AG-CG-Network-Science/Old_Version/Schrick-Noah_CG-Network_Theory.aux
2024-04-18 15:17:30 -05:00

112 lines
8.6 KiB
TeX

\relax
\providecommand\babel@aux[2]{}
\@nameuse{bbl@beforestart}
\citation{j_hale_compliance_nodate}
\citation{baloyi_guidelines_2019}
\citation{allman_complying_2006}
\citation{newman2010networks}
\citation{Mieghem2018DirectedGA}
\citation{Mieghem2018DirectedGA}
\babel@aux{nil}{}
\@writefile{toc}{\contentsline {section}{\numberline {I}Introduction}{1}{}\protected@file@percent }
\@writefile{toc}{\contentsline {subsection}{\numberline {\mbox {I-A}}Compliance Graphs}{1}{}\protected@file@percent }
\@writefile{toc}{\contentsline {subsection}{\numberline {\mbox {I-B}}Difficulties of Attack and Compliance Graph Analysis}{1}{}\protected@file@percent }
\citation{ZENITANI2023103081}
\citation{Zeng2019SurveyOA}
\citation{ming_diss}
\citation{10.1145/3491257}
\citation{Guo2017HermitianAM}
\citation{Mieghem2018DirectedGA}
\citation{Brualdi2010SpectraOD}
\citation{noauthor_health_1996}
\citation{PCI}
\citation{PMID:30064421}
\@writefile{toc}{\contentsline {section}{\numberline {II}Related Works}{2}{}\protected@file@percent }
\@writefile{toc}{\contentsline {section}{\numberline {III}Experimental Networks}{2}{}\protected@file@percent }
\newlabel{sec:networks}{{III}{2}}
\@writefile{lot}{\contentsline {table}{\numberline {I}{\ignorespaces Network Structural Properties (Nodes, Edges, and Connectivity Percentage) for the Three Example Networks.\\\hspace {\textwidth }Notably, each network has a different size, allowing for more expansive results analysis. The Car network and the HIPAA network have a similar number of nodes, but a difference in edges and connectivity percentage. The PCI DSS network is substantially smaller, with a much greater connectivity percentage}}{2}{}\protected@file@percent }
\newlabel{table:networks}{{I}{2}}
\@writefile{toc}{\contentsline {section}{\numberline {IV}Centralities and their Contextualizations to Compliance Graphs}{2}{}\protected@file@percent }
\newlabel{sec:centralities}{{IV}{2}}
\@writefile{toc}{\contentsline {subsection}{\numberline {\mbox {IV-A}}Degree}{2}{}\protected@file@percent }
\citation{Katz}
\citation{ModKatz}
\citation{K_Path_Edge}
\citation{PageRank}
\citation{Adapted_PageRank}
\@writefile{toc}{\contentsline {subsection}{\numberline {\mbox {IV-B}}Betweenness}{3}{}\protected@file@percent }
\newlabel{sec:between}{{\mbox {IV-B}}{3}}
\newlabel{eq:between}{{1}{3}}
\@writefile{toc}{\contentsline {subsection}{\numberline {\mbox {IV-C}}Katz}{3}{}\protected@file@percent }
\newlabel{eq:Katz}{{2}{3}}
\newlabel{eq:mod_katz}{{3}{3}}
\@writefile{toc}{\contentsline {subsection}{\numberline {\mbox {IV-D}}K-Path Edge}{3}{}\protected@file@percent }
\newlabel{eq:kpe}{{4}{3}}
\@writefile{toc}{\contentsline {subsection}{\numberline {\mbox {IV-E}}Adapted Page Rank}{3}{}\protected@file@percent }
\citation{li_combining_2019}
\citation{zeng_cyber_2017}
\citation{dominance}
\newlabel{eq:PR}{{5}{4}}
\newlabel{eq:APC}{{6}{4}}
\@writefile{toc}{\contentsline {section}{\numberline {V}Transitive Closure}{4}{}\protected@file@percent }
\@writefile{lof}{\contentsline {figure}{\numberline {1}{\ignorespaces Illustration of an Example DAG and its Transitive Closure. \\\hspace {\textwidth }Each node in the original DAG has 1-step reachability to any downstream node it has a transitive connection to in the resulting transitive closure. }}{4}{}\protected@file@percent }
\newlabel{fig:TC}{{1}{4}}
\@writefile{toc}{\contentsline {section}{\numberline {VI}Dominant Tree}{4}{}\protected@file@percent }
\@writefile{lof}{\contentsline {figure}{\numberline {2}{\ignorespaces Example ``Base" Network for Illustrating Dominance. \\\hspace {\textwidth }An arbitrary DAG that has not yet undergone transformation.}}{5}{}\protected@file@percent }
\newlabel{fig:domNet}{{2}{5}}
\@writefile{lof}{\contentsline {figure}{\numberline {3}{\ignorespaces Dominant Tree Derived from the Network Displayed in Figure \ref {fig:domNet}. \\\hspace {\textwidth }Node 1 dominates Node 2, and Node 2 possesses immediate dominance over Nodes 3, 4, 5, and 6.}}{5}{}\protected@file@percent }
\newlabel{fig:domTree}{{3}{5}}
\@writefile{lot}{\contentsline {table}{\numberline {II}{\ignorespaces Top 15 Nodes with Degree Centrality for the Automobile Network. \\\hspace {\textwidth } Base columns represent the top ranked nodes and their percentage of importance held relative to the entire network. \\\hspace {\textwidth }Transitive Closure and Dominant Tree columns illustrate the difference in node rankings after the base network underwent a transformation. \\\hspace {\textwidth }}}{5}{}\protected@file@percent }
\newlabel{table:car-deg}{{II}{5}}
\@writefile{toc}{\contentsline {section}{\numberline {VII}Results and Result Analysis}{5}{}\protected@file@percent }
\newlabel{sec:results}{{VII}{5}}
\@writefile{lof}{\contentsline {figure}{\numberline {4}{\ignorespaces Importance Distribution for Degree Centrality for the Automobile Network. \\\hspace {\textwidth } The ``Base" figure represents the distribution of the original network. \\\hspace {\textwidth } The Transitive Closure and Dominant Tree figures illustrate the distribution difference in node rankings after the base network underwent a transformation.}}{6}{}\protected@file@percent }
\newlabel{fig:car-deg}{{4}{6}}
\@writefile{lof}{\contentsline {figure}{\numberline {5}{\ignorespaces Importance Distribution for Katz Centrality for the Automobile Network. \\\hspace {\textwidth } The ``Base" figure represents the distribution of the original network. \\\hspace {\textwidth } The Transitive Closure and Dominant Tree figures illustrate the distribution difference in node rankings after the base network underwent a transformation.}}{6}{}\protected@file@percent }
\newlabel{fig:car-katz}{{5}{6}}
\@writefile{lof}{\contentsline {figure}{\numberline {6}{\ignorespaces Importance Distribution for Adapted PageRank Centrality for the Automobile Network. \\\hspace {\textwidth } The ``Base" figure represents the distribution of the original network. \\\hspace {\textwidth } The Transitive Closure and Dominant Tree figures illustrate the distribution difference in node rankings after the base network underwent a transformation.}}{6}{}\protected@file@percent }
\newlabel{fig:car-pr}{{6}{6}}
\@writefile{lof}{\contentsline {figure}{\numberline {7}{\ignorespaces Importance Distribution for K-Path Edge Centrality for the Automobile Network. \\\hspace {\textwidth } The ``Base" figure represents the distribution of the original network. \\\hspace {\textwidth } The Transitive Closure and Dominant Tree figures illustrate the distribution difference in node rankings after the base network underwent a transformation.}}{6}{}\protected@file@percent }
\newlabel{fig:car-kpe}{{7}{6}}
\@writefile{lof}{\contentsline {figure}{\numberline {8}{\ignorespaces Importance Distribution for Betweenness Centrality for the Automobile Network. \\\hspace {\textwidth } The ``Base" figure represents the distribution of the original network. \\\hspace {\textwidth } The Transitive Closure and Dominant Tree figures illustrate the distribution difference in node rankings after the base network underwent a transformation.}}{7}{}\protected@file@percent }
\newlabel{fig:car-betweenness}{{8}{7}}
\@writefile{toc}{\contentsline {subsection}{\numberline {\mbox {VII-A}}Result Analysis}{7}{}\protected@file@percent }
\@writefile{toc}{\contentsline {section}{\numberline {VIII}Conclusions and Future Work}{7}{}\protected@file@percent }
\@writefile{toc}{\contentsline {subsection}{\numberline {\mbox {VIII-A}}Conclusions}{7}{}\protected@file@percent }
\citation{LI2018512}
\citation{MO2019121538}
\citation{sym11020284}
\citation{10.1093/bioinformatics/bty965}
\bibdata{Bibliography}
\bibcite{j_hale_compliance_nodate}{1}
\bibcite{baloyi_guidelines_2019}{2}
\bibcite{allman_complying_2006}{3}
\bibcite{newman2010networks}{4}
\bibcite{Mieghem2018DirectedGA}{5}
\bibcite{ZENITANI2023103081}{6}
\bibcite{Zeng2019SurveyOA}{7}
\bibcite{ming_diss}{8}
\bibcite{10.1145/3491257}{9}
\bibcite{Guo2017HermitianAM}{10}
\bibcite{Brualdi2010SpectraOD}{11}
\bibcite{noauthor_health_1996}{12}
\bibcite{PCI}{13}
\bibcite{PMID:30064421}{14}
\bibcite{Katz}{15}
\bibcite{ModKatz}{16}
\bibcite{K_Path_Edge}{17}
\bibcite{PageRank}{18}
\bibcite{Adapted_PageRank}{19}
\bibcite{li_combining_2019}{20}
\bibcite{zeng_cyber_2017}{21}
\bibcite{dominance}{22}
\bibcite{LI2018512}{23}
\bibcite{MO2019121538}{24}
\bibcite{sym11020284}{25}
\bibcite{10.1093/bioinformatics/bty965}{26}
\bibstyle{ieeetr}
\@writefile{toc}{\contentsline {subsection}{\numberline {\mbox {VIII-B}}Future Work}{8}{}\protected@file@percent }
\@writefile{toc}{\contentsline {section}{Bibliography}{8}{}\protected@file@percent }
\@writefile{toc}{\contentsline {section}{References}{8}{}\protected@file@percent }
\gdef \@abspage@last{8}