217 lines
8.9 KiB
Plaintext
217 lines
8.9 KiB
Plaintext
\begin{thebibliography}{10}
|
||
|
||
\bibitem{j_hale_compliance_nodate}
|
||
{J. Hale}, P.~Hawrylak, and M.~Papa, ``Compliance {Method} for a
|
||
{Cyber}-{Physical} {System}.''
|
||
\newblock U.S. Patent Number 9,471,789, Oct. 18, 2016.
|
||
|
||
\bibitem{baloyi_guidelines_2019}
|
||
N.~Baloyi and P.~Kotzé, ``Guidelines for {Data} {Privacy} {Compliance}: {A}
|
||
{Focus} on {Cyberphysical} {Systems} and {Internet} of {Things},'' in {\em
|
||
{SAICSIT} '19: {Proceedings} of the {South} {African} {Institute} of
|
||
{Computer} {Scientists} and {Information} {Technologists} 2019}, (Skukuza
|
||
South Africa), Association for Computing Machinery, 2019.
|
||
|
||
\bibitem{allman_complying_2006}
|
||
E.~Allman, ``Complying with {Compliance}: {Blowing} it off is not an option.,''
|
||
{\em ACM Queue}, vol.~4, no.~7, 2006.
|
||
|
||
\bibitem{Jha2002TwoFA}
|
||
S.~Jha, O.~Sheyner, and J.~M. Wing, ``Two formal analyses of attack graphs,''
|
||
{\em Proceedings 15th IEEE Computer Security Foundations Workshop. CSFW-15},
|
||
pp.~49--63, 2002.
|
||
|
||
\bibitem{10.1016/j.comcom.2006.06.01837}
|
||
L.~Wang, S.~Noel, and S.~Jajodia, ``Minimum-cost network hardening using attack
|
||
graphs,'' {\em Computer Communications}, vol.~29, pp.~3812--3824, nov 2006.
|
||
|
||
\bibitem{Islam2008AHA36}
|
||
T.~Islam and L.~Wang, ``A heuristic approach to minimum-cost network hardening
|
||
using attack graph,'' {\em 2008 New Technologies, Mobility and Security},
|
||
pp.~1--5, 2008.
|
||
|
||
\bibitem{10.1109/IAS.2008.38}
|
||
F.~Chen, L.~Wang, and J.~Su, ``An efficient approach to minimum-cost network
|
||
hardening using attack graphs,'' in {\em Proceedings of the 2008 The Fourth
|
||
International Conference on Information Assurance and Security}, IAS '08,
|
||
(USA), pp.~209--212, IEEE Computer Society, 2008.
|
||
|
||
\bibitem{GCAI-2018:Analysis_of_Attack_Graph}
|
||
T.~Gonda, T.~Pascal, R.~Puzis, G.~Shani, and B.~Shapira, ``Analysis of attack
|
||
graph representations for ranking vulnerability fixes,'' in {\em GCAI-2018.
|
||
4th Global Conference on Artificial Intelligence} (D.~Lee, A.~Steen, and
|
||
T.~Walsh, eds.), vol.~55 of {\em EPiC Series in Computing}, pp.~215--228,
|
||
EasyChair, 2018.
|
||
|
||
\bibitem{ming_diss}
|
||
M.~Li, P.~Hawrylak, and J.~Hale, {\em A System for Attack Graph Generation and
|
||
Analysis}.
|
||
\newblock {PhD} dissertation, The University of Tulsa, Tulsa, OK, 2021.
|
||
|
||
\bibitem{10.1145/3491257}
|
||
M.~Li, P.~Hawrylak, and J.~Hale, ``Strategies for practical hybrid attack graph
|
||
generation and analysis,'' {\em Digital Threats}, Oct 2021.
|
||
|
||
\bibitem{Guo2017HermitianAM}
|
||
K.~Guo and B.~Mohar, ``{Hermitian Adjacency Matrix of Digraphs and Mixed
|
||
Graphs},'' {\em Journal of Graph Theory}, vol.~85, 2017.
|
||
|
||
\bibitem{Mieghem2018DirectedGA}
|
||
P.~V. Mieghem, ``Directed graphs and mysterious complex eigenvalues,'' 2018.
|
||
\newblock {Delft University of Technology.}
|
||
|
||
\bibitem{Brualdi2010SpectraOD}
|
||
R.~A. Brualdi, ``{Spectra of Digraphs},'' {\em Linear Algebra and Its
|
||
Applications}, vol.~432, pp.~2181--2213, 2010.
|
||
|
||
\bibitem{PMID:30064421}
|
||
M.~Ashtiani, A.~Salehzadeh-Yazdi, Z.~Razaghi-Moghadam, H.~Hennig,
|
||
O.~Wolkenhauer, M.~Mirzaie, and M.~Jafari, ``A systematic survey of
|
||
centrality measures for protein-protein interaction networks,'' {\em {BMC
|
||
Systems Biology}}, vol.~12, p.~80, July 2018.
|
||
|
||
\bibitem{newman2010networks}
|
||
M.~Newman, {\em Networks: An Introduction}.
|
||
\newblock Oxford University Press, 2010.
|
||
|
||
\bibitem{Graphviz}
|
||
T.~G. Authors, {\em {Graphviz}: Graph Visualization}, 2023.
|
||
\newblock Graphviz release 8.1.0 [Online]. Available:https://www.graphviz.org/.
|
||
|
||
\bibitem{igraph}
|
||
G.~Csárdi, T.~Nepusz, V.~Traag, S.~Horvát, F.~Zanini, D.~Noom, and
|
||
K.~Müller, {\em {Igraph}: Network Analysis and Visualization in R}, 2023.
|
||
\newblock R package version 1.5.1.
|
||
|
||
\bibitem{brandes}
|
||
U.~Brandes, ``A faster algorithm for betweenness centrality*,'' {\em The
|
||
Journal of Mathematical Sociology}, vol.~25, no.~2, pp.~163--177, 2001.
|
||
|
||
\bibitem{Katz}
|
||
L.~Katz, ``{A New Status Index Derived From Sociometric Analysis},'' {\em
|
||
Psychometrika}, vol.~18, pp.~39--43, March 1953.
|
||
|
||
\bibitem{ModKatz}
|
||
M.~Ogura and V.~M. Preciado, ``Katz centrality of markovian temporal networks:
|
||
Analysis and optimization,'' {\em 2017 American Control Conference (ACC)},
|
||
pp.~5001--5006, 2017.
|
||
|
||
\bibitem{laug}
|
||
E.~Anderson, Z.~Bai, C.~Bischof, S.~Blackford, J.~Demmel, J.~Dongarra,
|
||
J.~Du~Croz, A.~Greenbaum, S.~Hammarling, A.~McKenney, and D.~Sorensen, {\em
|
||
{LAPACK} Users' Guide}.
|
||
\newblock Philadelphia, PA: Society for Industrial and Applied Mathematics,
|
||
3rd~ed., 1999.
|
||
|
||
\bibitem{stankovic2023fourier}
|
||
L.~Stankovic, M.~Dakovic, A.~B. Bardi, M.~Brajovic, and I.~Stankovic, ``Fourier
|
||
analysis of signals on directed acyclic graphs (dag) using graph
|
||
zero-padding,'' 2023.
|
||
\newblock arXiv:2311.01073.
|
||
|
||
\bibitem{seifert2023causal}
|
||
B.~Seifert, C.~Wendler, and M.~Püschel, ``Causal fourier analysis on directed
|
||
acyclic graphs and posets,'' 2023.
|
||
\newblock arXiv:2209.07970.
|
||
|
||
\bibitem{MACEDO2016999}
|
||
H.~D. Macedo, ``Gaussian elimination is not optimal, revisited,'' {\em Journal
|
||
of Logical and Algebraic Methods in Programming}, vol.~85, no.~5, Part 2,
|
||
pp.~999--1010, 2016.
|
||
|
||
\bibitem{williams2023new}
|
||
V.~V. Williams, Y.~Xu, Z.~Xu, and R.~Zhou, ``New bounds for matrix
|
||
multiplication: From alpha to omega,'' 2023.
|
||
|
||
\bibitem{alman2020refined}
|
||
J.~Alman and V.~V. Williams, ``A refined laser method and faster matrix
|
||
multiplication,'' 2020.
|
||
|
||
\bibitem{PageRank}
|
||
S.~Brin and L.~Page, ``The anatomy of a large-scale hypertextual web search
|
||
engine,'' {\em Computer Networks and ISDN Systems}, vol.~30, no.~1,
|
||
pp.~107--117, 1998.
|
||
\newblock Proceedings of the Seventh International World Wide Web Conference.
|
||
|
||
\bibitem{Adapted_PageRank}
|
||
T.~Agryzkov, J.~L. Oliver, L.~Tortosa, and J.-F. Vicent, ``An algorithm for
|
||
ranking the nodes of an urban network based on the concept of pagerank
|
||
vector,'' {\em Appl. Math. Comput.}, vol.~219, pp.~2186--2193, 2012.
|
||
|
||
\bibitem{10.1371/journal.pone.0053095}
|
||
M.~Piraveenan, M.~Prokopenko, and L.~Hossain, ``Percolation centrality:
|
||
Quantifying graph-theoretic impact of nodes during percolation in networks,''
|
||
{\em Plos One}, vol.~8, pp.~1--14, 01 2013.
|
||
|
||
\bibitem{10.1145/3288599.3295597}
|
||
S.~De, M.~S. Barik, and I.~Banerjee, ``A percolation-based recovery mechanism
|
||
for bot infected p2p cloud,'' in {\em Proceedings of the 20th International
|
||
Conference on Distributed Computing and Networking}, ICDCN '19, (New York,
|
||
NY, USA), pp.~474--479, Association for Computing Machinery, 2019.
|
||
|
||
\bibitem{9680376}
|
||
A.~Chandramouli, S.~Jana, and K.~Kothapalli, ``Efficient parallel algorithms
|
||
for computing percolation centrality,'' in {\em 2021 IEEE 28th International
|
||
Conference on High Performance Computing, Data, and Analytics (HiPC)},
|
||
pp.~111--120, 2021.
|
||
|
||
\bibitem{NetworkX}
|
||
A.~Hagberg, P.~J. Swart, and D.~A. Schult, ``Exploring network structure,
|
||
dynamics, and function using networkx,''
|
||
\newblock {Available: https://www.osti.gov/biblio/960616}.
|
||
|
||
\bibitem{reticulate}
|
||
K.~Ushey, J.~Allaire, and Y.~Tang, {\em Reticulate: Interface to 'Python'},
|
||
2023.
|
||
\newblock {R package version 1.28. Available:
|
||
https://CRAN.R-project.org/package=reticulate}.
|
||
|
||
\bibitem{AUDRITO2021102584}
|
||
G.~Audrito, D.~Pianini, F.~Damiani, and M.~Viroli, ``Aggregate centrality
|
||
measures for iot-based coordination,'' {\em Science of Computer Programming},
|
||
vol.~203, p.~102584, 2021.
|
||
|
||
\bibitem{LI2018512}
|
||
C.~Li, L.~Wang, S.~Sun, and C.~Xia, ``Identification of influential spreaders
|
||
based on classified neighbors in real-world complex networks,'' {\em Applied
|
||
Mathematics and Computation}, vol.~320, pp.~512--523, 2018.
|
||
|
||
\bibitem{MO2019121538}
|
||
H.~Mo and Y.~Deng, ``Identifying node importance based on evidence theory in
|
||
complex networks,'' {\em Physica A: Statistical Mechanics and Its
|
||
Applications}, vol.~529, p.~121538, 2019.
|
||
|
||
\bibitem{bordacent}
|
||
A.~Madotto and J.~Liu, ``Super-spreader identification using meta-centrality,''
|
||
{\em Scientific Reports}, vol.~6, Dec. 2016.
|
||
|
||
\bibitem{6023c4f8-ecc1-3dbe-9f88-265b318523d2}
|
||
J.~G. Kemeny, ``Mathematics without numbers,'' {\em Daedalus}, vol.~88, no.~4,
|
||
pp.~577--591, 1959.
|
||
|
||
\bibitem{doi:10.1137/0135023}
|
||
H.~P. Young and A.~Levenglick, ``A consistent extension of condorcet’s
|
||
election principle,'' {\em SIAM Journal on Applied Mathematics}, vol.~35,
|
||
no.~2, pp.~285--300, 1978.
|
||
|
||
\bibitem{li_combining_2019}
|
||
M.~Li, P.~Hawrylak, and J.~Hale, ``Combining {OpenCL} and {MPI} to support
|
||
heterogeneous computing on a cluster,'' {\em ACM International Conference
|
||
Proceeding Series}, 2019.
|
||
|
||
\bibitem{zeng_cyber_2017}
|
||
K.~Zeng, ``Cyber {Attack} {Analysis} {Based} on {Markov} {Process} {Model},''
|
||
Master's thesis, The University of Tulsa, Tulsa, OK, 2017.
|
||
|
||
\bibitem{dominance}
|
||
R.~T. Prosser, ``Applications of boolean matrices to the analysis of flow
|
||
diagrams,'' in {\em Papers Presented at the December 1-3, 1959, Eastern Joint
|
||
IRE-AIEE-ACM Computer Conference}, IRE-AIEE-ACM '59 (Eastern), (New York, NY,
|
||
USA), p.~133–138, Association for Computing Machinery, 1959.
|
||
|
||
\bibitem{PhysRevLett.87.198701}
|
||
V.~Latora and M.~Marchiori, ``Efficient behavior of small-world networks,''
|
||
{\em Phys. Rev. Lett.}, vol.~87, p.~198701, Oct 2001.
|
||
|
||
\end{thebibliography}
|