\relax \providecommand\hyper@newdestlabel[2]{} \providecommand\babel@aux[2]{} \@nameuse{bbl@beforestart} \providecommand\HyperFirstAtBeginDocument{\AtBeginDocument} \HyperFirstAtBeginDocument{\ifx\hyper@anchor\@undefined \global\let\oldcontentsline\contentsline \gdef\contentsline#1#2#3#4{\oldcontentsline{#1}{#2}{#3}} \global\let\oldnewlabel\newlabel \gdef\newlabel#1#2{\newlabelxx{#1}#2} \gdef\newlabelxx#1#2#3#4#5#6{\oldnewlabel{#1}{{#2}{#3}}} \AtEndDocument{\ifx\hyper@anchor\@undefined \let\contentsline\oldcontentsline \let\newlabel\oldnewlabel \fi} \fi} \global\let\hyper@last\relax \gdef\HyperFirstAtBeginDocument#1{#1} \providecommand\HyField@AuxAddToFields[1]{} \providecommand\HyField@AuxAddToCoFields[2]{} \citation{j_hale_compliance_nodate} \citation{baloyi_guidelines_2019} \citation{allman_complying_2006} \citation{newman2010networks} \citation{Mieghem2018DirectedGA} \citation{Mieghem2018DirectedGA} \babel@aux{nil}{} \@writefile{toc}{\contentsline {section}{\numberline {I}Introduction}{1}{section.1}\protected@file@percent } \@writefile{toc}{\contentsline {subsection}{\numberline {\mbox {I-A}}Compliance Graphs}{1}{subsection.1.1}\protected@file@percent } \@writefile{toc}{\contentsline {subsection}{\numberline {\mbox {I-B}}Difficulties of Attack and Compliance Graph Analysis}{1}{subsection.1.2}\protected@file@percent } \citation{10.1145/3491257} \citation{Guo2017HermitianAM} \citation{Mieghem2018DirectedGA} \citation{Brualdi2010SpectraOD} \citation{noauthor_health_1996} \citation{PCI} \citation{PMID:30064421} \@writefile{toc}{\contentsline {section}{\numberline {II}Related Works}{2}{section.2}\protected@file@percent } \@writefile{toc}{\contentsline {section}{\numberline {III}Experimental Networks}{2}{section.3}\protected@file@percent } \newlabel{sec:networks}{{III}{2}{Experimental Networks}{section.3}{}} \@writefile{lot}{\contentsline {table}{\numberline {I}{\ignorespaces Network Properties for the Three Networks Utilized\relax }}{2}{table.1}\protected@file@percent } \providecommand*\caption@xref[2]{\@setref\relax\@undefined{#1}} \newlabel{table:networks}{{I}{2}{Network Properties for the Three Networks Utilized\relax }{table.1}{}} \@writefile{toc}{\contentsline {section}{\numberline {IV}Centralities and their Contextualizations to Compliance Graphs}{2}{section.4}\protected@file@percent } \newlabel{sec:centralities}{{IV}{2}{Centralities and their Contextualizations to Compliance Graphs}{section.4}{}} \@writefile{toc}{\contentsline {subsection}{\numberline {\mbox {IV-A}}Introduction}{2}{subsection.4.1}\protected@file@percent } \@writefile{toc}{\contentsline {subsection}{\numberline {\mbox {IV-B}}Degree}{2}{subsection.4.2}\protected@file@percent } \@writefile{toc}{\contentsline {subsection}{\numberline {\mbox {IV-C}}Betweenness}{2}{subsection.4.3}\protected@file@percent } \newlabel{sec:between}{{\mbox {IV-C}}{2}{Betweenness}{subsection.4.3}{}} \citation{Katz} \citation{K_Path_Edge} \citation{PageRank} \citation{Adapted_PageRank} \newlabel{eq:between}{{1}{3}{Betweenness}{equation.4.1}{}} \@writefile{toc}{\contentsline {subsection}{\numberline {\mbox {IV-D}}Katz}{3}{subsection.4.4}\protected@file@percent } \newlabel{eq:Katz}{{2}{3}{Katz}{equation.4.2}{}} \newlabel{eq:mod_katz}{{3}{3}{Katz}{equation.4.3}{}} \@writefile{toc}{\contentsline {subsection}{\numberline {\mbox {IV-E}}K-Path Edge}{3}{subsection.4.5}\protected@file@percent } \newlabel{eq:kpe}{{4}{3}{K-Path Edge}{equation.4.4}{}} \@writefile{toc}{\contentsline {subsection}{\numberline {\mbox {IV-F}}Adapted Page Rank}{3}{subsection.4.6}\protected@file@percent } \newlabel{eq:PR}{{5}{3}{Adapted Page Rank}{equation.4.5}{}} \citation{li_combining_2019} \citation{zeng_cyber_2017} \citation{dominance} \newlabel{eq:APC}{{6}{4}{Adapted Page Rank}{equation.4.6}{}} \@writefile{toc}{\contentsline {section}{\numberline {V}Transitive Closure}{4}{section.5}\protected@file@percent } \@writefile{toc}{\contentsline {subsection}{\numberline {\mbox {V-A}}Introduction and Application}{4}{subsection.5.1}\protected@file@percent } \@writefile{toc}{\contentsline {section}{\numberline {VI}Dominant Tree}{4}{section.6}\protected@file@percent } \@writefile{toc}{\contentsline {subsection}{\numberline {\mbox {VI-A}}Introduction and Application}{4}{subsection.6.1}\protected@file@percent } \@writefile{lof}{\contentsline {figure}{\numberline {1}{\ignorespaces Transitive Closure Illustration\relax }}{4}{figure.caption.1}\protected@file@percent } \newlabel{fig:TC}{{1}{4}{Transitive Closure Illustration\relax }{figure.caption.1}{}} \@writefile{lof}{\contentsline {figure}{\numberline {2}{\ignorespaces Example Network for Illustrating Dominance\relax }}{5}{figure.caption.2}\protected@file@percent } \newlabel{fig:domNet}{{2}{5}{Example Network for Illustrating Dominance\relax }{figure.caption.2}{}} \@writefile{lof}{\contentsline {figure}{\numberline {3}{\ignorespaces Dominant Tree Derived from the Network Displayed in Figure \ref {fig:domNet}\relax }}{5}{figure.caption.3}\protected@file@percent } \newlabel{fig:domTree}{{3}{5}{Dominant Tree Derived from the Network Displayed in Figure \ref {fig:domNet}\relax }{figure.caption.3}{}} \@writefile{lot}{\contentsline {table}{\numberline {II}{\ignorespaces Top 15 Nodes with Degree Centrality\relax }}{5}{table.2}\protected@file@percent } \newlabel{table:car-deg}{{II}{5}{Top 15 Nodes with Degree Centrality\relax }{table.2}{}} \@writefile{toc}{\contentsline {section}{\numberline {VII}Results and Result Analysis}{5}{section.7}\protected@file@percent } \newlabel{sec:results}{{VII}{5}{Results and Result Analysis}{section.7}{}} \@writefile{toc}{\contentsline {subsection}{\numberline {\mbox {VII-A}}Results}{5}{subsection.7.1}\protected@file@percent } \@writefile{toc}{\contentsline {subsection}{\numberline {\mbox {VII-B}}Result Analysis}{5}{subsection.7.2}\protected@file@percent } \@writefile{lot}{\contentsline {table}{\numberline {III}{\ignorespaces Top 15 Nodes with Katz Centrality\relax }}{6}{table.3}\protected@file@percent } \newlabel{table:car-katz}{{III}{6}{Top 15 Nodes with Katz Centrality\relax }{table.3}{}} \@writefile{lot}{\contentsline {table}{\numberline {IV}{\ignorespaces Top 15 Nodes with K-path Edge Centrality\relax }}{6}{table.4}\protected@file@percent } \newlabel{table:car-kpe}{{IV}{6}{Top 15 Nodes with K-path Edge Centrality\relax }{table.4}{}} \@writefile{lot}{\contentsline {table}{\numberline {V}{\ignorespaces Top 15 Nodes with PageRank Centrality\relax }}{6}{table.5}\protected@file@percent } \newlabel{table:car-APC}{{V}{6}{Top 15 Nodes with PageRank Centrality\relax }{table.5}{}} \@writefile{lot}{\contentsline {table}{\numberline {VI}{\ignorespaces Top 15 Nodes with Betweenness Centrality\relax }}{6}{table.6}\protected@file@percent } \newlabel{table:car-betweenness}{{VI}{6}{Top 15 Nodes with Betweenness Centrality\relax }{table.6}{}} \bibdata{Bibliography} \bibcite{j_hale_compliance_nodate}{1} \bibcite{baloyi_guidelines_2019}{2} \bibcite{allman_complying_2006}{3} \bibcite{newman2010networks}{4} \bibcite{Mieghem2018DirectedGA}{5} \bibcite{10.1145/3491257}{6} \bibcite{Guo2017HermitianAM}{7} \bibcite{Brualdi2010SpectraOD}{8} \bibcite{noauthor_health_1996}{9} \bibcite{PCI}{10} \bibcite{PMID:30064421}{11} \bibcite{Katz}{12} \bibcite{K_Path_Edge}{13} \bibcite{PageRank}{14} \bibcite{Adapted_PageRank}{15} \bibcite{li_combining_2019}{16} \bibcite{zeng_cyber_2017}{17} \bibcite{dominance}{18} \bibstyle{ieeetr} \@writefile{toc}{\contentsline {section}{\numberline {VIII}Conclusions and Future Work}{7}{section.8}\protected@file@percent } \@writefile{toc}{\contentsline {subsection}{\numberline {\mbox {VIII-A}}Conclusions}{7}{subsection.8.1}\protected@file@percent } \@writefile{toc}{\contentsline {subsection}{\numberline {\mbox {VIII-B}}Future Work}{7}{subsection.8.2}\protected@file@percent } \@writefile{toc}{\contentsline {section}{Bibliography}{7}{subsection.8.2}\protected@file@percent } \@writefile{toc}{\contentsline {section}{References}{7}{section*.4}\protected@file@percent } \gdef \@abspage@last{7}