\relax \providecommand\babel@aux[2]{} \@nameuse{bbl@beforestart} \citation{j_hale_compliance_nodate} \citation{baloyi_guidelines_2019} \citation{allman_complying_2006} \citation{newman2010networks} \citation{Mieghem2018DirectedGA} \citation{Mieghem2018DirectedGA} \babel@aux{nil}{} \@writefile{toc}{\contentsline {section}{\numberline {I}Introduction}{1}{}\protected@file@percent } \@writefile{toc}{\contentsline {subsection}{\numberline {\mbox {I-A}}Compliance Graphs}{1}{}\protected@file@percent } \@writefile{toc}{\contentsline {subsection}{\numberline {\mbox {I-B}}Difficulties of Attack and Compliance Graph Analysis}{1}{}\protected@file@percent } \citation{ZENITANI2023103081} \citation{Zeng2019SurveyOA} \citation{ming_diss} \citation{10.1145/3491257} \citation{Guo2017HermitianAM} \citation{Mieghem2018DirectedGA} \citation{Brualdi2010SpectraOD} \citation{noauthor_health_1996} \citation{PCI} \citation{PMID:30064421} \@writefile{toc}{\contentsline {section}{\numberline {II}Related Works}{2}{}\protected@file@percent } \@writefile{toc}{\contentsline {section}{\numberline {III}Experimental Networks}{2}{}\protected@file@percent } \newlabel{sec:networks}{{III}{2}} \@writefile{lot}{\contentsline {table}{\numberline {I}{\ignorespaces Network Structural Properties (Nodes, Edges, and Connectivity Percentage) for the Three Example Networks.\\\hspace {\textwidth }Notably, each network has a different size, allowing for more expansive results analysis. The Car network and the HIPAA network have a similar number of nodes, but a difference in edges and connectivity percentage. The PCI DSS network is substantially smaller, with a much greater connectivity percentage}}{2}{}\protected@file@percent } \newlabel{table:networks}{{I}{2}} \@writefile{toc}{\contentsline {section}{\numberline {IV}Centralities and their Contextualizations to Compliance Graphs}{2}{}\protected@file@percent } \newlabel{sec:centralities}{{IV}{2}} \@writefile{toc}{\contentsline {subsection}{\numberline {\mbox {IV-A}}Degree}{2}{}\protected@file@percent } \citation{Katz} \citation{ModKatz} \citation{K_Path_Edge} \citation{PageRank} \citation{Adapted_PageRank} \@writefile{toc}{\contentsline {subsection}{\numberline {\mbox {IV-B}}Betweenness}{3}{}\protected@file@percent } \newlabel{sec:between}{{\mbox {IV-B}}{3}} \newlabel{eq:between}{{1}{3}} \@writefile{toc}{\contentsline {subsection}{\numberline {\mbox {IV-C}}Katz}{3}{}\protected@file@percent } \newlabel{eq:Katz}{{2}{3}} \newlabel{eq:mod_katz}{{3}{3}} \@writefile{toc}{\contentsline {subsection}{\numberline {\mbox {IV-D}}K-Path Edge}{3}{}\protected@file@percent } \newlabel{eq:kpe}{{4}{3}} \@writefile{toc}{\contentsline {subsection}{\numberline {\mbox {IV-E}}Adapted Page Rank}{3}{}\protected@file@percent } \citation{li_combining_2019} \citation{zeng_cyber_2017} \citation{dominance} \newlabel{eq:PR}{{5}{4}} \newlabel{eq:APC}{{6}{4}} \@writefile{toc}{\contentsline {section}{\numberline {V}Transitive Closure}{4}{}\protected@file@percent } \@writefile{lof}{\contentsline {figure}{\numberline {1}{\ignorespaces Illustration of an Example DAG and its Transitive Closure. \\\hspace {\textwidth }Each node in the original DAG has 1-step reachability to any downstream node it has a transitive connection to in the resulting transitive closure. }}{4}{}\protected@file@percent } \newlabel{fig:TC}{{1}{4}} \@writefile{toc}{\contentsline {section}{\numberline {VI}Dominant Tree}{4}{}\protected@file@percent } \@writefile{lof}{\contentsline {figure}{\numberline {2}{\ignorespaces Example ``Base" Network for Illustrating Dominance. \\\hspace {\textwidth }An arbitrary DAG that has not yet undergone transformation.}}{5}{}\protected@file@percent } \newlabel{fig:domNet}{{2}{5}} \@writefile{lof}{\contentsline {figure}{\numberline {3}{\ignorespaces Dominant Tree Derived from the Network Displayed in Figure \ref {fig:domNet}. \\\hspace {\textwidth }Node 1 dominates Node 2, and Node 2 possesses immediate dominance over Nodes 3, 4, 5, and 6.}}{5}{}\protected@file@percent } \newlabel{fig:domTree}{{3}{5}} \@writefile{lot}{\contentsline {table}{\numberline {II}{\ignorespaces Top 15 Nodes with Degree Centrality for the Automobile Network. \\\hspace {\textwidth } Base columns represent the top ranked nodes and their percentage of importance held relative to the entire network. \\\hspace {\textwidth }Transitive Closure and Dominant Tree columns illustrate the difference in node rankings after the base network underwent a transformation. \\\hspace {\textwidth }}}{5}{}\protected@file@percent } \newlabel{table:car-deg}{{II}{5}} \@writefile{toc}{\contentsline {section}{\numberline {VII}Results and Result Analysis}{5}{}\protected@file@percent } \newlabel{sec:results}{{VII}{5}} \@writefile{lof}{\contentsline {figure}{\numberline {4}{\ignorespaces Importance Distribution for Degree Centrality for the Automobile Network. \\\hspace {\textwidth } The ``Base" figure represents the distribution of the original network. \\\hspace {\textwidth } The Transitive Closure and Dominant Tree figures illustrate the distribution difference in node rankings after the base network underwent a transformation.}}{6}{}\protected@file@percent } \newlabel{fig:car-deg}{{4}{6}} \@writefile{lof}{\contentsline {figure}{\numberline {5}{\ignorespaces Importance Distribution for Katz Centrality for the Automobile Network. \\\hspace {\textwidth } The ``Base" figure represents the distribution of the original network. \\\hspace {\textwidth } The Transitive Closure and Dominant Tree figures illustrate the distribution difference in node rankings after the base network underwent a transformation.}}{6}{}\protected@file@percent } \newlabel{fig:car-katz}{{5}{6}} \@writefile{lof}{\contentsline {figure}{\numberline {6}{\ignorespaces Importance Distribution for Adapted PageRank Centrality for the Automobile Network. \\\hspace {\textwidth } The ``Base" figure represents the distribution of the original network. \\\hspace {\textwidth } The Transitive Closure and Dominant Tree figures illustrate the distribution difference in node rankings after the base network underwent a transformation.}}{6}{}\protected@file@percent } \newlabel{fig:car-pr}{{6}{6}} \@writefile{lof}{\contentsline {figure}{\numberline {7}{\ignorespaces Importance Distribution for K-Path Edge Centrality for the Automobile Network. \\\hspace {\textwidth } The ``Base" figure represents the distribution of the original network. \\\hspace {\textwidth } The Transitive Closure and Dominant Tree figures illustrate the distribution difference in node rankings after the base network underwent a transformation.}}{6}{}\protected@file@percent } \newlabel{fig:car-kpe}{{7}{6}} \@writefile{lof}{\contentsline {figure}{\numberline {8}{\ignorespaces Importance Distribution for Betweenness Centrality for the Automobile Network. \\\hspace {\textwidth } The ``Base" figure represents the distribution of the original network. \\\hspace {\textwidth } The Transitive Closure and Dominant Tree figures illustrate the distribution difference in node rankings after the base network underwent a transformation.}}{7}{}\protected@file@percent } \newlabel{fig:car-betweenness}{{8}{7}} \@writefile{toc}{\contentsline {subsection}{\numberline {\mbox {VII-A}}Result Analysis}{7}{}\protected@file@percent } \@writefile{toc}{\contentsline {section}{\numberline {VIII}Conclusions and Future Work}{7}{}\protected@file@percent } \@writefile{toc}{\contentsline {subsection}{\numberline {\mbox {VIII-A}}Conclusions}{7}{}\protected@file@percent } \citation{LI2018512} \citation{MO2019121538} \citation{sym11020284} \citation{10.1093/bioinformatics/bty965} \bibdata{Bibliography} \bibcite{j_hale_compliance_nodate}{1} \bibcite{baloyi_guidelines_2019}{2} \bibcite{allman_complying_2006}{3} \bibcite{newman2010networks}{4} \bibcite{Mieghem2018DirectedGA}{5} \bibcite{ZENITANI2023103081}{6} \bibcite{Zeng2019SurveyOA}{7} \bibcite{ming_diss}{8} \bibcite{10.1145/3491257}{9} \bibcite{Guo2017HermitianAM}{10} \bibcite{Brualdi2010SpectraOD}{11} \bibcite{noauthor_health_1996}{12} \bibcite{PCI}{13} \bibcite{PMID:30064421}{14} \bibcite{Katz}{15} \bibcite{ModKatz}{16} \bibcite{K_Path_Edge}{17} \bibcite{PageRank}{18} \bibcite{Adapted_PageRank}{19} \bibcite{li_combining_2019}{20} \bibcite{zeng_cyber_2017}{21} \bibcite{dominance}{22} \bibcite{LI2018512}{23} \bibcite{MO2019121538}{24} \bibcite{sym11020284}{25} \bibcite{10.1093/bioinformatics/bty965}{26} \bibstyle{ieeetr} \@writefile{toc}{\contentsline {subsection}{\numberline {\mbox {VIII-B}}Future Work}{8}{}\protected@file@percent } \@writefile{toc}{\contentsline {section}{Bibliography}{8}{}\protected@file@percent } \@writefile{toc}{\contentsline {section}{References}{8}{}\protected@file@percent } \gdef \@abspage@last{8}