\relax \providecommand\babel@aux[2]{} \@nameuse{bbl@beforestart} \citation{j_hale_compliance_nodate} \citation{baloyi_guidelines_2019} \citation{allman_complying_2006} \citation{Jha2002TwoFA} \providecommand \oddpage@label [2]{} \babel@aux{nil}{} \@writefile{toc}{\contentsline {section}{\numberline {I}Introduction}{1}{}\protected@file@percent } \newlabel{sec:Intro}{{I}{1}{}{}{}} \@writefile{toc}{\contentsline {section}{\numberline {II}Related Works}{1}{}\protected@file@percent } \newlabel{sec:rel-works}{{II}{1}{}{}{}} \citation{Jha2002TwoFA} \citation{Jha2002TwoFA} \citation{10.1016/j.comcom.2006.06.01837} \citation{Islam2008AHA36} \citation{10.1109/IAS.2008.38} \citation{GCAI-2018:Analysis_of_Attack_Graph} \citation{ming_diss} \citation{10.1145/3491257} \citation{ming_diss} \citation{Guo2017HermitianAM} \citation{Mieghem2018DirectedGA} \citation{Brualdi2010SpectraOD} \citation{PMID:30064421} \@writefile{toc}{\contentsline {section}{\numberline {III}Example Networks}{2}{}\protected@file@percent } \newlabel{sec:example-networks}{{III}{2}{}{}{}} \@writefile{toc}{\contentsline {section}{\numberline {IV}Identifying Correction Priority Through Network Centralities}{2}{}\protected@file@percent } \newlabel{sec:corr-priorities}{{IV}{2}{}{}{}} \@writefile{toc}{\contentsline {subsection}{\numberline {\mbox {IV-A}}Introduction to Network Centralities}{2}{}\protected@file@percent } \newlabel{sec:net-cents}{{\mbox {IV-A}}{2}{}{}{}} \citation{newman2010networks} \citation{Mieghem2018DirectedGA} \citation{Mieghem2018DirectedGA} \@writefile{lof}{\contentsline {figure}{\numberline {1}{\ignorespaces Example Subgraph of a Compliance Graph}}{3}{}\protected@file@percent } \newlabel{fig:topo-ex}{{1}{3}{}{}{}} \@writefile{lof}{\contentsline {figure}{\numberline {2}{\ignorespaces Obtaining a Correction Priority}}{3}{}\protected@file@percent } \newlabel{fig:obj3}{{2}{3}{}{}{}} \newlabel{sec:NC-dir-challenges}{{\mbox {IV-A}1}{3}{}{}{}} \@writefile{toc}{\contentsline {subsubsection}{\numberline {\mbox {IV-A}1}Network Centralities for Directed Graphs}{3}{}\protected@file@percent } \@writefile{lof}{\contentsline {figure}{\numberline {3}{\ignorespaces Undirected Graph and its Symmetric Adjacency Matrix}}{3}{}\protected@file@percent } \newlabel{fig:symm-adj}{{3}{3}{}{}{}} \citation{Graphviz} \citation{igraph} \citation{brandes} \@writefile{lof}{\contentsline {figure}{\numberline {4}{\ignorespaces Directed Graph and its Asymmetric Adjacency Matrix}}{4}{}\protected@file@percent } \newlabel{fig:asymm-adj}{{4}{4}{}{}{}} \@writefile{toc}{\contentsline {subsection}{\numberline {\mbox {IV-B}}Degree}{4}{}\protected@file@percent } \newlabel{sec:degree}{{\mbox {IV-B}}{4}{}{}{}} \@writefile{toc}{\contentsline {subsection}{\numberline {\mbox {IV-C}}Betweenness}{4}{}\protected@file@percent } \newlabel{sec:between}{{\mbox {IV-C}}{4}{}{}{}} \newlabel{eq:between}{{1}{4}{}{}{}} \citation{Katz} \citation{ModKatz} \citation{laug} \citation{laug} \citation{stankovic2023fourier} \citation{seifert2023causal} \citation{Katz} \citation{MACEDO2016999} \citation{williams2023new} \citation{alman2020refined} \citation{PageRank} \citation{Adapted_PageRank} \@writefile{toc}{\contentsline {subsection}{\numberline {\mbox {IV-D}}Katz}{5}{}\protected@file@percent } \newlabel{sec:katz}{{\mbox {IV-D}}{5}{}{}{}} \newlabel{eq:Katz}{{2}{5}{}{}{}} \newlabel{eq:mod_katz}{{3}{5}{}{}{}} \@writefile{toc}{\contentsline {subsection}{\numberline {\mbox {IV-E}}Adapted PageRank}{5}{}\protected@file@percent } \newlabel{sec:pr}{{\mbox {IV-E}}{5}{}{}{}} \citation{10.1371/journal.pone.0053095} \citation{10.1145/3288599.3295597} \citation{9680376} \citation{NetworkX} \citation{reticulate} \citation{10.1371/journal.pone.0053095} \citation{brandes} \newlabel{eq:PR}{{4}{6}{}{}{}} \newlabel{eq:APC}{{5}{6}{}{}{}} \@writefile{toc}{\contentsline {subsection}{\numberline {\mbox {IV-F}}Percolation Centrality}{6}{}\protected@file@percent } \newlabel{sec:perc}{{\mbox {IV-F}}{6}{}{}{}} \newlabel{eq:PercC}{{6}{6}{}{}{}} \citation{AUDRITO2021102584} \citation{LI2018512} \citation{MO2019121538} \citation{bordacent} \citation{6023c4f8-ecc1-3dbe-9f88-265b318523d2} \citation{doi:10.1137/0135023} \newlabel{alg:prePC}{{1}{7}{}{}{}} \@writefile{loa}{\contentsline {algocf}{\numberline {1}{\ignorespaces Expanded, Unoptimized Approach for Pre-Processing the Network for Percolation Centrality}}{7}{}\protected@file@percent } \@writefile{toc}{\contentsline {subsection}{\numberline {\mbox {IV-G}}Centrality Aggregation}{7}{}\protected@file@percent } \newlabel{sec:cent-aggr}{{\mbox {IV-G}}{7}{}{}{}} \newlabel{eq:CentAgg}{{7}{7}{}{}{}} \newlabel{alg:redistcent}{{2}{8}{}{}{}} \@writefile{loa}{\contentsline {algocf}{\numberline {2}{\ignorespaces Redistribute Aggregated Centrality Scores}}{8}{}\protected@file@percent } \@writefile{toc}{\contentsline {subsection}{\numberline {\mbox {IV-H}}Centrality Results and Analysis}{8}{}\protected@file@percent } \newlabel{sec:cent-res}{{\mbox {IV-H}}{8}{}{}{}} \@writefile{lot}{\contentsline {table}{\numberline {I}{\ignorespaces Properties of the Aggregated Centrality Scores for the Three Example Networks}}{8}{}\protected@file@percent } \newlabel{tab:aggCentScores}{{I}{8}{}{}{}} \@writefile{lof}{\contentsline {figure}{\numberline {5}{\ignorespaces Aggregated Centrality Score Distribution for the Automobile Maintenance Network}}{8}{}\protected@file@percent } \newlabel{fig:carAggCentDist}{{5}{8}{}{}{}} \@writefile{lof}{\contentsline {figure}{\numberline {6}{\ignorespaces Cullen and Frey Plot for the Nonzero Elements of the Aggregated Centralities for the Automobile Maintenance Network}}{8}{}\protected@file@percent } \newlabel{fig:carAggCentDistCF}{{6}{8}{}{}{}} \@writefile{lof}{\contentsline {figure}{\numberline {7}{\ignorespaces Aggregated Centrality Score Distribution for the HIPAA Network}}{9}{}\protected@file@percent } \newlabel{fig:hipaaAggCentDist}{{7}{9}{}{}{}} \@writefile{lof}{\contentsline {figure}{\numberline {8}{\ignorespaces Cullen and Frey Plot for the Nonzero Elements of the Aggregated Centralities for the HIPAA Network}}{9}{}\protected@file@percent } \newlabel{fig:hipaaAggCentDistCF}{{8}{9}{}{}{}} \@writefile{lof}{\contentsline {figure}{\numberline {9}{\ignorespaces Aggregated Centrality Score Distribution for the OSHA 1910H Network}}{9}{}\protected@file@percent } \newlabel{fig:oshaAggCentDist}{{9}{9}{}{}{}} \@writefile{lof}{\contentsline {figure}{\numberline {10}{\ignorespaces Cullen and Frey Plot for the Nonzero Elements of the Aggregated Centralities for the OSHA 1910H Network}}{9}{}\protected@file@percent } \newlabel{fig:oshaAggCentDistCF}{{10}{9}{}{}{}} \@writefile{toc}{\contentsline {subsection}{\numberline {\mbox {IV-I}}Validation}{9}{}\protected@file@percent } \newlabel{sec:cent-valid}{{\mbox {IV-I}}{9}{}{}{}} \citation{stankovic2023fourier} \citation{li_combining_2019} \citation{zeng_cyber_2017} \citation{dominance} \@writefile{toc}{\contentsline {section}{\numberline {V}Graph Transformations}{10}{}\protected@file@percent } \newlabel{sec:graph-xform}{{V}{10}{}{}{}} \@writefile{toc}{\contentsline {subsection}{\numberline {\mbox {V-A}}Transitive Closure}{10}{}\protected@file@percent } \newlabel{sec:TC}{{\mbox {V-A}}{10}{}{}{}} \@writefile{lof}{\contentsline {figure}{\numberline {11}{\ignorespaces Illustration of an Example DAG and its Transitive Closure}}{10}{}\protected@file@percent } \newlabel{fig:TC}{{11}{10}{}{}{}} \@writefile{toc}{\contentsline {subsection}{\numberline {\mbox {V-B}}Dominant Tree}{10}{}\protected@file@percent } \newlabel{sec:DT}{{\mbox {V-B}}{10}{}{}{}} \citation{PhysRevLett.87.198701} \@writefile{lof}{\contentsline {figure}{\numberline {12}{\ignorespaces Example ``Base" Network for Illustrating Dominance}}{11}{}\protected@file@percent } \newlabel{fig:domNet}{{12}{11}{}{}{}} \@writefile{toc}{\contentsline {subsection}{\numberline {\mbox {V-C}}Results and Analysis}{11}{}\protected@file@percent } \newlabel{sec:xform-res}{{\mbox {V-C}}{11}{}{}{}} \@writefile{lof}{\contentsline {figure}{\numberline {13}{\ignorespaces Dominant Tree Derived from the ``Base" Network}}{11}{}\protected@file@percent } \newlabel{fig:domTree}{{13}{11}{}{}{}} \@writefile{lot}{\contentsline {table}{\numberline {II}{\ignorespaces Network Property Comparisons of the Original DAG, Transitive Closure, and Dominant Tree for the Automobile Maintenance Network}}{12}{}\protected@file@percent } \newlabel{tab:auto-prop}{{II}{12}{}{}{}} \@writefile{lot}{\contentsline {table}{\numberline {III}{\ignorespaces Network Property Comparisons of the Original DAG, Transitive Closure, and Dominant Tree for the HIPAA Network}}{12}{}\protected@file@percent } \newlabel{tab:hipaa-prop}{{III}{12}{}{}{}} \@writefile{toc}{\contentsline {subsection}{\numberline {\mbox {V-D}}Validation}{12}{}\protected@file@percent } \newlabel{sec:xform-valid}{{\mbox {V-D}}{12}{}{}{}} \@writefile{lot}{\contentsline {table}{\numberline {IV}{\ignorespaces Network Property Comparisons of the Original DAG, Transitive Closure, and Dominant Tree for the OSHA 1910H Network}}{12}{}\protected@file@percent } \newlabel{tab:osha-prop}{{IV}{12}{}{}{}} \@writefile{toc}{\contentsline {section}{\numberline {VI}Future Work}{12}{}\protected@file@percent } \newlabel{sec:FW}{{VI}{12}{}{}{}} \@writefile{toc}{\contentsline {section}{\numberline {VII}Conclusions}{12}{}\protected@file@percent } \bibdata{Bibliography} \bibcite{j_hale_compliance_nodate}{1} \bibcite{baloyi_guidelines_2019}{2} \bibcite{allman_complying_2006}{3} \bibcite{Jha2002TwoFA}{4} \bibcite{10.1016/j.comcom.2006.06.01837}{5} \bibcite{Islam2008AHA36}{6} \bibcite{10.1109/IAS.2008.38}{7} \bibcite{GCAI-2018:Analysis_of_Attack_Graph}{8} \bibcite{ming_diss}{9} \bibcite{10.1145/3491257}{10} \bibcite{Guo2017HermitianAM}{11} \bibcite{Mieghem2018DirectedGA}{12} \bibcite{Brualdi2010SpectraOD}{13} \bibcite{PMID:30064421}{14} \bibcite{newman2010networks}{15} \bibcite{Graphviz}{16} \bibcite{igraph}{17} \bibcite{brandes}{18} \bibcite{Katz}{19} \bibcite{ModKatz}{20} \bibcite{laug}{21} \bibcite{stankovic2023fourier}{22} \bibcite{seifert2023causal}{23} \bibcite{MACEDO2016999}{24} \bibcite{williams2023new}{25} \bibcite{alman2020refined}{26} \bibcite{PageRank}{27} \bibcite{Adapted_PageRank}{28} \bibcite{10.1371/journal.pone.0053095}{29} \bibcite{10.1145/3288599.3295597}{30} \bibcite{9680376}{31} \bibcite{NetworkX}{32} \bibcite{reticulate}{33} \bibcite{AUDRITO2021102584}{34} \bibcite{LI2018512}{35} \bibcite{MO2019121538}{36} \bibcite{bordacent}{37} \bibcite{6023c4f8-ecc1-3dbe-9f88-265b318523d2}{38} \bibcite{doi:10.1137/0135023}{39} \bibcite{li_combining_2019}{40} \bibcite{zeng_cyber_2017}{41} \bibcite{dominance}{42} \bibcite{PhysRevLett.87.198701}{43} \@writefile{toc}{\contentsline {section}{Bibliography}{13}{}\protected@file@percent } \@writefile{toc}{\contentsline {section}{References}{13}{}\protected@file@percent } \bibstyle{ieeetr} \gdef \@abspage@last{14}