Incorporating feedback

This commit is contained in:
Noah L. Schrick 2023-04-04 14:30:40 -05:00
parent 639790d1ec
commit e882215d4c
13 changed files with 306 additions and 179 deletions

View File

@ -18,7 +18,7 @@
file = {Combining OpenCL and MPI to Support Heterogeneous Computing on a Cluster:/home/noah/Zotero/storage/TXHCQ5S8/Combining OpenCL and MPI to Support Heterogeneous Computing on a Cluster.pdf:application/pdf},
}
@phdthesis{zeng_cyber_2017,
@mastersthesis{zeng_cyber_2017,
title = {Cyber {Attack} {Analysis} {Based} on {Markov} {Process} {Model}},
author = {Zeng, Keming},
school = "The University of Tulsa",
@ -252,3 +252,29 @@
type = "{PhD} dissertation",
address = "Tulsa, OK",
}
@article{MO2019121538,
title = {Identifying node importance based on evidence theory in complex networks},
journal = {Physica A: Statistical Mechanics and its Applications},
volume = {529},
pages = {121538},
year = {2019},
issn = {0378-4371},
doi = {https://doi.org/10.1016/j.physa.2019.121538},
url = {https://www.sciencedirect.com/science/article/pii/S0378437119309021},
author = {Hongming Mo and Yong Deng},
keywords = {Complex networks, Important nodes, Evidence theory, Multi-evidence centrality, Comprehensive measure},
}
@article{LI2018512,
title = {Identification of influential spreaders based on classified neighbors in real-world complex networks},
journal = {Applied Mathematics and Computation},
volume = {320},
pages = {512-523},
year = {2018},
issn = {0096-3003},
doi = {https://doi.org/10.1016/j.amc.2017.10.001},
url = {https://www.sciencedirect.com/science/article/pii/S0096300317306884},
author = {Chao Li and Li Wang and Shiwen Sun and Chengyi Xia},
keywords = {Influential spreaders, Identification algorithms, Classified neighbors, Complex networks},
}

View File

@ -28,22 +28,21 @@
\newlabel{table:networks}{{I}{2}}
\@writefile{toc}{\contentsline {section}{\numberline {IV}Centralities and their Contextualizations to Compliance Graphs}{2}{}\protected@file@percent }
\newlabel{sec:centralities}{{IV}{2}}
\@writefile{toc}{\contentsline {subsection}{\numberline {\mbox {IV-A}}Introduction}{2}{}\protected@file@percent }
\@writefile{toc}{\contentsline {subsection}{\numberline {\mbox {IV-B}}Degree}{2}{}\protected@file@percent }
\@writefile{toc}{\contentsline {subsection}{\numberline {\mbox {IV-A}}Degree}{2}{}\protected@file@percent }
\citation{Katz}
\citation{ModKatz}
\citation{K_Path_Edge}
\citation{PageRank}
\citation{Adapted_PageRank}
\@writefile{toc}{\contentsline {subsection}{\numberline {\mbox {IV-C}}Betweenness}{3}{}\protected@file@percent }
\newlabel{sec:between}{{\mbox {IV-C}}{3}}
\@writefile{toc}{\contentsline {subsection}{\numberline {\mbox {IV-B}}Betweenness}{3}{}\protected@file@percent }
\newlabel{sec:between}{{\mbox {IV-B}}{3}}
\newlabel{eq:between}{{1}{3}}
\@writefile{toc}{\contentsline {subsection}{\numberline {\mbox {IV-D}}Katz}{3}{}\protected@file@percent }
\@writefile{toc}{\contentsline {subsection}{\numberline {\mbox {IV-C}}Katz}{3}{}\protected@file@percent }
\newlabel{eq:Katz}{{2}{3}}
\newlabel{eq:mod_katz}{{3}{3}}
\@writefile{toc}{\contentsline {subsection}{\numberline {\mbox {IV-E}}K-Path Edge}{3}{}\protected@file@percent }
\@writefile{toc}{\contentsline {subsection}{\numberline {\mbox {IV-D}}K-Path Edge}{3}{}\protected@file@percent }
\newlabel{eq:kpe}{{4}{3}}
\@writefile{toc}{\contentsline {subsection}{\numberline {\mbox {IV-F}}Adapted Page Rank}{3}{}\protected@file@percent }
\@writefile{toc}{\contentsline {subsection}{\numberline {\mbox {IV-E}}Adapted Page Rank}{3}{}\protected@file@percent }
\citation{li_combining_2019}
\citation{zeng_cyber_2017}
\citation{dominance}
@ -55,14 +54,13 @@
\@writefile{toc}{\contentsline {section}{\numberline {VI}Dominant Tree}{4}{}\protected@file@percent }
\@writefile{lof}{\contentsline {figure}{\numberline {2}{\ignorespaces Example Network for Illustrating Dominance}}{5}{}\protected@file@percent }
\newlabel{fig:domNet}{{2}{5}}
\@writefile{lof}{\contentsline {figure}{\numberline {3}{\ignorespaces Dominant Tree Derived from the Network Displayed in Figure \ref {fig:domNet}}}{5}{}\protected@file@percent }
\@writefile{lof}{\contentsline {figure}{\numberline {3}{\ignorespaces Dominant Tree Derived from the Network Displayed in Figure \ref {fig:domNet}}}{5}{}\protected@file@percent }
\newlabel{fig:domTree}{{3}{5}}
\@writefile{lot}{\contentsline {table}{\numberline {II}{\ignorespaces Top 15 Nodes with Degree Centrality}}{5}{}\protected@file@percent }
\newlabel{table:car-deg}{{II}{5}}
\@writefile{toc}{\contentsline {section}{\numberline {VII}Results and Result Analysis}{5}{}\protected@file@percent }
\newlabel{sec:results}{{VII}{5}}
\@writefile{toc}{\contentsline {subsection}{\numberline {\mbox {VII-A}}Results}{5}{}\protected@file@percent }
\@writefile{toc}{\contentsline {subsection}{\numberline {\mbox {VII-B}}Result Analysis}{5}{}\protected@file@percent }
\@writefile{toc}{\contentsline {subsection}{\numberline {\mbox {VII-A}}Result Analysis}{5}{}\protected@file@percent }
\@writefile{lot}{\contentsline {table}{\numberline {III}{\ignorespaces Top 15 Nodes with Katz Centrality}}{6}{}\protected@file@percent }
\newlabel{table:car-katz}{{III}{6}}
\@writefile{lot}{\contentsline {table}{\numberline {IV}{\ignorespaces Top 15 Nodes with K-path Edge Centrality}}{6}{}\protected@file@percent }
@ -71,6 +69,8 @@
\newlabel{table:car-APC}{{V}{6}}
\@writefile{lot}{\contentsline {table}{\numberline {VI}{\ignorespaces Top 15 Nodes with Betweenness Centrality}}{6}{}\protected@file@percent }
\newlabel{table:car-betweenness}{{VI}{6}}
\citation{LI2018512}
\citation{MO2019121538}
\bibdata{Bibliography}
\bibcite{j_hale_compliance_nodate}{1}
\bibcite{baloyi_guidelines_2019}{2}
@ -91,13 +91,15 @@
\bibcite{K_Path_Edge}{17}
\bibcite{PageRank}{18}
\bibcite{Adapted_PageRank}{19}
\bibcite{li_combining_2019}{20}
\bibcite{zeng_cyber_2017}{21}
\bibcite{dominance}{22}
\@writefile{toc}{\contentsline {section}{\numberline {VIII}Conclusions and Future Work}{7}{}\protected@file@percent }
\@writefile{toc}{\contentsline {subsection}{\numberline {\mbox {VIII-A}}Conclusions}{7}{}\protected@file@percent }
\@writefile{toc}{\contentsline {subsection}{\numberline {\mbox {VIII-B}}Future Work}{7}{}\protected@file@percent }
\@writefile{toc}{\contentsline {section}{Bibliography}{7}{}\protected@file@percent }
\@writefile{toc}{\contentsline {section}{References}{7}{}\protected@file@percent }
\bibcite{li_combining_2019}{20}
\bibcite{zeng_cyber_2017}{21}
\bibcite{dominance}{22}
\bibcite{LI2018512}{23}
\bibcite{MO2019121538}{24}
\bibstyle{ieeetr}
\gdef \@abspage@last{8}

View File

@ -97,8 +97,8 @@ M.~Li, P.~Hawrylak, and J.~Hale, ``Combining {OpenCL} and {MPI} to support
Proceeding Series}, 2019.
\bibitem{zeng_cyber_2017}
K.~Zeng, {\em Cyber {Attack} {Analysis} {Based} on {Markov} {Process} {Model}}.
\newblock PhD thesis, The University of Tulsa, Tulsa, OK, 2017.
K.~Zeng, ``Cyber {Attack} {Analysis} {Based} on {Markov} {Process} {Model},''
Master's thesis, The University of Tulsa, Tulsa, OK, 2017.
\bibitem{dominance}
R.~T. Prosser, ``Applications of boolean matrices to the analysis of flow
@ -106,4 +106,14 @@ R.~T. Prosser, ``Applications of boolean matrices to the analysis of flow
IRE-AIEE-ACM Computer Conference}, IRE-AIEE-ACM '59 (Eastern), (New York, NY,
USA), p.~133138, Association for Computing Machinery, 1959.
\bibitem{LI2018512}
C.~Li, L.~Wang, S.~Sun, and C.~Xia, ``Identification of influential spreaders
based on classified neighbors in real-world complex networks,'' {\em Applied
Mathematics and Computation}, vol.~320, pp.~512--523, 2018.
\bibitem{MO2019121538}
H.~Mo and Y.~Deng, ``Identifying node importance based on evidence theory in
complex networks,'' {\em Physica A: Statistical Mechanics and its
Applications}, vol.~529, p.~121538, 2019.
\end{thebibliography}

View File

@ -1,48 +1,48 @@
This is BibTeX, Version 0.99d (TeX Live 2022/Arch Linux)
This is BibTeX, Version 0.99d (TeX Live 2023/Arch Linux)
Capacity: max_strings=200000, hash_size=200000, hash_prime=170003
The top-level auxiliary file: Schrick-Noah_CG-Network_Theory.aux
The style file: ieeetr.bst
Database file #1: Bibliography.bib
Warning--empty booktitle in Mieghem2018DirectedGA
You've used 22 entries,
You've used 24 entries,
1876 wiz_defined-function locations,
611 strings with 7316 characters,
and the built_in function-call counts, 5311 in all, are:
= -- 537
> -- 181
625 strings with 7712 characters,
and the built_in function-call counts, 5933 in all, are:
= -- 600
> -- 203
< -- 0
+ -- 71
- -- 49
* -- 336
:= -- 738
add.period$ -- 27
call.type$ -- 22
change.case$ -- 20
+ -- 79
- -- 55
* -- 375
:= -- 820
add.period$ -- 28
call.type$ -- 24
change.case$ -- 23
chr.to.int$ -- 0
cite$ -- 23
duplicate$ -- 292
empty$ -- 516
format.name$ -- 49
if$ -- 1325
cite$ -- 25
duplicate$ -- 329
empty$ -- 570
format.name$ -- 55
if$ -- 1485
int.to.chr$ -- 0
int.to.str$ -- 22
missing$ -- 18
newline$ -- 76
num.names$ -- 21
pop$ -- 80
int.to.str$ -- 24
missing$ -- 20
newline$ -- 81
num.names$ -- 23
pop$ -- 85
preamble$ -- 1
purify$ -- 0
quote$ -- 0
skip$ -- 205
skip$ -- 239
stack$ -- 0
substring$ -- 301
swap$ -- 124
substring$ -- 341
swap$ -- 145
text.length$ -- 0
text.prefix$ -- 0
top$ -- 0
type$ -- 0
warning$ -- 1
while$ -- 39
width$ -- 24
write$ -- 213
while$ -- 44
width$ -- 26
write$ -- 232
(There was 1 warning)

View File

@ -1,18 +1,18 @@
This is pdfTeX, Version 3.141592653-2.6-1.40.24 (TeX Live 2022/Arch Linux) (preloaded format=pdflatex 2022.11.8) 17 JAN 2023 15:09
This is pdfTeX, Version 3.141592653-2.6-1.40.25 (TeX Live 2023/Arch Linux) (preloaded format=pdflatex 2023.4.3) 4 APR 2023 14:28
entering extended mode
restricted \write18 enabled.
%&-line parsing enabled.
**Schrick-Noah_CG-Network_Theory
(./Schrick-Noah_CG-Network_Theory.tex
LaTeX2e <2021-11-15> patch level 1
L3 programming layer <2022-04-10>
LaTeX2e <2022-11-01> patch level 1
L3 programming layer <2023-02-22>
(/usr/share/texmf-dist/tex/latex/ieeetran/IEEEtran.cls
Document Class: IEEEtran 2015/08/26 V1.8b by Michael Shell
-- See the "IEEEtran_HOWTO" manual for usage information.
-- http://www.michaelshell.org/tex/ieeetran/
\@IEEEtrantmpdimenA=\dimen138
\@IEEEtrantmpdimenB=\dimen139
\@IEEEtrantmpdimenC=\dimen140
\@IEEEtrantmpdimenA=\dimen140
\@IEEEtrantmpdimenB=\dimen141
\@IEEEtrantmpdimenC=\dimen142
\@IEEEtrantmpcountA=\count185
\@IEEEtrantmpcountB=\count186
\@IEEEtrantmpcountC=\count187
@ -24,11 +24,11 @@ File: ot1ptm.fd 2001/06/04 font definitions for OT1/ptm.
)
-- Using 8.5in x 11in (letter) paper.
-- Using PDF output.
\@IEEEnormalsizeunitybaselineskip=\dimen141
\@IEEEnormalsizeunitybaselineskip=\dimen143
-- This is a 10 point document.
\CLASSINFOnormalsizebaselineskip=\dimen142
\CLASSINFOnormalsizeunitybaselineskip=\dimen143
\IEEEnormaljot=\dimen144
\CLASSINFOnormalsizebaselineskip=\dimen144
\CLASSINFOnormalsizeunitybaselineskip=\dimen145
\IEEEnormaljot=\dimen146
LaTeX Font Info: Font shape `OT1/ptm/bx/n' in size <5> not available
(Font) Font shape `OT1/ptm/b/n' tried instead on input line 1090.
LaTeX Font Info: Font shape `OT1/ptm/bx/it' in size <5> not available
@ -79,52 +79,52 @@ LaTeX Font Info: Font shape `OT1/ptm/bx/n' in size <24> not available
LaTeX Font Info: Font shape `OT1/ptm/bx/it' in size <24> not available
(Font) Font shape `OT1/ptm/b/it' tried instead on input line 1090.
\IEEEquantizedlength=\dimen145
\IEEEquantizedlengthdiff=\dimen146
\IEEEquantizedtextheightdiff=\dimen147
\IEEEilabelindentA=\dimen148
\IEEEilabelindentB=\dimen149
\IEEEilabelindent=\dimen150
\IEEEelabelindent=\dimen151
\IEEEdlabelindent=\dimen152
\IEEElabelindent=\dimen153
\IEEEiednormlabelsep=\dimen154
\IEEEiedmathlabelsep=\dimen155
\IEEEiedtopsep=\skip47
\IEEEquantizedlength=\dimen147
\IEEEquantizedlengthdiff=\dimen148
\IEEEquantizedtextheightdiff=\dimen149
\IEEEilabelindentA=\dimen150
\IEEEilabelindentB=\dimen151
\IEEEilabelindent=\dimen152
\IEEEelabelindent=\dimen153
\IEEEdlabelindent=\dimen154
\IEEElabelindent=\dimen155
\IEEEiednormlabelsep=\dimen156
\IEEEiedmathlabelsep=\dimen157
\IEEEiedtopsep=\skip48
\c@section=\count188
\c@subsection=\count189
\c@subsubsection=\count190
\c@paragraph=\count191
\c@IEEEsubequation=\count192
\abovecaptionskip=\skip48
\belowcaptionskip=\skip49
\abovecaptionskip=\skip49
\belowcaptionskip=\skip50
\c@figure=\count193
\c@table=\count194
\@IEEEeqnnumcols=\count195
\@IEEEeqncolcnt=\count196
\@IEEEsubeqnnumrollback=\count197
\@IEEEquantizeheightA=\dimen156
\@IEEEquantizeheightB=\dimen157
\@IEEEquantizeheightC=\dimen158
\@IEEEquantizeprevdepth=\dimen159
\@IEEEquantizeheightA=\dimen158
\@IEEEquantizeheightB=\dimen159
\@IEEEquantizeheightC=\dimen160
\@IEEEquantizeprevdepth=\dimen161
\@IEEEquantizemultiple=\count198
\@IEEEquantizeboxA=\box50
\@IEEEtmpitemindent=\dimen160
\IEEEPARstartletwidth=\dimen161
\@IEEEquantizeboxA=\box51
\@IEEEtmpitemindent=\dimen162
\IEEEPARstartletwidth=\dimen163
\c@IEEEbiography=\count199
\@IEEEtranrubishbin=\box51
\@IEEEtranrubishbin=\box52
) (/usr/share/texmf-dist/tex/latex/setspace/setspace.sty
Package: setspace 2011/12/19 v6.7a set line spacing
Package: setspace 2022/12/04 v6.7b set line spacing
)
(/usr/share/texmf-dist/tex/latex/graphics/graphicx.sty
Package: graphicx 2021/09/16 v1.2d Enhanced LaTeX Graphics (DPC,SPQR)
(/usr/share/texmf-dist/tex/latex/graphics/keyval.sty
Package: keyval 2014/10/28 v1.15 key=value parser (DPC)
Package: keyval 2022/05/29 v1.15 key=value parser (DPC)
\KV@toks@=\toks17
)
(/usr/share/texmf-dist/tex/latex/graphics/graphics.sty
Package: graphics 2021/03/04 v1.4d Standard LaTeX Graphics (DPC,SPQR)
Package: graphics 2022/03/10 v1.4e Standard LaTeX Graphics (DPC,SPQR)
(/usr/share/texmf-dist/tex/latex/graphics/trig.sty
Package: trig 2021/08/11 v1.11 sin cos tan (DPC)
@ -135,18 +135,18 @@ File: graphics.cfg 2016/06/04 v1.11 sample graphics configuration
Package graphics Info: Driver file: pdftex.def on input line 107.
(/usr/share/texmf-dist/tex/latex/graphics-def/pdftex.def
File: pdftex.def 2020/10/05 v1.2a Graphics/color driver for pdftex
File: pdftex.def 2022/09/22 v1.2b Graphics/color driver for pdftex
))
\Gin@req@height=\dimen162
\Gin@req@width=\dimen163
\Gin@req@height=\dimen164
\Gin@req@width=\dimen165
)
(/usr/share/texmf-dist/tex/latex/float/float.sty
Package: float 2001/11/08 v1.3d Float enhancements (AL)
\c@float@type=\count266
\float@exts=\toks18
\float@box=\box52
\float@box=\box53
\@float@everytoks=\toks19
\@floatcapt=\box53
\@floatcapt=\box54
)
\@float@every@table=\toks20
@ -157,19 +157,19 @@ Package: ifpdf 2019/10/25 v3.4 ifpdf legacy package. Use iftex instead.
Package: iftex 2022/02/03 v1.0f TeX engine tests
))
(/usr/share/texmf-dist/tex/generic/babel/babel.sty
Package: babel 2022/02/26 3.73 The Babel package
Package: babel 2023/02/13 3.86 The Babel package
\babel@savecnt=\count267
\U@D=\dimen164
\U@D=\dimen166
\l@unhyphenated=\language87
(/usr/share/texmf-dist/tex/generic/babel/txtbabel.def)
\bbl@readstream=\read2
\bbl@dirlevel=\count268
Package babel Info: You haven't specified a language. I'll use 'nil'
(babel) as the main language. Reported on input line 4305.
Package babel Info: You haven't specified a language as a class or package
(babel) option. I'll load 'nil'. Reported on input line 4422.
(/usr/share/texmf-dist/tex/generic/babel/nil.ldf
Language: nil 2022/02/26 3.73 Nil language
Language: nil 2023/02/13 3.86 Nil language
\l@nil=\language88
))
(/usr/share/texmf-dist/tex/latex/doublestroke/dsfont.sty
@ -186,41 +186,41 @@ Package: indentfirst 1995/11/23 v1.03 Indent first paragraph (DPC)
(/usr/share/texmf-dist/tex/latex/tocloft/tocloft.sty
Package: tocloft 2017/08/31 v2.3i parameterised ToC, etc., typesetting
Package tocloft Info: The document has section divisions on input line 51.
\cftparskip=\skip50
\cftbeforetoctitleskip=\skip51
\cftaftertoctitleskip=\skip52
\cftbeforesecskip=\skip53
\cftsecindent=\skip54
\cftsecnumwidth=\skip55
\cftbeforesubsecskip=\skip56
\cftsubsecindent=\skip57
\cftsubsecnumwidth=\skip58
\cftbeforesubsubsecskip=\skip59
\cftsubsubsecindent=\skip60
\cftsubsubsecnumwidth=\skip61
\cftbeforeparaskip=\skip62
\cftparaindent=\skip63
\cftparanumwidth=\skip64
\cftbeforesubparaskip=\skip65
\cftsubparaindent=\skip66
\cftsubparanumwidth=\skip67
\cftbeforeloftitleskip=\skip68
\cftafterloftitleskip=\skip69
\cftbeforefigskip=\skip70
\cftfigindent=\skip71
\cftfignumwidth=\skip72
\cftparskip=\skip51
\cftbeforetoctitleskip=\skip52
\cftaftertoctitleskip=\skip53
\cftbeforesecskip=\skip54
\cftsecindent=\skip55
\cftsecnumwidth=\skip56
\cftbeforesubsecskip=\skip57
\cftsubsecindent=\skip58
\cftsubsecnumwidth=\skip59
\cftbeforesubsubsecskip=\skip60
\cftsubsubsecindent=\skip61
\cftsubsubsecnumwidth=\skip62
\cftbeforeparaskip=\skip63
\cftparaindent=\skip64
\cftparanumwidth=\skip65
\cftbeforesubparaskip=\skip66
\cftsubparaindent=\skip67
\cftsubparanumwidth=\skip68
\cftbeforeloftitleskip=\skip69
\cftafterloftitleskip=\skip70
\cftbeforefigskip=\skip71
\cftfigindent=\skip72
\cftfignumwidth=\skip73
\c@lofdepth=\count269
\c@lotdepth=\count270
\cftbeforelottitleskip=\skip73
\cftafterlottitleskip=\skip74
\cftbeforetabskip=\skip75
\cfttabindent=\skip76
\cfttabnumwidth=\skip77
\cftbeforelottitleskip=\skip74
\cftafterlottitleskip=\skip75
\cftbeforetabskip=\skip76
\cfttabindent=\skip77
\cfttabnumwidth=\skip78
)
(/usr/share/texmf-dist/tex/latex/l3backend/l3backend-pdftex.def
File: l3backend-pdftex.def 2022-04-14 L3 backend support: PDF output (pdfTeX)
File: l3backend-pdftex.def 2023-01-16 L3 backend support: PDF output (pdfTeX)
\l__color_backend_stack_int=\count271
\l__pdf_internal_box=\box54
\l__pdf_internal_box=\box55
)
(./Schrick-Noah_CG-Network_Theory.aux)
\openout1 = `Schrick-Noah_CG-Network_Theory.aux'.
@ -244,13 +244,13 @@ LaTeX Font Info: ... okay on input line 23.
(/usr/share/texmf-dist/tex/context/base/mkii/supp-pdf.mkii
[Loading MPS to PDF converter (version 2006.09.02).]
\scratchcounter=\count272
\scratchdimen=\dimen165
\scratchbox=\box55
\scratchdimen=\dimen167
\scratchbox=\box56
\nofMPsegments=\count273
\nofMParguments=\count274
\everyMPshowfont=\toks23
\MPscratchCnt=\count275
\MPscratchDim=\dimen166
\MPscratchDim=\dimen168
\MPnumerator=\count276
\makeMPintoPDFobject=\count277
\everyMPtoPDFconversion=\toks24
@ -267,13 +267,13 @@ Package: grfext 2019/12/03 v1.3 Manage graphics extensions (HO)
Package: kvdefinekeys 2019-12-19 v1.6 Define keys (HO)
))
(/usr/share/texmf-dist/tex/latex/kvoptions/kvoptions.sty
Package: kvoptions 2020-10-07 v3.14 Key value format for package options (HO)
Package: kvoptions 2022-06-15 v3.15 Key value format for package options (HO)
(/usr/share/texmf-dist/tex/generic/ltxcmds/ltxcmds.sty
Package: ltxcmds 2020-05-10 v1.25 LaTeX kernel commands for general use (HO)
)
(/usr/share/texmf-dist/tex/generic/kvsetkeys/kvsetkeys.sty
Package: kvsetkeys 2019/12/15 v1.18 Key value parser (HO)
(/usr/share/texmf-dist/tex/latex/kvsetkeys/kvsetkeys.sty
Package: kvsetkeys 2022-10-05 v1.19 Key value parser (HO)
))
(/usr/share/texmf-dist/tex/generic/pdftexcmds/pdftexcmds.sty
Package: pdftexcmds 2020-06-27 v0.33 Utility functions of pdfTeX for LuaTeX (HO
@ -293,111 +293,112 @@ G,.JBIG2,.JB2,.eps]
File: epstopdf-sys.cfg 2010/07/13 v1.3 Configuration of (r)epstopdf for TeX Liv
e
))
Underfull \hbox (badness 2922) in paragraph at lines 51--54
Underfull \hbox (badness 2922) in paragraph at lines 61--64
[]\OT1/ptm/b/it/9 Abstract\OT1/ptm/b/n/9 ---Compliance graphs are generated gra
phs (or
[]
Underfull \hbox (badness 1371) in paragraph at lines 51--54
Underfull \hbox (badness 1371) in paragraph at lines 61--64
\OT1/ptm/b/n/9 can be used to identify possible correction or mitigation
[]
Underfull \hbox (badness 10000) in paragraph at lines 56--58
Underfull \hbox (badness 10000) in paragraph at lines 66--68
[]\OT1/ptm/b/it/9 Index Terms\OT1/ptm/b/n/9 ---Attack Graph; Compliance Graph;
[]
Underfull \hbox (badness 3128) in paragraph at lines 64--65
Underfull \hbox (badness 3128) in paragraph at lines 74--75
\OT1/ptm/m/n/10 compliance graphs is focused less on certain security
[]
Underfull \hbox (badness 1365) in paragraph at lines 69--70
Underfull \hbox (badness 1365) in paragraph at lines 79--80
\OT1/ptm/m/n/10 involved compared to their undirected counterparts. The
[]
[1{/var/lib/texmf/fonts/map/pdftex/updmap/pdftex.map}
[1{/var/lib/texmf/fonts/map/pdftex/updmap/pdftex.map}{/usr/share/texmf-dist/fon
ts/enc/dvips/base/8r.enc}
]
Underfull \hbox (badness 1688) in paragraph at lines 74--75
Underfull \hbox (badness 1688) in paragraph at lines 84--85
\OT1/ptm/m/n/10 work examining directed, undirected, and mixed graphs
[]
Underfull \hbox (badness 2698) in paragraph at lines 77--78
Underfull \hbox (badness 2698) in paragraph at lines 87--88
[]\OT1/ptm/m/n/10 The work conducted in this approach utilized three
[]
LaTeX Warning: No positions in optional float specifier.
Default added (so using `tbp') on input line 79.
Default added (so using `tbp') on input line 89.
LaTeX Font Info: External font `cmex10' loaded for size
(Font) <7> on input line 82.
(Font) <7> on input line 92.
LaTeX Font Info: External font `cmex10' loaded for size
(Font) <5> on input line 82.
(Font) <5> on input line 92.
Underfull \hbox (badness 1590) in paragraph at lines 95--96
Underfull \hbox (badness 1590) in paragraph at lines 104--105
\OT1/ptm/m/n/10 implemented in order to determine node importance in
[]
[2] [3]
LaTeX Font Info: Trying to load font information for U+dsrom on input line 1
45.
54.
(/usr/share/texmf-dist/tex/latex/doublestroke/Udsrom.fd
File: Udsrom.fd 1995/08/01 v0.1 Double stroke roman font definitions
)
<./images/TC.png, id=23, 378.41376pt x 522.95375pt>
File: ./images/TC.png Graphic file (type png)
<use ./images/TC.png>
Package pdftex.def Info: ./images/TC.png used on input line 159.
Package pdftex.def Info: ./images/TC.png used on input line 168.
(pdftex.def) Requested size: 227.05pt x 313.77466pt.
<./images/dom_net.png, id=25, 319.1925pt x 432.61626pt>
File: ./images/dom_net.png Graphic file (type png)
<use ./images/dom_net.png>
Package pdftex.def Info: ./images/dom_net.png used on input line 173.
Package pdftex.def Info: ./images/dom_net.png used on input line 182.
(pdftex.def) Requested size: 191.51697pt x 259.57176pt.
<./images/dom_tree.png, id=26, 352.31625pt x 312.16624pt>
File: ./images/dom_tree.png Graphic file (type png)
<use ./images/dom_tree.png>
Package pdftex.def Info: ./images/dom_tree.png used on input line 180.
Package pdftex.def Info: ./images/dom_tree.png used on input line 189.
(pdftex.def) Requested size: 211.39137pt x 187.3012pt.
[4 <./images/TC.png>]
LaTeX Warning: No positions in optional float specifier.
Default added (so using `tbp') on input line 193.
Default added (so using `tbp') on input line 201.
LaTeX Warning: No positions in optional float specifier.
Default added (so using `tbp') on input line 226.
Default added (so using `tbp') on input line 234.
LaTeX Warning: No positions in optional float specifier.
Default added (so using `tbp') on input line 259.
Default added (so using `tbp') on input line 267.
LaTeX Warning: No positions in optional float specifier.
Default added (so using `tbp') on input line 292.
Default added (so using `tbp') on input line 300.
LaTeX Warning: No positions in optional float specifier.
Default added (so using `tbp') on input line 325.
Default added (so using `tbp') on input line 333.
Underfull \hbox (badness 10000) in paragraph at lines 359--360
Underfull \hbox (badness 10000) in paragraph at lines 367--368
[]\OT1/ptm/m/n/10 When viewing the results of the car networks,
[]
Underfull \hbox (badness 1997) in paragraph at lines 359--360
Underfull \hbox (badness 1997) in paragraph at lines 367--368
\OT1/ptm/m/n/10 based on additional metrics, such as severity, cost, or
[]
[5 <./images/dom_net.png> <./images/dom_tree.png>]
Underfull \hbox (badness 3428) in paragraph at lines 361--362
Underfull \hbox (badness 3428) in paragraph at lines 369--370
\OT1/ptm/m/n/10 their original compliance graph rankings. As expected
[]
@ -405,12 +406,12 @@ Underfull \hbox (badness 3428) in paragraph at lines 361--362
Underfull \vbox (badness 1147) has occurred while \output is active []
Underfull \hbox (badness 1789) in paragraph at lines 363--364
Underfull \hbox (badness 1789) in paragraph at lines 371--372
[]\OT1/ptm/m/n/10 For the dominant tree representation, it was initially
[]
Underfull \hbox (badness 3009) in paragraph at lines 363--364
Underfull \hbox (badness 3009) in paragraph at lines 371--372
\OT1/ptm/m/n/10 hypothesized that nodes ranked highly in the original
[]
@ -418,12 +419,12 @@ Underfull \hbox (badness 3009) in paragraph at lines 363--364
Underfull \vbox (badness 1147) has occurred while \output is active []
[6]
Underfull \hbox (badness 1688) in paragraph at lines 367--368
Underfull \hbox (badness 1688) in paragraph at lines 375--376
\OT1/ptm/m/n/10 correction measures. In addition, transitive closures and
[]
Underfull \hbox (badness 2913) in paragraph at lines 370--371
Underfull \hbox (badness 2913) in paragraph at lines 378--379
\OT1/ptm/m/n/10 importance rankings, it would be useful to artificially
[]
@ -488,25 +489,24 @@ Before submitting the final camera ready copy, remember to:
] (./Schrick-Noah_CG-Network_Theory.aux) )
Here is how much of TeX's memory you used:
4240 strings out of 478238
76909 string characters out of 5850456
447946 words of memory out of 5000000
22422 multiletter control sequences out of 15000+600000
503172 words of font info for 89 fonts, out of 8000000 for 9000
4270 strings out of 476025
77329 string characters out of 5796533
1921388 words of memory out of 5000000
24665 multiletter control sequences out of 15000+600000
546200 words of font info for 93 fonts, out of 8000000 for 9000
1141 hyphenation exceptions out of 8191
60i,9n,67p,1800b,261s stack positions out of 5000i,500n,10000p,200000b,80000s
{/usr/share/texmf-dist/fonts/enc/dvip
s/base/8r.enc}</usr/share/texmf-dist/fonts/type1/public/amsfonts/cm/cmex10.pfb>
</usr/share/texmf-dist/fonts/type1/public/amsfonts/cm/cmmi10.pfb></usr/share/te
xmf-dist/fonts/type1/public/amsfonts/cm/cmmi7.pfb></usr/share/texmf-dist/fonts/
type1/public/amsfonts/cm/cmr10.pfb></usr/share/texmf-dist/fonts/type1/public/am
sfonts/cm/cmr7.pfb></usr/share/texmf-dist/fonts/type1/public/amsfonts/cm/cmsy10
.pfb></usr/share/texmf-dist/fonts/type1/public/amsfonts/cm/cmsy7.pfb></usr/shar
e/texmf-dist/fonts/type1/public/doublestroke/dsrom10.pfb></usr/share/texmf-dist
/fonts/type1/urw/times/utmb8a.pfb></usr/share/texmf-dist/fonts/type1/urw/times/
utmbi8a.pfb></usr/share/texmf-dist/fonts/type1/urw/times/utmr8a.pfb></usr/share
/texmf-dist/fonts/type1/urw/times/utmri8a.pfb>
Output written on Schrick-Noah_CG-Network_Theory.pdf (8 pages, 198849 bytes).
62i,9n,67p,1800b,261s stack positions out of 5000i,500n,10000p,200000b,80000s
</usr/share/texmf-dist/fonts/type1/pu
blic/amsfonts/cm/cmex10.pfb></usr/share/texmf-dist/fonts/type1/public/amsfonts/
cm/cmmi10.pfb></usr/share/texmf-dist/fonts/type1/public/amsfonts/cm/cmmi7.pfb><
/usr/share/texmf-dist/fonts/type1/public/amsfonts/cm/cmr10.pfb></usr/share/texm
f-dist/fonts/type1/public/amsfonts/cm/cmr7.pfb></usr/share/texmf-dist/fonts/typ
e1/public/amsfonts/cm/cmsy10.pfb></usr/share/texmf-dist/fonts/type1/public/amsf
onts/cm/cmsy7.pfb></usr/share/texmf-dist/fonts/type1/public/doublestroke/dsrom1
0.pfb></usr/share/texmf-dist/fonts/type1/urw/times/utmb8a.pfb></usr/share/texmf
-dist/fonts/type1/urw/times/utmbi8a.pfb></usr/share/texmf-dist/fonts/type1/urw/
times/utmr8a.pfb></usr/share/texmf-dist/fonts/type1/urw/times/utmri8a.pfb>
Output written on Schrick-Noah_CG-Network_Theory.pdf (8 pages, 201307 bytes).
PDF statistics:
99 PDF objects out of 1000 (max. 8388607)
58 compressed objects within 1 object stream

Binary file not shown.

View File

@ -44,6 +44,16 @@
Tulsa, USA \\
peter-hawrylak@utulsa.edu
}
\and
\IEEEauthorblockN{Brett A. McKinney}
\IEEEauthorblockA{
\textit{Tandy School of Computer Science} \\
\textit{The University of Tulsa}\\
Tulsa, USA \\
brett-mckinney@utulsa.edu
}
}
\maketitle
@ -61,9 +71,9 @@ Attack Graph; Compliance Graph; Cybersecurity; Compliance and Regulation; Networ
\subsection{Compliance Graphs}
Compliance graphs are an alternate form of attack graphs, utilized specifically for examining compliance and regulation statuses of systems. Like attack graphs, compliance graphs can be used to determine all ways that systems may fall out of compliance or violate regulations, or highlight the ways in which violations are already present. These graphs are notably useful for cyber-physical systems due to the increased need for compliance. As the authors of \cite{j_hale_compliance_nodate}, \cite{baloyi_guidelines_2019}, and \cite{allman_complying_2006} discuss, cyber-physical systems have seen greater usage, especially in areas such as critical infrastructure and Internet of Things.
The semantics of compliance graphs are similar to that of attack graphs, but with a few differences regarding the information at each state. While security and compliance statuses are related, the information that is analyzed in compliance graphs is focused less on certain security properties, but is expanded to also examine administrative policies and properties of systems. Since compliance and regulation is broad and can vary by industry and application, the information to analyze can range from safety regulations, maintenance compliance, or any other regulatory compliance, including internal company standards. However, the graph structure of compliance graphs is identical to that of attack graphs, where edges represent a modification to the systems, and nodes represent all current information in the system.
The semantics of compliance graphs are similar to that of attack graphs, but with a few differences regarding the information at each state. While security and compliance statuses are related, the information that is analyzed in compliance graphs is focused less on certain security properties, but is expanded to also examine administrative policies and properties of systems. Since compliance and regulation is broad and can vary by industry and application, the information to analyze can range from safety regulations, maintenance compliance, or any other regulatory compliance, including internal company standards. However, the graph structure of compliance graphs is identical to that of attack graphs, where edges represent a modification to the system, and nodes represent all current information in the system.
Compliance graphs begin with a root node that contains all the current information of the system or set of systems. From this initial root state, all assets in the system are examined to see if any single modification can be made, where a modification can include a change in system policy or security settings. If a modification can be made, an edge is drawn from the previous state to a new state that includes all of the previous state's information, but now reflects the change in the system. This edge is labeled to reflect which change was made to the system. This process is exhaustively repeated, where all system properties are examined, all modification options are fully enumerated, all permutations are examined, and all changes to a system are encoded into their own independent states, where these states are then individually analyzed through the process.
Compliance graphs begin with a root node that contains all the current information of the system or set of systems. From this initial root state, all assets in the system are examined to see if any single modification can be made, where a modification can include a change in system policy, security settings, or standing in relation to a compliance or regulatory mandate. If a modification can be made, an edge is drawn from the previous state to a new state that includes all of the previous state's information, but now reflects the change in the system. This edge is labeled to reflect which change was made to the system. This process is exhaustively repeated, where all system properties are examined, all modification options are fully enumerated, all permutations are examined, and all changes to a system are encoded into their own independent states, where these states are then individually analyzed through the process.
\subsection{Difficulties of Attack and Compliance Graph Analysis}
Compliance graphs, like attack graphs, are directed acyclic graphs, and analysis of directed graphs is notably more involved compared to their undirected counterparts. The primary contributor to the increased difficulty is due to the asymmetric adjacency matrix present in directed graphs. With undirected graphs, simplifications can be made in the analysis process both computationally and conceptually. Since the ``in" degrees are equal to the ``out" degrees, less work is required both in terms of parsing the adjacency matrix, but also in terms of determining importance of nodes. The author of \cite{newman2010networks} discusses that common analysis techniques such as eigenvector centrality is often unapplicable to directed acyclic graphs. As the author of \cite{Mieghem2018DirectedGA} discusses, the difficulty of directed graphs also extends to the graph Laplacian, where the definition for asymmetric adjacency matrices is not uniquely defined, and is based on either row or column sums computing to zero, but both cannot. The author of \cite{Mieghem2018DirectedGA} continues to discuss that directed graphs lead to complex eigenvalues, and can lead to adjacency matrices that are unable to be diagonalized. These challenges require different approaches for typical clustering or centrality measures.
@ -91,7 +101,6 @@ The work conducted in this approach utilized three compliance graphs, with their
\end{table}
\section{Centralities and their Contextualizations to Compliance Graphs} \label{sec:centralities}
\subsection{Introduction}
The author of \cite{PMID:30064421} provides a survey of centrality measures, and discusses how various centrality measures have been implemented in order to determine node importance in networks. By determining the importance of nodes, various conclusions can be drawn regarding the network. In the case of compliance graphs, conclusions can be drawn regarding the prioritization of patching or correction schemes. If one node directs to many other nodes, a mitigation enforcement may be considered imperative to prevent further opportunities for compliance violation. This work discusses five centrality measures across various structural changes, and contextualizes their applications to compliance graphs.
\subsection{Degree}
@ -187,7 +196,6 @@ Following the properties of dominance, a dominator tree can be derived. In a dom
Dominant trees do alter the structure of compliance graphs, and lead to leaf nodes and branches that do not exist in the original network. As a result, some nodes that have directed edges to other nodes may be moved to a position where the edge no longer points to the original nodes. However, in dominant trees, all node parents dominate their children. In this format, the information flow is guided predominantly by the upstream nodes, and all parents in the dominant tree exist as upstream nodes in the original compliance graph. While some downstream nodes may be altered, the importance of nodes can be reexamined in the dominant tree to see how importance differs when information flow is refined. To this end, dominant trees were identified for all networks described in Section \ref{sec:networks}, and these dominant trees were then analyzed through the five centrality methods discussed in Section \ref{sec:centralities}. Results and a discussion of the results can be seen in Section \ref{sec:results}.
\section{Results and Result Analysis} \label{sec:results}
\subsection{Results}
In this section, only results for the car network are displayed for brevity. These results can be seen in Tables \ref{table:car-deg} through \ref{table:car-betweenness}. The results for the HIPAA and PCI DSS networks can be found in the Supplementary Material included with this work.
\begin{table}[]
@ -367,7 +375,9 @@ For the dominant tree representation, it was initially hypothesized that nodes r
Each centrality measure implemented in this work provides various information that is useful for identifying correction schemes based on a network science approach. The results from the centrality methods differ, and each network can determine which rankings should be preferred based on prior knowledge of the network and the overhead of implementing correction measures. In addition, transitive closures and dominant trees were derived from the original compliance graphs, and unique rankings were identified. Transitive closure rankings are useful for determining which nodes are most important when an adversarial action can be considered to have infinite time and resources to perform changes to the original system. Dominant tree rankings are useful for determining which nodes are most important from an information flow perspective, where adversarial actions must pass though a series of nodes to reach any other node in the network. By applying correction schemes to the bottlenecks of the network, it may be possible to eliminate branches of the dominant tree entirely, leading to a removal of nodes in the original compliance graph.
\subsection{Future Work}
Based on the results of this work, there is considerable opportunity to continue investigation of centrality methods for compliance graphs. With three compliance graphs generated for three different applications, along with various node importance rankings, it would be useful to artificially implement correction schemes based on the rankings to see their effects on the compliance graph. Likewise, using a user-defined data matrix in centrality methods like PageRank, further research could examine how node importance varies based on user-defined metrics. Edge weights could also be assigned to the original compliance graphs to represent the probability that a given change in the network could occur. Edge weights would be reflected in the adjacency matrices of the graphs, and centrality methods could be reexamined to determine node importance when state transition probabilities are given. Transitive closures and dominant trees derived from the compliance graphs present a new approach for examining compliance graphs. Further research can be conducted to determine the effects of correction schemes when employed on nodes ranked highly in their respective centrality measures in these formats.
Based on the results of this work, there is considerable opportunity to continue investigation of centrality methods for compliance graphs. With three compliance graphs generated for three different applications, along with various node importance rankings, it would be useful to artificially implement correction schemes based on the rankings to see their effects on the compliance graph. Extensions to the ranking and correction schemes could be made by creating a single source of importance ranking by collapsing or combining the vector of centrality method rankings. Since each centrality method highlights unique properties of the network, it may be useful to take each into consideration and determine a final, overall importance ranking. This approach has been seen in works such as those presented by the authors of \cite{LI2018512} and \cite{MO2019121538}.
Further research could examine how node importance varies based on user-defined metrics by using a user-defined data matrix in centrality methods like PageRank. Edge weights could also be assigned to the original compliance graphs to represent the probability that a given change in the network could occur. Edge weights would be reflected in the adjacency matrices of the graphs, and centrality methods could be reexamined to determine node importance when state transition probabilities are given. Transitive closures and dominant trees derived from the compliance graphs present a new approach for examining compliance graphs. Further research can be conducted to determine the effects of correction schemes when employed on nodes ranked highly in their respective centrality measures in these formats.
\addcontentsline{toc}{section}{Bibliography}
\bibliography{Bibliography}

View File

@ -1 +1,80 @@
<mxfile host="app.diagrams.net" modified="2023-01-16T19:52:42.590Z" agent="5.0 (X11; Linux x86_64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/108.0.0.0 Safari/537.36" version="20.6.0" etag="qS30Pw-kaVetwBS_ouPL" type="device"><diagram id="1nvUCSTcNLpL5nhYzBsq" name="Page-1">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</diagram></mxfile>
<mxfile host="app.diagrams.net" modified="2023-04-04T19:25:03.325Z" agent="Mozilla/5.0 (X11; Linux x86_64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/111.0.0.0 Safari/537.36" etag="1U0moFr0QON2btwoput9" version="21.1.1" type="device">
<diagram id="1nvUCSTcNLpL5nhYzBsq" name="Page-1">
<mxGraphModel dx="1914" dy="920" grid="1" gridSize="10" guides="1" tooltips="1" connect="1" arrows="1" fold="1" page="1" pageScale="1" pageWidth="850" pageHeight="1100" math="0" shadow="0">
<root>
<mxCell id="0" />
<mxCell id="1" parent="0" />
<mxCell id="wW4z0-S5Vl4nrt_qmwZ7-12" style="edgeStyle=orthogonalEdgeStyle;rounded=0;orthogonalLoop=1;jettySize=auto;html=1;entryX=0;entryY=0.5;entryDx=0;entryDy=0;fontSize=21;" parent="1" source="wW4z0-S5Vl4nrt_qmwZ7-1" target="wW4z0-S5Vl4nrt_qmwZ7-6" edge="1">
<mxGeometry relative="1" as="geometry" />
</mxCell>
<mxCell id="wW4z0-S5Vl4nrt_qmwZ7-1" value="&lt;font style=&quot;font-size: 21px;&quot;&gt;&lt;b&gt;2&lt;/b&gt;&lt;/font&gt;" style="ellipse;whiteSpace=wrap;html=1;aspect=fixed;fillColor=#f8cecc;strokeColor=#b85450;" parent="1" vertex="1">
<mxGeometry x="210" y="150" width="80" height="80" as="geometry" />
</mxCell>
<mxCell id="wW4z0-S5Vl4nrt_qmwZ7-11" style="edgeStyle=orthogonalEdgeStyle;rounded=0;orthogonalLoop=1;jettySize=auto;html=1;fontSize=21;" parent="1" source="wW4z0-S5Vl4nrt_qmwZ7-2" target="wW4z0-S5Vl4nrt_qmwZ7-4" edge="1">
<mxGeometry relative="1" as="geometry">
<Array as="points">
<mxPoint x="330" y="360" />
<mxPoint x="270" y="360" />
</Array>
</mxGeometry>
</mxCell>
<mxCell id="wW4z0-S5Vl4nrt_qmwZ7-2" value="&lt;font style=&quot;font-size: 21px;&quot;&gt;&lt;b&gt;3&lt;/b&gt;&lt;/font&gt;" style="ellipse;whiteSpace=wrap;html=1;aspect=fixed;" parent="1" vertex="1">
<mxGeometry x="290" y="270" width="80" height="80" as="geometry" />
</mxCell>
<mxCell id="wW4z0-S5Vl4nrt_qmwZ7-10" style="edgeStyle=orthogonalEdgeStyle;rounded=0;orthogonalLoop=1;jettySize=auto;html=1;fontSize=21;" parent="1" source="wW4z0-S5Vl4nrt_qmwZ7-3" target="wW4z0-S5Vl4nrt_qmwZ7-4" edge="1">
<mxGeometry relative="1" as="geometry">
<Array as="points">
<mxPoint x="170" y="360" />
<mxPoint x="230" y="360" />
</Array>
</mxGeometry>
</mxCell>
<mxCell id="wW4z0-S5Vl4nrt_qmwZ7-3" value="&lt;font style=&quot;font-size: 21px;&quot;&gt;&lt;b&gt;4&lt;/b&gt;&lt;/font&gt;" style="ellipse;whiteSpace=wrap;html=1;aspect=fixed;" parent="1" vertex="1">
<mxGeometry x="130" y="270" width="80" height="80" as="geometry" />
</mxCell>
<mxCell id="wW4z0-S5Vl4nrt_qmwZ7-13" style="edgeStyle=orthogonalEdgeStyle;rounded=0;orthogonalLoop=1;jettySize=auto;html=1;entryX=0;entryY=0.5;entryDx=0;entryDy=0;fontSize=21;" parent="1" source="wW4z0-S5Vl4nrt_qmwZ7-4" target="wW4z0-S5Vl4nrt_qmwZ7-1" edge="1">
<mxGeometry relative="1" as="geometry">
<Array as="points">
<mxPoint x="110" y="420" />
<mxPoint x="110" y="190" />
</Array>
</mxGeometry>
</mxCell>
<mxCell id="wW4z0-S5Vl4nrt_qmwZ7-4" value="&lt;font style=&quot;font-size: 21px;&quot;&gt;&lt;b&gt;5&lt;/b&gt;&lt;/font&gt;" style="ellipse;whiteSpace=wrap;html=1;aspect=fixed;" parent="1" vertex="1">
<mxGeometry x="210" y="380" width="80" height="80" as="geometry" />
</mxCell>
<mxCell id="wW4z0-S5Vl4nrt_qmwZ7-7" style="edgeStyle=orthogonalEdgeStyle;rounded=0;orthogonalLoop=1;jettySize=auto;html=1;fontSize=21;" parent="1" source="wW4z0-S5Vl4nrt_qmwZ7-5" target="wW4z0-S5Vl4nrt_qmwZ7-1" edge="1">
<mxGeometry relative="1" as="geometry" />
</mxCell>
<mxCell id="wW4z0-S5Vl4nrt_qmwZ7-5" value="&lt;font style=&quot;font-size: 21px;&quot;&gt;&lt;b&gt;1&lt;/b&gt;&lt;/font&gt;" style="ellipse;whiteSpace=wrap;html=1;aspect=fixed;" parent="1" vertex="1">
<mxGeometry x="210" y="30" width="80" height="80" as="geometry" />
</mxCell>
<mxCell id="wW4z0-S5Vl4nrt_qmwZ7-6" value="&lt;font style=&quot;font-size: 21px;&quot;&gt;&lt;b&gt;6&lt;/b&gt;&lt;/font&gt;" style="ellipse;whiteSpace=wrap;html=1;aspect=fixed;" parent="1" vertex="1">
<mxGeometry x="340" y="150" width="80" height="80" as="geometry" />
</mxCell>
<mxCell id="wW4z0-S5Vl4nrt_qmwZ7-8" style="edgeStyle=orthogonalEdgeStyle;rounded=0;orthogonalLoop=1;jettySize=auto;html=1;fontSize=21;exitX=0.5;exitY=1;exitDx=0;exitDy=0;entryX=0.5;entryY=0;entryDx=0;entryDy=0;" parent="1" source="wW4z0-S5Vl4nrt_qmwZ7-1" target="wW4z0-S5Vl4nrt_qmwZ7-3" edge="1">
<mxGeometry relative="1" as="geometry">
<mxPoint x="189.5" y="220" as="sourcePoint" />
<mxPoint x="189.5" y="260" as="targetPoint" />
<Array as="points">
<mxPoint x="240" y="230" />
<mxPoint x="240" y="240" />
<mxPoint x="170" y="240" />
</Array>
</mxGeometry>
</mxCell>
<mxCell id="wW4z0-S5Vl4nrt_qmwZ7-9" style="edgeStyle=orthogonalEdgeStyle;rounded=0;orthogonalLoop=1;jettySize=auto;html=1;fontSize=21;exitX=0.5;exitY=1;exitDx=0;exitDy=0;entryX=0.5;entryY=0;entryDx=0;entryDy=0;" parent="1" source="wW4z0-S5Vl4nrt_qmwZ7-1" target="wW4z0-S5Vl4nrt_qmwZ7-2" edge="1">
<mxGeometry relative="1" as="geometry">
<mxPoint x="260" y="240" as="sourcePoint" />
<mxPoint x="199.5" y="270" as="targetPoint" />
<Array as="points">
<mxPoint x="260" y="230" />
<mxPoint x="260" y="240" />
<mxPoint x="330" y="240" />
</Array>
</mxGeometry>
</mxCell>
</root>
</mxGraphModel>
</diagram>
</mxfile>

Binary file not shown.

Before

Width:  |  Height:  |  Size: 18 KiB

After

Width:  |  Height:  |  Size: 28 KiB

BIN
images/dom_net_unshaded.png Normal file

Binary file not shown.

After

Width:  |  Height:  |  Size: 18 KiB

View File

@ -1 +1 @@
<mxGraphModel><root><mxCell id="0"/><mxCell id="1" parent="0"/></root></mxGraphModel>
<mxfile host="app.diagrams.net" modified="2023-01-16T20:13:01.526Z" agent="5.0 (X11; Linux x86_64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/108.0.0.0 Safari/537.36" version="20.6.0" etag="XhGt1-lH-XMouvehQUZJ" type="device"><diagram id="rOhZFPfUMdOve3NpogW0" name="Page-1">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</diagram></mxfile>

Binary file not shown.

Before

Width:  |  Height:  |  Size: 14 KiB

After

Width:  |  Height:  |  Size: 22 KiB

Binary file not shown.

After

Width:  |  Height:  |  Size: 14 KiB