live 2022/Arch Linux) (preloaded format=pdflatex 2022.11.8) 16 JAN 2023 15:15
|
This is pdfTeX, Version 3.141592653-2.6-1.40.24 (TeX Live 2022/Arch Linux) (preloaded format=pdflatex 2022.11.8) 16 JAN 2023 16:35
|
||||||
entering extended mode
|
entering extended mode
|
||||||
restricted \write18 enabled.
|
restricted \write18 enabled.
|
||||||
%&-line parsing enabled.
|
%&-line parsing enabled.
|
||||||
@ -541,145 +541,131 @@ LaTeX Info: Redefining \nameref on input line 36.
|
|||||||
\openout3 = `Schrick-Noah_CG-Network_Theory.out'.
|
\openout3 = `Schrick-Noah_CG-Network_Theory.out'.
|
||||||
|
|
||||||
|
|
||||||
Underfull \hbox (badness 10000) in paragraph at lines 67--69
|
Underfull \hbox (badness 2922) in paragraph at lines 64--67
|
||||||
|
[]\OT1/ptm/b/it/9 Abstract\OT1/ptm/b/n/9 ---Compliance graphs are generated gra
|
||||||
|
phs (or
|
||||||
|
[]
|
||||||
|
|
||||||
|
|
||||||
|
Underfull \hbox (badness 1371) in paragraph at lines 64--67
|
||||||
|
\OT1/ptm/b/n/9 can be used to identify possible correction or mitigation
|
||||||
|
[]
|
||||||
|
|
||||||
|
|
||||||
|
Underfull \hbox (badness 10000) in paragraph at lines 69--71
|
||||||
[]\OT1/ptm/b/it/9 Index Terms\OT1/ptm/b/n/9 ---Attack Graph; Compliance Graph;
|
[]\OT1/ptm/b/it/9 Index Terms\OT1/ptm/b/n/9 ---Attack Graph; Compliance Graph;
|
||||||
[]
|
[]
|
||||||
|
|
||||||
|
|
||||||
Underfull \hbox (badness 3128) in paragraph at lines 75--76
|
Underfull \hbox (badness 3128) in paragraph at lines 77--78
|
||||||
\OT1/ptm/m/n/10 compliance graphs is focused less on certain security
|
\OT1/ptm/m/n/10 compliance graphs is focused less on certain security
|
||||||
[]
|
[]
|
||||||
|
|
||||||
|
|
||||||
Underfull \hbox (badness 1365) in paragraph at lines 80--81
|
Underfull \hbox (badness 1365) in paragraph at lines 82--83
|
||||||
\OT1/ptm/m/n/10 involved compared to their undirected counterparts. The
|
\OT1/ptm/m/n/10 involved compared to their undirected counterparts. The
|
||||||
[]
|
[]
|
||||||
|
|
||||||
|
|
||||||
Underfull \hbox (badness 1688) in paragraph at lines 83--84
|
|
||||||
\OT1/ptm/m/n/10 work examining directed, undirected, and mixed graphs
|
|
||||||
[]
|
|
||||||
|
|
||||||
[1{/var/lib/texmf/fonts/map/pdftex/updmap/pdftex.map}
|
[1{/var/lib/texmf/fonts/map/pdftex/updmap/pdftex.map}
|
||||||
|
|
||||||
|
|
||||||
]
|
]
|
||||||
Underfull \hbox (badness 2698) in paragraph at lines 86--87
|
Underfull \hbox (badness 1688) in paragraph at lines 85--86
|
||||||
|
\OT1/ptm/m/n/10 work examining directed, undirected, and mixed graphs
|
||||||
|
[]
|
||||||
|
|
||||||
|
|
||||||
|
Underfull \hbox (badness 2698) in paragraph at lines 88--89
|
||||||
[]\OT1/ptm/m/n/10 The work conducted in this approach utilized three
|
[]\OT1/ptm/m/n/10 The work conducted in this approach utilized three
|
||||||
[]
|
[]
|
||||||
|
|
||||||
|
|
||||||
LaTeX Warning: No positions in optional float specifier.
|
LaTeX Warning: No positions in optional float specifier.
|
||||||
Default added (so using `tbp') on input line 88.
|
Default added (so using `tbp') on input line 90.
|
||||||
|
|
||||||
LaTeX Font Info: External font `cmex10' loaded for size
|
LaTeX Font Info: External font `cmex10' loaded for size
|
||||||
(Font) <7> on input line 91.
|
(Font) <7> on input line 93.
|
||||||
LaTeX Font Info: External font `cmex10' loaded for size
|
LaTeX Font Info: External font `cmex10' loaded for size
|
||||||
(Font) <5> on input line 91.
|
(Font) <5> on input line 93.
|
||||||
|
|
||||||
Underfull \hbox (badness 1448) in paragraph at lines 104--105
|
Underfull \hbox (badness 1448) in paragraph at lines 106--107
|
||||||
\OT1/ptm/m/n/10 importance in networks. By determining the importance
|
\OT1/ptm/m/n/10 importance in networks. By determining the importance
|
||||||
[]
|
[]
|
||||||
|
|
||||||
|
[2]
|
||||||
Underfull \vbox (badness 10000) has occurred while \output is active []
|
|
||||||
|
|
||||||
[2]
|
|
||||||
LaTeX Font Info: Trying to load font information for U+dsrom on input line 1
|
LaTeX Font Info: Trying to load font information for U+dsrom on input line 1
|
||||||
54.
|
56.
|
||||||
|
(/usr/share/texmf-dist/tex/latex/doublestroke/Udsrom.fd
|
||||||
(/usr/share/texmf-dist/tex/latex/doublestroke/Udsrom.fd
|
|
||||||
File: Udsrom.fd 1995/08/01 v0.1 Double stroke roman font definitions
|
File: Udsrom.fd 1995/08/01 v0.1 Double stroke roman font definitions
|
||||||
) [3]
|
) [3]
|
||||||
<./images/TC.png, id=179, 378.41376pt x 522.95375pt>
|
<./images/TC.png, id=177, 378.41376pt x 522.95375pt>
|
||||||
File: ./images/TC.png Graphic file (type png)
|
File: ./images/TC.png Graphic file (type png)
|
||||||
<use ./images/TC.png>
|
<use ./images/TC.png>
|
||||||
Package pdftex.def Info: ./images/TC.png used on input line 169.
|
Package pdftex.def Info: ./images/TC.png used on input line 171.
|
||||||
(pdftex.def) Requested size: 227.05pt x 313.77466pt.
|
(pdftex.def) Requested size: 227.05pt x 313.77466pt.
|
||||||
<./images/dom_net.png, id=182, 319.1925pt x 432.61626pt>
|
<./images/dom_net.png, id=180, 319.1925pt x 432.61626pt>
|
||||||
File: ./images/dom_net.png Graphic file (type png)
|
File: ./images/dom_net.png Graphic file (type png)
|
||||||
<use ./images/dom_net.png>
|
<use ./images/dom_net.png>
|
||||||
Package pdftex.def Info: ./images/dom_net.png used on input line 185.
|
Package pdftex.def Info: ./images/dom_net.png used on input line 187.
|
||||||
(pdftex.def) Requested size: 191.51697pt x 259.57176pt.
|
(pdftex.def) Requested size: 191.51697pt x 259.57176pt.
|
||||||
<./images/dom_tree.png, id=183, 352.31625pt x 312.16624pt>
|
<./images/dom_tree.png, id=181, 352.31625pt x 312.16624pt>
|
||||||
File: ./images/dom_tree.png Graphic file (type png)
|
File: ./images/dom_tree.png Graphic file (type png)
|
||||||
<use ./images/dom_tree.png>
|
<use ./images/dom_tree.png>
|
||||||
Package pdftex.def Info: ./images/dom_tree.png used on input line 192.
|
Package pdftex.def Info: ./images/dom_tree.png used on input line 194.
|
||||||
(pdftex.def) Requested size: 211.39137pt x 187.3012pt.
|
(pdftex.def) Requested size: 211.39137pt x 187.3012pt.
|
||||||
|
|
||||||
Underfull \vbox (badness 10000) has occurred while \output is active []
|
|
||||||
|
|
||||||
[4 <./images/TC.png>]
|
[4 <./images/TC.png>]
|
||||||
|
|
||||||
LaTeX Warning: No positions in optional float specifier.
|
LaTeX Warning: No positions in optional float specifier.
|
||||||
Default added (so using `tbp') on input line 205.
|
Default added (so using `tbp') on input line 207.
|
||||||
|
|
||||||
|
|
||||||
LaTeX Warning: No positions in optional float specifier.
|
LaTeX Warning: No positions in optional float specifier.
|
||||||
Default added (so using `tbp') on input line 238.
|
Default added (so using `tbp') on input line 240.
|
||||||
|
|
||||||
|
|
||||||
LaTeX Warning: No positions in optional float specifier.
|
LaTeX Warning: No positions in optional float specifier.
|
||||||
Default added (so using `tbp') on input line 271.
|
Default added (so using `tbp') on input line 273.
|
||||||
|
|
||||||
|
|
||||||
LaTeX Warning: No positions in optional float specifier.
|
LaTeX Warning: No positions in optional float specifier.
|
||||||
Default added (so using `tbp') on input line 304.
|
Default added (so using `tbp') on input line 306.
|
||||||
|
|
||||||
|
|
||||||
LaTeX Warning: No positions in optional float specifier.
|
LaTeX Warning: No positions in optional float specifier.
|
||||||
Default added (so using `tbp') on input line 337.
|
Default added (so using `tbp') on input line 339.
|
||||||
|
|
||||||
|
|
||||||
Underfull \hbox (badness 10000) in paragraph at lines 371--372
|
Underfull \hbox (badness 10000) in paragraph at lines 373--374
|
||||||
[]\OT1/ptm/m/n/10 When viewing the results of the car networks,
|
[]\OT1/ptm/m/n/10 When viewing the results of the car networks,
|
||||||
[]
|
[]
|
||||||
|
|
||||||
|
|
||||||
Underfull \hbox (badness 1997) in paragraph at lines 371--372
|
Underfull \hbox (badness 1997) in paragraph at lines 373--374
|
||||||
\OT1/ptm/m/n/10 based on additional metrics, such as severity, cost, or
|
\OT1/ptm/m/n/10 based on additional metrics, such as severity, cost, or
|
||||||
[]
|
[]
|
||||||
|
|
||||||
[5 <./images/dom_net.png> <./images/dom_tree.png>]
|
[5 <./images/dom_net.png> <./images/dom_tree.png>]
|
||||||
Underfull \hbox (badness 3428) in paragraph at lines 373--374
|
Underfull \hbox (badness 3428) in paragraph at lines 375--376
|
||||||
\OT1/ptm/m/n/10 their original compliance graph rankings. As expected
|
\OT1/ptm/m/n/10 their original compliance graph rankings. As expected
|
||||||
[]
|
[]
|
||||||
|
|
||||||
|
|
||||||
Underfull \hbox (badness 1789) in paragraph at lines 375--376
|
Underfull \hbox (badness 1789) in paragraph at lines 377--378
|
||||||
[]\OT1/ptm/m/n/10 For the dominant tree representation, it was initially
|
[]\OT1/ptm/m/n/10 For the dominant tree representation, it was initially
|
||||||
[]
|
[]
|
||||||
|
|
||||||
|
|
||||||
Underfull \hbox (badness 3009) in paragraph at lines 375--376
|
Underfull \hbox (badness 3009) in paragraph at lines 377--378
|
||||||
\OT1/ptm/m/n/10 hypothesized that nodes ranked highly in the original
|
\OT1/ptm/m/n/10 hypothesized that nodes ranked highly in the original
|
||||||
[]
|
[]
|
||||||
|
|
||||||
|
[6]
|
||||||
Underfull \hbox (badness 2781) in paragraph at lines 379--380
|
Underfull \hbox (badness 1688) in paragraph at lines 381--382
|
||||||
\OT1/ptm/m/n/10 prior knowledge of the network and the overhead of
|
\OT1/ptm/m/n/10 correction measures. In addition, transitive closures and
|
||||||
[]
|
[]
|
||||||
|
|
||||||
|
|
||||||
Underfull \hbox (badness 1442) in paragraph at lines 379--380
|
Underfull \hbox (badness 2591) in paragraph at lines 384--385
|
||||||
\OT1/ptm/m/n/10 implementing correction measures. In addition, transitive
|
|
||||||
[]
|
|
||||||
|
|
||||||
|
|
||||||
Underfull \hbox (badness 1354) in paragraph at lines 379--380
|
|
||||||
\OT1/ptm/m/n/10 closure representations and dominant trees were derived
|
|
||||||
[]
|
|
||||||
|
|
||||||
|
|
||||||
Underfull \hbox (badness 2269) in paragraph at lines 379--380
|
|
||||||
\OT1/ptm/m/n/10 determining which nodes are most important when an
|
|
||||||
[]
|
|
||||||
|
|
||||||
|
|
||||||
Underfull \vbox (badness 10000) has occurred while \output is active []
|
|
||||||
|
|
||||||
[6]
|
|
||||||
Underfull \hbox (badness 2591) in paragraph at lines 382--383
|
|
||||||
\OT1/ptm/m/n/10 different networks along with various node importance
|
\OT1/ptm/m/n/10 different networks along with various node importance
|
||||||
[]
|
[]
|
||||||
|
|
||||||
@ -743,11 +729,11 @@ changed.
|
|||||||
Here is how much of TeX's memory you used:
|
Here is how much of TeX's memory you used:
|
||||||
13113 strings out of 478238
|
13113 strings out of 478238
|
||||||
218238 string characters out of 5850456
|
218238 string characters out of 5850456
|
||||||
577312 words of memory out of 5000000
|
581314 words of memory out of 5000000
|
||||||
31115 multiletter control sequences out of 15000+600000
|
31115 multiletter control sequences out of 15000+600000
|
||||||
503172 words of font info for 89 fonts, out of 8000000 for 9000
|
503172 words of font info for 89 fonts, out of 8000000 for 9000
|
||||||
1141 hyphenation exceptions out of 8191
|
1141 hyphenation exceptions out of 8191
|
||||||
67i,9n,77p,1799b,342s stack positions out of 5000i,500n,10000p,200000b,80000s
|
67i,9n,77p,1799b,338s stack positions out of 5000i,500n,10000p,200000b,80000s
|
||||||
{/usr/share/texmf-dist/fonts/enc/dvips/base/8r.enc}</usr/share/texmf-dist/fon
|
{/usr/share/texmf-dist/fonts/enc/dvips/base/8r.enc}</usr/share/texmf-dist/fon
|
||||||
ts/type1/public/amsfonts/cm/cmex10.pfb></usr/share/texmf-dist/fonts/type1/publi
|
ts/type1/public/amsfonts/cm/cmex10.pfb></usr/share/texmf-dist/fonts/type1/publi
|
||||||
c/amsfonts/cm/cmmi10.pfb></usr/share/texmf-dist/fonts/type1/public/amsfonts/cm/
|
c/amsfonts/cm/cmmi10.pfb></usr/share/texmf-dist/fonts/type1/public/amsfonts/cm/
|
||||||
@ -759,7 +745,7 @@ roke/dsrom10.pfb></usr/share/texmf-dist/fonts/type1/urw/times/utmb8a.pfb></usr/
|
|||||||
share/texmf-dist/fonts/type1/urw/times/utmbi8a.pfb></usr/share/texmf-dist/fonts
|
share/texmf-dist/fonts/type1/urw/times/utmbi8a.pfb></usr/share/texmf-dist/fonts
|
||||||
/type1/urw/times/utmr8a.pfb></usr/share/texmf-dist/fonts/type1/urw/times/utmri8
|
/type1/urw/times/utmr8a.pfb></usr/share/texmf-dist/fonts/type1/urw/times/utmri8
|
||||||
a.pfb>
|
a.pfb>
|
||||||
Output written on Schrick-Noah_CG-Network_Theory.pdf (7 pages, 201082 bytes).
|
Output written on Schrick-Noah_CG-Network_Theory.pdf (7 pages, 202591 bytes).
|
||||||
PDF statistics:
|
PDF statistics:
|
||||||
291 PDF objects out of 1000 (max. 8388607)
|
291 PDF objects out of 1000 (max. 8388607)
|
||||||
248 compressed objects within 3 object streams
|
248 compressed objects within 3 object streams
|
||||||
|
|||||||
Binary file not shown.
@ -62,6 +62,8 @@
|
|||||||
\maketitle
|
\maketitle
|
||||||
|
|
||||||
\begin{abstract}
|
\begin{abstract}
|
||||||
|
Compliance graphs are generated graphs (or networks) that represent systems' compliance or regulation standings at present, with expected changes, or both. These graphs are generated as directed acyclic graphs (DAGs), and can be used to identify possible correction or mitigation schemes for environments necessitating compliance to mandates or regulations.
|
||||||
|
DAGs complicate the analysis process due to their underlying graph structures and asymmetry. This work presents network science centralities compatible with DAGs, and structure variations as a means to analyze three different example compliance graphs. Each centrality measure and structural change offers a unique importance ranking that can be used for prioritizing correction or mitigation schemes.
|
||||||
\end{abstract}
|
\end{abstract}
|
||||||
|
|
||||||
\begin{IEEEkeywords}
|
\begin{IEEEkeywords}
|
||||||
@ -169,7 +171,7 @@ Section \ref{sec:networks}, and this transitive closure was then analyzed throug
|
|||||||
\includegraphics[scale=0.6]{"./images/TC.png"}
|
\includegraphics[scale=0.6]{"./images/TC.png"}
|
||||||
\centering
|
\centering
|
||||||
\vspace{.2truein} \centerline{}
|
\vspace{.2truein} \centerline{}
|
||||||
\caption{Example of Transitive Closure}
|
\caption{Transitive Closure Illustration}
|
||||||
\label{fig:TC}
|
\label{fig:TC}
|
||||||
\end{figure}
|
\end{figure}
|
||||||
|
|
||||||
@ -376,7 +378,7 @@ For the dominant tree representation, it was initially hypothesized that nodes r
|
|||||||
|
|
||||||
\section{Conclusions and Future Work}
|
\section{Conclusions and Future Work}
|
||||||
\subsection{Conclusions}
|
\subsection{Conclusions}
|
||||||
Each centrality measure implemented in this work provides various information that is useful for identifying correction schemes based on a network science approach. The results from the centrality methods differ, and each network can determine which rankings should be preferred based on prior knowledge of the network and the overhead of implementing correction measures. In addition, transitive closure representations and dominant trees were derived from the original compliance graphs, and unique rankings were identified. Transitive closure rankings are useful for determining which nodes are most important when an adversarial action can be considered to have infinite time and resources to perform changes to the original system. Dominant tree rankings are useful for determining which nodes are most important from an information flow perspective, where adversarial actions must pass though a series of nodes to reach any other node in the network. By applying correction schemes to the bottlenecks of the network, it may be possible to eliminate branches of the dominant tree entirely, leading to a removal of nodes in the original compliance graph.
|
Each centrality measure implemented in this work provides various information that is useful for identifying correction schemes based on a network science approach. The results from the centrality methods differ, and each network can determine which rankings should be preferred based on prior knowledge of the network and the overhead of implementing correction measures. In addition, transitive closures and dominant trees were derived from the original compliance graphs, and unique rankings were identified. Transitive closure rankings are useful for determining which nodes are most important when an adversarial action can be considered to have infinite time and resources to perform changes to the original system. Dominant tree rankings are useful for determining which nodes are most important from an information flow perspective, where adversarial actions must pass though a series of nodes to reach any other node in the network. By applying correction schemes to the bottlenecks of the network, it may be possible to eliminate branches of the dominant tree entirely, leading to a removal of nodes in the original compliance graph.
|
||||||
|
|
||||||
\subsection{Future Work}
|
\subsection{Future Work}
|
||||||
Based on the results of this work, there is ample room to continue investigation of centrality methods for compliance graphs. With three compliance graphs generated for three different networks along with various node importance rankings, it would be useful to artificially implement correction schemes based on the rankings to see their effects on the compliance graph. Likewise, using a user-defined data matrix in centrality methods like PageRank, further research could examine how node importance varies based on user-defined metrics. Edge weights could also be assigned to the original compliance graphs to represent the probability that a given change in the network could occur. Edge weights would be reflected in the adjacency matrices of the graphs, and centrality methods could be reexamined to determine node importance when state transition probabilities are given. Transitive closures and dominant trees derived from the compliance graphs present a new approach for examining compliance graphs. Further research can be conducted to determine the effects of correction schemes when employed on nodes ranked highly in their respective centrality measures in these formats.
|
Based on the results of this work, there is ample room to continue investigation of centrality methods for compliance graphs. With three compliance graphs generated for three different networks along with various node importance rankings, it would be useful to artificially implement correction schemes based on the rankings to see their effects on the compliance graph. Likewise, using a user-defined data matrix in centrality methods like PageRank, further research could examine how node importance varies based on user-defined metrics. Edge weights could also be assigned to the original compliance graphs to represent the probability that a given change in the network could occur. Edge weights would be reflected in the adjacency matrices of the graphs, and centrality methods could be reexamined to determine node importance when state transition probabilities are given. Transitive closures and dominant trees derived from the compliance graphs present a new approach for examining compliance graphs. Further research can be conducted to determine the effects of correction schemes when employed on nodes ranked highly in their respective centrality measures in these formats.
|
||||||
|
|||||||
Loading…
x
Reference in New Issue
Block a user