Formatting and removing Chapter references
This commit is contained in:
parent
9b4d389297
commit
7c792b19e7
@ -3,9 +3,10 @@
|
||||
\usepackage{graphicx} % Images
|
||||
\graphicspath{ {./images/} }
|
||||
|
||||
\usepackage{float} % Table captions on top
|
||||
\floatstyle{plaintop}
|
||||
\restylefloat{table}
|
||||
\setcounter{secnumdepth}{3}
|
||||
|
||||
\usepackage{caption}
|
||||
\captionsetup[table]{skip=10pt}
|
||||
|
||||
\usepackage{ifpdf} % Detect PDF or DVI mode
|
||||
\usepackage{babel} % Bibliography
|
||||
@ -76,6 +77,7 @@ A single-strain approach was originally used for analyzing the compliance and vi
|
||||
Various works have been presented for a multi-strain epidemiology model. Specifically to computer and information systems, the authors of \cite{9593147} present a S$I_1$$I_2$SD model (Susceptible, Infected-with-Strain-1, Infected-with-Strain-2, Susceptible, Deceased) for modeling malware over Internet of Things Wireless Sensor Networks. This model is able to capture two different strains of malware that each have a dependency on the other. However, for compliance graph analysis, there can, and likely will, be a greater number of violations present. As a result, limiting an epidemiology model to two strains is not fully realistic. The authors of \cite{Lou2021} constructed a multi-strain PDE-SIS (Partial Differential Equation Susceptible - Infected - Susceptible) model that resembles the following and is capable of modeling multiple strains:\\
|
||||
|
||||
\begin{math}
|
||||
\footnotesize
|
||||
\begin{aligned}
|
||||
{\left\{ \begin{array}{ll}
|
||||
\partial _tS=d_\mathrm{S}\Delta S +\sum _{i=1}^k\gamma _i(x)I_i -\frac{S\sum _{i=1}^k\beta _i(x)I_i}{S+\sum _{j=1}^k I_j} &{} x\in \Omega , \ t>0,\\
|
||||
@ -109,34 +111,34 @@ For initial investigation and testing purposes, the selected epidemiology model
|
||||
\begin{table}[]
|
||||
\scriptsize
|
||||
\centering
|
||||
\caption[Compartment Descriptors for Compliance Graphs]{Compartment Descriptors for Compliance Graphs. Each compartment is contextualized to compliance graphs, with their meanings and brief explanations of how nodes may fit in compartments.}
|
||||
\begin{tabular}{|c|c|c|}
|
||||
\hline
|
||||
\textbf{Compartment} & \textbf{Description} & \textbf{Contextualization to Compliance Graphs} \\ \hline
|
||||
\textbf{Compartment} & \textbf{Description} & \textbf{\begin{tabular}[c]{@{}c@{}}Contextualization \\ to Compliance Graphs\end{tabular}} \\ \hline
|
||||
S & Susceptible & All other nodes. \\ \hline
|
||||
E & Exposed & \begin{tabular}[c]{@{}c@{}}Nodes flagged as at risk of compliance violation \\ by an IDS, timeframe trigger, or other.\end{tabular} \\ \hline
|
||||
E & Exposed & \begin{tabular}[c]{@{}c@{}}Nodes flagged as at risk of compliance \\ violation by an IDS, timeframe trigger,\\ or other.\end{tabular} \\ \hline
|
||||
I & Infected & Nodes that are in violation. \\ \hline
|
||||
R & Recovered & \begin{tabular}[c]{@{}c@{}}Nodes that were infected and were capable\\ of automatic correction e.g., certificate renewal, \\ scheduled maintenance, or other.\end{tabular} \\ \hline
|
||||
D & Deceased & \begin{tabular}[c]{@{}c@{}}Nodes removed from the compliance graph;\\ Systems that were removed from the network through \\ quarantine, DMZ, legacy removal, or other \\due to excess risk.\end{tabular} \\ \hline
|
||||
R & Recovered & \begin{tabular}[c]{@{}c@{}}Nodes that were infected and were\\ capable of automatic correction e.g., \\ certificate renewal, scheduled maintenance,\\ or other.\end{tabular} \\ \hline
|
||||
D & Deceased & \begin{tabular}[c]{@{}c@{}}Nodes removed from the compliance graph;\\ Systems that were removed from the \\ network through quarantine, DMZ, \\ legacy removal, or other due to \\ excess risk.\end{tabular} \\ \hline
|
||||
\end{tabular}
|
||||
\caption[Compartment Descriptors for Compliance Graphs]{Compartment Descriptors for Compliance Graphs. Each compartment is contextualized to compliance graphs, with their meanings and brief explanations of how nodes may fit in compartments.}
|
||||
\label{table:model-context}
|
||||
\end{table}
|
||||
|
||||
\begin{table}[]
|
||||
\scriptsize
|
||||
\centering
|
||||
\caption[Parameter Descriptors for Compliance Graphs]{Parameter Descriptors for Compliance Graphs. Each parameter is contextualized to compliance graphs, with their meanings and brief explanations of how node relationships affect the parameters.}
|
||||
\begin{tabular}{|c|c|c|}
|
||||
\hline
|
||||
\textbf{Parameter} & \textbf{Description} & \textbf{Contextualization to Compliance Graphs} \\ \hline
|
||||
\textbf{Parameter} & \textbf{Description} & \textbf{\begin{tabular}[c]{@{}c@{}}Contextualization \\ to Compliance Graphs\end{tabular}} \\ \hline
|
||||
$\beta$ & Infection Rate & \begin{tabular}[c]{@{}c@{}}Probability of nodes falling out\\ of compliance.\end{tabular} \\ \hline
|
||||
$\delta$ & Incubation Period & \begin{tabular}[c]{@{}c@{}}Once a node is at risk of falling out\\ of compliance, how long it takes to actually\\ violate a mandate or regulation.\end{tabular} \\ \hline
|
||||
$\delta$ & Incubation Period & \begin{tabular}[c]{@{}c@{}}Once a node is at risk of falling out\\ of compliance, how long it takes to \\ actually violate a mandate or \\ regulation.\end{tabular} \\ \hline
|
||||
$\gamma_{R}$ & Recovery Rate & \begin{tabular}[c]{@{}c@{}}Probability of a system to correct\\ its violation status.\end{tabular} \\ \hline
|
||||
$\gamma_{D}$ & Death Rate & \begin{tabular}[c]{@{}c@{}}Probability of removal for a system \\ in violation.\end{tabular} \\ \hline
|
||||
$\mu$ & Fatality Ratio & \begin{tabular}[c]{@{}c@{}}Natural rate at which any node may \\ be removed from the network.\end{tabular} \\ \hline
|
||||
$\epsilon$ & Infected Import Rate & \begin{tabular}[c]{@{}c@{}}Systems that are already in violation;\\ systems that do not fall out of compliance,\\ but are already violating a mandate.\end{tabular} \\ \hline
|
||||
$\epsilon$ & Infected Import Rate & \begin{tabular}[c]{@{}c@{}}Systems that are already in violation;\\ systems that do not fall out of \\compliance, but are already violating \\ a mandate.\end{tabular} \\ \hline
|
||||
$\omega$ & Waning Immunity Rate & \begin{tabular}[c]{@{}c@{}}After a system recovers, how long\\ for it to be available for violation.\end{tabular} \\ \hline
|
||||
\end{tabular}
|
||||
\caption[Parameter Descriptors for Compliance Graphs]{Parameter Descriptors for Compliance Graphs. Each parameter is contextualized to compliance graphs, with their meanings and brief explanations of how node relationships affect the parameters.}
|
||||
\label{table:model-params}
|
||||
\end{table}
|
||||
|
||||
@ -164,8 +166,9 @@ For initial investigation and testing purposes, the selected epidemiology model
|
||||
Converting the single-strain model to function as a multi-strain model requires minimal additional modeling efforts. Rather than using a single SEIRDS model for all violations, each violation is instead represented by a SEIRDS model. In an environment where there are \textit{n} violations, there are \textit{n} SEIRDS models. This is represented in Table \ref{table:multi-strain-context}, which adds an indexing term to allow for multiple violations to be represented in the SEIRDS model.
|
||||
|
||||
\begin{table}[]
|
||||
\scriptsize
|
||||
\small
|
||||
\centering
|
||||
\caption[Multi-Strain Variable Descriptors for Compliance Graphs]{Multi-Strain Variable Descriptors for Compliance Graphs. Each variable from the single-strain model can be represented with an indicator of \textit{n} to denote which SEIRDS violation model the data falls into.}
|
||||
\begin{tabular}{|c|c|c|}
|
||||
\hline
|
||||
\textbf{Model Variable} & \textbf{Description} \\ \hline
|
||||
@ -182,7 +185,6 @@ Converting the single-strain model to function as a multi-strain model requires
|
||||
$\epsilon_{n}$ & Infected Import Rate for Violation \textit{n} \\ \hline
|
||||
$\omega_{n}$ & Waning Immunity Rate for Violation \textit{n} \\ \hline
|
||||
\end{tabular}
|
||||
\caption[Multi-Strain Variable Descriptors for Compliance Graphs]{Multi-Strain Variable Descriptors for Compliance Graphs. Each variable from the single-strain model can be represented with an indicator of \textit{n} to denote which SEIRDS violation model the data falls into.}
|
||||
\label{table:multi-strain-context}
|
||||
\end{table}
|
||||
|
||||
@ -204,10 +206,13 @@ This work made use of both Python and R to support the epidemiology modeling. Th
|
||||
\end{gathered}
|
||||
\end{equation}
|
||||
|
||||
For the example networks presented in Chapter \ref{ch:example-networks}, certain model parameters are statically defined. For instance, in Equation \ref{eq:param-defs} both \(\delta\) and \(\omega\) are set to 1. As Table \ref{table:multi-strain-context} specifies, \(\delta\) is the incubation period, which defines the incubation period, or how many compliance graph steps (edges) are required before a node can be classified as infected. In a compliance graph format, and specifically for the example networks presented in Chapter \ref{ch:example-networks}, there will always be exactly 1-edge delays between the labeling of an infection and the classification of an infection. Since the edges in a compliance graph are used as the transitionary elements that lead to a change in a system, for node $B$ to be classified as infected, there must be at least one edge between node $A$ and node $B$ for the infected classification to occur. This is also the case for the waning immunity rate, \(\omega\). Since there must be at least one edge to transition a node from a recovered state to a susceptible state, the waning immunity rate is also set to a static value of 1.
|
||||
This work used the compliance graphs generated from the work presented by the authors of \cite{data}. These example graphs are publicly available and serve as foundational test cases for experimental work. Since these example graphs are generated across multiple industries and have unique properties, it allows for a more thorough investigation and analysis of this work. For these example networks, certain model parameters are statically defined. For instance, in Equation \ref{eq:param-defs} both \(\delta\) and \(\omega\) are set to 1. As Table \ref{table:multi-strain-context} specifies, \(\delta\) is the incubation period, which defines the incubation period, or how many compliance graph steps (edges) are required before a node can be classified as infected. In a compliance graph format, and specifically for the example networks presented in the work of \cite{data}, there will always be exactly 1-edge delays between the labeling of an infection and the classification of an infection. Since the edges in a compliance graph are used as the transitionary elements that lead to a change in a system, for node $B$ to be classified as infected, there must be at least one edge between node $A$ and node $B$ for the infected classification to occur. This is also the case for the waning immunity rate, \(\omega\). Since there must be at least one edge to transition a node from a recovered state to a susceptible state, the waning immunity rate is also set to a static value of 1.
|
||||
|
||||
\IncMargin{1em}
|
||||
\begin{algorithm}[htbp] \label{alg:ep-compart}
|
||||
\begin{algorithm}[htbp]
|
||||
\caption{SEIRDS Model compartmentalization and Parameter Derivation}
|
||||
\label{alg:ep-compart}
|
||||
|
||||
\SetKwData{Left}{left}
|
||||
\SetKwData{This}{this}
|
||||
\SetKwData{Up}{up}
|
||||
@ -243,19 +248,20 @@ For the example networks presented in Chapter \ref{ch:example-networks}, certain
|
||||
{do set $violation$[parameters] = Equation \ref{eq:param-defs}}
|
||||
}
|
||||
|
||||
\caption{SEIRDS Model compartmentalization and Parameter Derivation}
|
||||
\end{algorithm}
|
||||
|
||||
In order to better capture the recurring maintenance events, the recovery parameters can be adjusted based on a periodic function. This function can be adjusted per component and/or per mitigation strategy, and is intended to be interchanged with ease. For this work, the recovery parameters were altered to fit a cosine function. Cosine was chosen in order for the recover parameter minimum to be placed at the final known time step (t=0). A sine function with appropriate shifts could also be used, however a cosine function was used for simplicity. A few adjustments are required. To set the period of the cosine function, the default period (2$\pi$) is divided by the recurring maintenance event's time step of occurrence. Since the recovery rate must be a value between 0 and 1, a piecewise function is defined for the magnitude, where $y=max(0,cosx) \forall {x>0}$. The amplitude of the function was defined by the derived parameter from Algorithm \ref{alg:ep-compart}. This is shown in Equation \ref{eq:recovery-param}.
|
||||
|
||||
\begin{equation}
|
||||
\begin{gathered}
|
||||
\gamma_{r} = \gamma_{r, derived} * \max(0,cosine(\frac{2*\pi*t}{RecurringMaintenanceTimeStep}))
|
||||
\small
|
||||
\begin{split}
|
||||
\gamma_{r} &= \gamma_{r, derived} * \\
|
||||
&\max(0,cosine(\frac{2*\pi*t}{RecurringMaintenanceTimeStep}))
|
||||
\label{eq:recovery-param}
|
||||
\end{gathered}
|
||||
\end{split}
|
||||
\end{equation}
|
||||
|
||||
For accurately capturing the pre-defined events presented in Chapter \ref{ch:example-networks}, the infection rate parameters are also designed to be dynamic. Due to the degradation of parts, health, or quality of the asset over time, the infection parameter is expected to steadily increase. The pre-defined events can be used as a baseline for increasing the infection rate to support this functionality. For instance, for the automobile maintenance network, the drive belts have a pre-defined event at time step 3 where a replacement or inspection is required. A function can be defined that increases the infection rate of the drive belt violation as the component reaches its replacement or inspection lifespan. When data is available for the lifespan of a given component, an infection rate parameter increase could model the behavior of $\lim_{t \to expectedPartLifeSpan} f(t) = 1 $. For components with pre-defined events, the ``expectedPartLifeSpan" can be obtained by identifying the event time of the part failure, repair, or replacement. For components without a pre-defined event, identifying the ``expectedPartLifeSpan" would require additional data for each component represented in the compliance graph. As previously stated, this work intends to be self-contained and independent of likelihood estimations. Though tire replacement data may be readily available, identifying the likelihood of forcibly decrypting a database (or the point of its occurrence) requires transitional estimation that is outside of this work. Instead, this work made a simplification of $ \lim_{t \to \infty} f(t) = 1 $ when the component lifespan data was unavailable.
|
||||
For accurately capturing the pre-defined events presented in the compliance graphs of \cite{data}, the infection rate parameters are also designed to be dynamic. Due to the degradation of parts, health, or quality of the asset over time, the infection parameter is expected to steadily increase. The pre-defined events can be used as a baseline for increasing the infection rate to support this functionality. For instance, for the automobile maintenance network, the drive belts have a pre-defined event at time step 3 where a replacement or inspection is required. A function can be defined that increases the infection rate of the drive belt violation as the component reaches its replacement or inspection lifespan. When data is available for the lifespan of a given component, an infection rate parameter increase could model the behavior of $\lim_{t \to expectedPartLifeSpan} f(t) = 1 $. For components with pre-defined events, the ``expectedPartLifeSpan" can be obtained by identifying the event time of the part failure, repair, or replacement. For components without a pre-defined event, identifying the ``expectedPartLifeSpan" would require additional data for each component represented in the compliance graph. As previously stated, this work intends to be self-contained and independent of likelihood estimations. Though tire replacement data may be readily available, identifying the likelihood of forcibly decrypting a database (or the point of its occurrence) requires transitional estimation that is outside of this work. Instead, this work made a simplification of $ \lim_{t \to \infty} f(t) = 1 $ when the component lifespan data was unavailable.
|
||||
|
||||
This work intended for $f(t)$ to be fully replaceable. Better cost models can replace the $f(t)$ functions to better fit to the expected changes in infection parameters. Rather than identifying unique $f(t)$ functions for each component, this work implemented two functions. When the expected component lifespan was known, Equation \ref{eq:known_ft} was used as the $f(t)$ function. When the expected component lifespan was not known, Equation \ref{eq:unknown_ft} was used as the $f(t)$ function. Equation \ref{eq:known_ft} was intended to be simplistic. Due to the exponential function, the limit approaches 1 as the component reaches its lifespan. There is a shift in the function for axis alignment, but no other modifications are implemented. This function does have a quick rise toward 1, so future adjustments to its gain may be necessary. For Equation \ref{eq:unknown_ft}, more attention was given to its rise. Since the component has an unknown life span, a gradual increase toward 1 at $t=\infty$ may be unrealistic. Likewise, a rapid gain toward 1 in the first few time steps may also be unrealistic. This function was chosen and tuned to allow for a rise toward a infection rate parameter value of 1 near 30 time steps. Since time steps are variable based on the step size selection in the network generation process, this function can be tuned to better fit specific components or networks. Figure \ref{fig:unknown-infec-rate} displays a plot of this function. After a mitigation or correction scheme is implemented for a component, the infection rate is reset to its original, derived value.
|
||||
|
||||
@ -285,7 +291,9 @@ This work intended for $f(t)$ to be fully replaceable. Better cost models can re
|
||||
After the Python model preparation was called with the Reticulate library \cite{reticulate} (which acts as an interface between R and Python), R code was used to evaluate the problem space using a differential equation solver. The implemented solver was ODE45, provided by the pracma library \cite{pracma}. Equation \ref{eq:seirds} was defined as a function in R, with inputs of model parameters and model compartments. This function was called through ODE45 over a specified range of time, and would produce an output of epidemic curves. Unless otherwise specified, the epidemic curves would be generated starting with time = ``0" (the last known step of the compliance graph), and would evaluate data for the next 5 years. Since this work is approaching the compliance graph through a multi-strain lens, the differential equation solver was applied over each violation. As a result, epidemic curves were produced for each violation that provided insight on the violation trends over time. This process is displayed in Algorithm \ref{alg:ep-process}.
|
||||
|
||||
\IncMargin{1em}
|
||||
\begin{algorithm}[htbp] \label{alg:ep-process}
|
||||
\begin{algorithm}[htbp]
|
||||
\caption{Producing Epidemic Curves for all Possible Violations in a Compliance Graph}
|
||||
\label{alg:ep-process}
|
||||
\SetKwData{Left}{left}
|
||||
\SetKwData{This}{this}
|
||||
\SetKwData{Up}{up}
|
||||
@ -318,7 +326,6 @@ After the Python model preparation was called with the Reticulate library \cite{
|
||||
{do plot vioOut;}
|
||||
}
|
||||
|
||||
\caption{Producing Epidemic Curves for all Possible Violations in a Compliance Graph}
|
||||
\end{algorithm}
|
||||
|
||||
\subsection{Results and Analysis} \label{sec:ep-res}
|
||||
@ -342,7 +349,7 @@ Some Figures also displayed results with no changes in compartment trends. Figur
|
||||
\centering
|
||||
\vspace{.2truein} \centerline{}
|
||||
\caption[Epidemic Curve for the Automobile Maintenance Network's Drive Belt Violation]{Epidemic Curve for the Automobile Maintenance Network's Drive Belt Violation.
|
||||
This epidemic curve highlights the effectiveness of the routine maintenance for the automobile maintenance network, evident through the regular decreases in the Infected compartments of the SEIRDS epidemiology model. These maintenance events take place every 1 year and 6 months, and successfully correct the vehicle to a state of compliance with respect to the drive belt violations. However, there is a steady increase of violation (the population of I) due to the increased infection rate parameter caused by the pre-defined events presented in Chapter \ref{ch:example-networks}. This Figure also displays the effectiveness at preventing the spread of a drive belt violation. If the Infected population rose to 1.0, then every node in a compliance graph or subgraph would be expected to posses that violation. Since the Infected population remains below 10\%, the mitigation strategy can be considered effective at correcting the drive belt violation before it spreads through the compliance graph or subgraph.}
|
||||
This epidemic curve highlights the effectiveness of the routine maintenance for the automobile maintenance network, evident through the regular decreases in the Infected compartments of the SEIRDS epidemiology model. These maintenance events take place every 1 year and 6 months, and successfully correct the vehicle to a state of compliance with respect to the drive belt violations. However, there is a steady increase of violation (the population of I) due to the increased infection rate parameter caused by the pre-defined events presented in the compliance graphs of \cite{data}. This Figure also displays the effectiveness at preventing the spread of a drive belt violation. If the Infected population rose to 1.0, then every node in a compliance graph or subgraph would be expected to posses that violation. Since the Infected population remains below 10\%, the mitigation strategy can be considered effective at correcting the drive belt violation before it spreads through the compliance graph or subgraph.}
|
||||
\label{fig:car-ep-drivebelt}
|
||||
\end{figure}
|
||||
|
||||
@ -393,9 +400,10 @@ In order to validate the epidemiology modeling approach, the following character
|
||||
Epidemiology modeling successfully provides insight on the predicted trends and behaviors of compliance violations over time. These trends are useful for identifying the utility of any correction schemes, for future mitigation planning, or for determining which periods of time may require additional attention to prevent noncompliance. However, for presenting quantitative metrics to advisory boards, upper level staff, or management, alternative figures may yield better results, especially when requesting increases in funding. One common method for determining a quantitative metric with respect to expected or predicted challenges is risk assessment. Risk assessment allows for further insight regarding potential risks, damages, or losses, and considers any mitigations, likelihood of occurrences, and can provide information on fault-tolerance in the instance of a risk event \cite{RA}. This Section discusses the risk assessment strategies that are implemented for compliance graph analysis in Section \ref{sec:ra-imp}, with results presented in Section \ref{sec:ra-res}.
|
||||
|
||||
\subsection{Implementation Details} \label{sec:ra-imp}
|
||||
A primary motivator for this work is to provide analysis on compliance graphs that is independent of (but compatible with) any external probability or state transition estimations. As Chapters \ref{ch:Intro}, \ref{ch:rel-works}, and \ref{ch:example-networks} discuss, though works exist for determining transitions of nodes and edges through Markov Decision Processes, empirical analysis, or investigations of the National Vulnerability Database (NVD) and Common Vulnerabilities and Exposures (CVE) list, this work aimed to stay as self-contained and self-sufficient as possible. In order to achieve this, this work presents a modification to Annualized Loss Expectancy (ALE) computations. Equation \ref{eq:ALE} displays the traditional approach for computing ALE.
|
||||
A primary motivator for this work is to provide analysis on compliance graphs that is independent of (but compatible with) any external probability or state transition estimations. Though works exist for determining transitions of nodes and edges through Markov Decision Processes, empirical analysis, or investigations of the National Vulnerability Database (NVD) and Common Vulnerabilities and Exposures (CVE) list, this work aimed to stay as self-contained and self-sufficient as possible. In order to achieve this, this work presents a modification to Annualized Loss Expectancy (ALE) computations. Equation \ref{eq:ALE} displays the traditional approach for computing ALE.
|
||||
|
||||
\begin{equation}
|
||||
\tiny
|
||||
\begin{gathered}
|
||||
ALE = Annual Rate of Occurrence * Single Loss Expectancy, \quad where: \\
|
||||
Single Loss Expectancy = Asset Value * Exposure Factor
|
||||
@ -423,7 +431,7 @@ Using the modified ALE equation, a process can be defined for obtaining necessar
|
||||
\end{figure}
|
||||
|
||||
\subsection{Results and Analysis} \label{sec:ra-res}
|
||||
For each example network presented in Chapter \ref{ch:example-networks}, ALE was computed for all possible violations. To display the results, bar graphs were used to highlight the magnitudes of expected losses incurred from an event of noncompliance. This display allows for a simplistic view of violations that are expected to yield unfavorable penalties, as well as those that may yield little to no penalties. The bar graphs were plotted in terms of both monetary and time penalties. Figures \ref{fig:car-ale-mon} and \ref{fig:car-ale-t} present the results for the Automobile Maintenance Network (Section \ref{sec:Automotive}) for its monetary and time expected losses, respectively. Figures \ref{fig:hip-ale-mon} and \ref{fig:hip-ale-t} present the results for the HIPAA Network (Section \ref{sec:Healthcare}) for its monetary and time expected losses, respectively. Figures \ref{fig:osha-ale-mon} and \ref{fig:osha-ale-t} present the results for the OSHA 1910H Network (Section \ref{sec:OSHA}) for its monetary and time expected losses, respectively.
|
||||
For each example network presented in \cite{data}, ALE was computed for all possible violations. To display the results, bar graphs were used to highlight the magnitudes of expected losses incurred from an event of noncompliance. This display allows for a simplistic view of violations that are expected to yield unfavorable penalties, as well as those that may yield little to no penalties. The bar graphs were plotted in terms of both monetary and time penalties. Figures \ref{fig:car-ale-mon} and \ref{fig:car-ale-t} present the results for the Automobile Maintenance Network for its monetary and time expected losses, respectively. Figures \ref{fig:hip-ale-mon} and \ref{fig:hip-ale-t} present the results for the HIPAA Network for its monetary and time expected losses, respectively. Figures \ref{fig:osha-ale-mon} and \ref{fig:osha-ale-t} present the results for the OSHA 1910H Network for its monetary and time expected losses, respectively.
|
||||
|
||||
\begin{figure}[htp]
|
||||
\includegraphics[width=\linewidth]{"./images/car-ale-mon.png"}
|
||||
@ -498,7 +506,7 @@ In order to validate ALE, the following characteristics were examined, and test
|
||||
\section{Future Works}
|
||||
|
||||
\section{Conclusions}
|
||||
This work presented and implemented a SEIRDS epidemiology model used for analyzing the trends (and expected trends) of a compliance graph. This model is able to compartmentalize a compliance graph into five unique and related sets of populations. This model also functions with a variety of tunable, customizable parameters that assist in the analysis of the spread of violations in an environment. These parameters are intended to be used alongside any user-provided data, such as the maintenance or replacement schedules or the expected lifespans of components. Each example compliance graph presented in Chapter \ref{ch:example-networks} was analyzed using this model. The results were validated as part of the validation process shown in Section \ref{sec:ep-valid}. The results presented in Section \ref{sec:ep-res} display notable visualizations about the analysis process. The methodology of this work is able to uncover valuable information regarding the compliance standing of an environment, such as the effectiveness of any mitigation, correction, or prevention strategies, and the exposure to and spread of violations. Additionally, this work allows for the testing and experimentation of mitigation strategies to provide quantifiable results as to the successes or failures of any alterations, removals, or additions toward maintaining compliance. This approach is shown to be successful in all three unique example compliance graphs, and boasts the ability to be modified or fine-tuned given additional data inputs.
|
||||
This work presented and implemented a SEIRDS epidemiology model used for analyzing the trends (and expected trends) of a compliance graph. This model is able to compartmentalize a compliance graph into five unique and related sets of populations. This model also functions with a variety of tunable, customizable parameters that assist in the analysis of the spread of violations in an environment. These parameters are intended to be used alongside any user-provided data, such as the maintenance or replacement schedules or the expected lifespans of components. Each example compliance graph presented in \cite{data} was analyzed using this model. The results were validated as part of the validation process shown in Section \ref{sec:ep-valid}. The results presented in Section \ref{sec:ep-res} display notable visualizations about the analysis process. The methodology of this work is able to uncover valuable information regarding the compliance standing of an environment, such as the effectiveness of any mitigation, correction, or prevention strategies, and the exposure to and spread of violations. Additionally, this work allows for the testing and experimentation of mitigation strategies to provide quantifiable results as to the successes or failures of any alterations, removals, or additions toward maintaining compliance. This approach is shown to be successful in all three unique example compliance graphs, and boasts the ability to be modified or fine-tuned given additional data inputs.
|
||||
|
||||
In addition, this work presented an approach for risk assessment through a modified Annualized Loss Expectancy (ALE) computation. This technique allows for analysis on a complex environment without the need for estimation regarding rate of occurrence that may otherwise be difficult or impossible to obtain. The results as shown in Section \ref{sec:ra-res} were presented in the form of bar graphs that display the expected losses for each resource across all examined violations. The results were validated as part of the validation process shown in Section \ref{sec:ale-valid}, and demonstrate that this approach is functional even when no noncompliance instances are observed.
|
||||
|
||||
|
||||
@ -28,8 +28,8 @@
|
||||
\newlabel{sec:Model-Choice}{{\mbox {III-A}}{2}{}{}{}}
|
||||
\@writefile{toc}{\contentsline {subsection}{\numberline {\mbox {III-B}}SEIRDS Model}{2}{}\protected@file@percent }
|
||||
\newlabel{sec:SEIRDS-model}{{\mbox {III-B}}{2}{}{}{}}
|
||||
\citation{NetworkX}
|
||||
\@writefile{lot}{\contentsline {table}{\numberline {I}{\ignorespaces Compartment Descriptors for Compliance Graphs}}{3}{}\protected@file@percent }
|
||||
\providecommand*\caption@xref[2]{\@setref\relax\@undefined{#1}}
|
||||
\newlabel{table:model-context}{{I}{3}{}{}{}}
|
||||
\@writefile{lot}{\contentsline {table}{\numberline {II}{\ignorespaces Parameter Descriptors for Compliance Graphs}}{3}{}\protected@file@percent }
|
||||
\newlabel{table:model-params}{{II}{3}{}{}{}}
|
||||
@ -40,62 +40,72 @@
|
||||
\newlabel{table:multi-strain-context}{{III}{3}{}{}{}}
|
||||
\@writefile{toc}{\contentsline {subsection}{\numberline {\mbox {III-C}}Implementation Details}{3}{}\protected@file@percent }
|
||||
\newlabel{sec:ep-model-simplify}{{\mbox {III-C}}{3}{}{}{}}
|
||||
\citation{NetworkX}
|
||||
\citation{data}
|
||||
\citation{data}
|
||||
\newlabel{eq:param-defs}{{2}{4}{}{}{}}
|
||||
\newlabel{alg:ep-compart}{{1}{4}{}{}{}}
|
||||
\@writefile{loa}{\contentsline {algocf}{\numberline {1}{\ignorespaces SEIRDS Model compartmentalization and Parameter Derivation}}{4}{}\protected@file@percent }
|
||||
\newlabel{eq:recovery-param}{{3}{4}{}{}{}}
|
||||
\newlabel{alg:ep-compart}{{1}{4}{}{}{}}
|
||||
\citation{data}
|
||||
\citation{reticulate}
|
||||
\citation{pracma}
|
||||
\newlabel{eq:recovery-param}{{3}{5}{}{}{}}
|
||||
\newlabel{eq:known_ft}{{4}{5}{}{}{}}
|
||||
\newlabel{eq:unknown_ft}{{5}{5}{}{}{}}
|
||||
\@writefile{lof}{\contentsline {figure}{\numberline {2}{\ignorespaces Infection Rate Parameter as a Function of Time for Components with an Unknown Lifespan}}{5}{}\protected@file@percent }
|
||||
\newlabel{fig:unknown-infec-rate}{{2}{5}{}{}{}}
|
||||
\@writefile{toc}{\contentsline {subsection}{\numberline {\mbox {III-D}}Results and Analysis}{5}{}\protected@file@percent }
|
||||
\newlabel{sec:ep-res}{{\mbox {III-D}}{5}{}{}{}}
|
||||
\newlabel{alg:ep-process}{{2}{6}{}{}{}}
|
||||
\citation{data}
|
||||
\citation{data}
|
||||
\@writefile{loa}{\contentsline {algocf}{\numberline {2}{\ignorespaces Producing Epidemic Curves for all Possible Violations in a Compliance Graph}}{6}{}\protected@file@percent }
|
||||
\@writefile{lof}{\contentsline {figure}{\numberline {3}{\ignorespaces Epidemic Curve for the Automobile Maintenance Network's Oil Change Violation}}{6}{}\protected@file@percent }
|
||||
\newlabel{fig:car-ep-oil}{{3}{6}{}{}{}}
|
||||
\newlabel{alg:ep-process}{{2}{6}{}{}{}}
|
||||
\@writefile{toc}{\contentsline {subsection}{\numberline {\mbox {III-D}}Results and Analysis}{6}{}\protected@file@percent }
|
||||
\newlabel{sec:ep-res}{{\mbox {III-D}}{6}{}{}{}}
|
||||
\@writefile{toc}{\contentsline {subsection}{\numberline {\mbox {III-E}}Validation}{6}{}\protected@file@percent }
|
||||
\newlabel{sec:ep-valid}{{\mbox {III-E}}{6}{}{}{}}
|
||||
\citation{RA}
|
||||
\@writefile{lof}{\contentsline {figure}{\numberline {3}{\ignorespaces Epidemic Curve for the Automobile Maintenance Network's Oil Change Violation}}{7}{}\protected@file@percent }
|
||||
\newlabel{fig:car-ep-oil}{{3}{7}{}{}{}}
|
||||
\@writefile{lof}{\contentsline {figure}{\numberline {4}{\ignorespaces Epidemic Curve for the Automobile Maintenance Network's Drive Belt Violation}}{7}{}\protected@file@percent }
|
||||
\newlabel{fig:car-ep-drivebelt}{{4}{7}{}{}{}}
|
||||
\@writefile{lof}{\contentsline {figure}{\numberline {5}{\ignorespaces Epidemic Curve for the HIPAA Network's Security Assessment Violation}}{7}{}\protected@file@percent }
|
||||
\newlabel{fig:hip-ep-bad}{{5}{7}{}{}{}}
|
||||
\@writefile{lof}{\contentsline {figure}{\numberline {6}{\ignorespaces Epidemic Curve for the OSHA 1910H Network's Violation}}{7}{}\protected@file@percent }
|
||||
\newlabel{fig:osha_end_maint}{{6}{7}{}{}{}}
|
||||
\@writefile{lof}{\contentsline {figure}{\numberline {7}{\ignorespaces Epidemic Curve for the OSHA 1910H Network's Inventory Violation}}{7}{}\protected@file@percent }
|
||||
\newlabel{fig:osha-ep-nothing}{{7}{7}{}{}{}}
|
||||
\citation{RA}
|
||||
\@writefile{toc}{\contentsline {section}{\numberline {IV}Risk Assessment}{8}{}\protected@file@percent }
|
||||
\newlabel{sec:risk-assessment}{{IV}{8}{}{}{}}
|
||||
\@writefile{toc}{\contentsline {section}{\numberline {IV}Risk Assessment}{7}{}\protected@file@percent }
|
||||
\newlabel{sec:risk-assessment}{{IV}{7}{}{}{}}
|
||||
\@writefile{lof}{\contentsline {figure}{\numberline {5}{\ignorespaces Epidemic Curve for the HIPAA Network's Security Assessment Violation}}{8}{}\protected@file@percent }
|
||||
\newlabel{fig:hip-ep-bad}{{5}{8}{}{}{}}
|
||||
\@writefile{toc}{\contentsline {subsection}{\numberline {\mbox {IV-A}}Implementation Details}{8}{}\protected@file@percent }
|
||||
\newlabel{sec:ra-imp}{{\mbox {IV-A}}{8}{}{}{}}
|
||||
\newlabel{eq:ALE}{{6}{8}{}{}{}}
|
||||
\newlabel{eq:aro-beta}{{7}{8}{}{}{}}
|
||||
\@writefile{toc}{\contentsline {subsection}{\numberline {\mbox {IV-B}}Results and Analysis}{8}{}\protected@file@percent }
|
||||
\newlabel{sec:ra-res}{{\mbox {IV-B}}{8}{}{}{}}
|
||||
\@writefile{lof}{\contentsline {figure}{\numberline {6}{\ignorespaces Epidemic Curve for the OSHA 1910H Network's Violation}}{8}{}\protected@file@percent }
|
||||
\newlabel{fig:osha_end_maint}{{6}{8}{}{}{}}
|
||||
\@writefile{lof}{\contentsline {figure}{\numberline {7}{\ignorespaces Epidemic Curve for the OSHA 1910H Network's Inventory Violation}}{8}{}\protected@file@percent }
|
||||
\newlabel{fig:osha-ep-nothing}{{7}{8}{}{}{}}
|
||||
\citation{data}
|
||||
\newlabel{eq:aro-beta}{{7}{9}{}{}{}}
|
||||
\@writefile{lof}{\contentsline {figure}{\numberline {8}{\ignorespaces Risk Assessment Using Epidemiology Modeling}}{9}{}\protected@file@percent }
|
||||
\newlabel{fig:obj1}{{8}{9}{}{}{}}
|
||||
\@writefile{toc}{\contentsline {subsection}{\numberline {\mbox {IV-B}}Results and Analysis}{9}{}\protected@file@percent }
|
||||
\newlabel{sec:ra-res}{{\mbox {IV-B}}{9}{}{}{}}
|
||||
\@writefile{lof}{\contentsline {figure}{\numberline {9}{\ignorespaces Annualized Monetary Loss Expectancies for the Automobile Maintenance Network}}{9}{}\protected@file@percent }
|
||||
\newlabel{fig:car-ale-mon}{{9}{9}{}{}{}}
|
||||
\@writefile{lof}{\contentsline {figure}{\numberline {10}{\ignorespaces Annualized Time Loss Expectancies for the Automobile Maintenance Network}}{9}{}\protected@file@percent }
|
||||
\newlabel{fig:car-ale-t}{{10}{9}{}{}{}}
|
||||
\@writefile{lof}{\contentsline {figure}{\numberline {11}{\ignorespaces Annualized Monetary Loss Expectancies for the HIPAA Network}}{9}{}\protected@file@percent }
|
||||
\newlabel{fig:hip-ale-mon}{{11}{9}{}{}{}}
|
||||
\@writefile{lof}{\contentsline {figure}{\numberline {12}{\ignorespaces Annualized Time Loss Expectancies for the HIPAA Network}}{10}{}\protected@file@percent }
|
||||
\newlabel{fig:hip-ale-t}{{12}{10}{}{}{}}
|
||||
\@writefile{lof}{\contentsline {figure}{\numberline {13}{\ignorespaces Annualized Monetary Loss Expectancies for the OSHA 1910H Network}}{10}{}\protected@file@percent }
|
||||
\newlabel{fig:osha-ale-mon}{{13}{10}{}{}{}}
|
||||
\@writefile{lof}{\contentsline {figure}{\numberline {14}{\ignorespaces Annualized Time Loss Expectancies for the OSHA 1910H Network}}{10}{}\protected@file@percent }
|
||||
\newlabel{fig:osha-ale-t}{{14}{10}{}{}{}}
|
||||
\citation{data}
|
||||
\@writefile{lof}{\contentsline {figure}{\numberline {10}{\ignorespaces Annualized Time Loss Expectancies for the Automobile Maintenance Network}}{10}{}\protected@file@percent }
|
||||
\newlabel{fig:car-ale-t}{{10}{10}{}{}{}}
|
||||
\@writefile{toc}{\contentsline {subsection}{\numberline {\mbox {IV-C}}Validation}{10}{}\protected@file@percent }
|
||||
\newlabel{sec:ale-valid}{{\mbox {IV-C}}{10}{}{}{}}
|
||||
\@writefile{lof}{\contentsline {figure}{\numberline {11}{\ignorespaces Annualized Monetary Loss Expectancies for the HIPAA Network}}{10}{}\protected@file@percent }
|
||||
\newlabel{fig:hip-ale-mon}{{11}{10}{}{}{}}
|
||||
\@writefile{toc}{\contentsline {section}{\numberline {V}Future Works}{10}{}\protected@file@percent }
|
||||
\@writefile{toc}{\contentsline {section}{\numberline {VI}Conclusions}{10}{}\protected@file@percent }
|
||||
\bibdata{Bibliography}
|
||||
\bibcite{9914620}{1}
|
||||
\bibcite{9929470}{2}
|
||||
\bibcite{9628991}{3}
|
||||
\bibcite{9630798}{4}
|
||||
\@writefile{lof}{\contentsline {figure}{\numberline {12}{\ignorespaces Annualized Time Loss Expectancies for the HIPAA Network}}{11}{}\protected@file@percent }
|
||||
\newlabel{fig:hip-ale-t}{{12}{11}{}{}{}}
|
||||
\@writefile{lof}{\contentsline {figure}{\numberline {13}{\ignorespaces Annualized Monetary Loss Expectancies for the OSHA 1910H Network}}{11}{}\protected@file@percent }
|
||||
\newlabel{fig:osha-ale-mon}{{13}{11}{}{}{}}
|
||||
\@writefile{toc}{\contentsline {section}{Bibliography}{11}{}\protected@file@percent }
|
||||
\@writefile{toc}{\contentsline {section}{References}{11}{}\protected@file@percent }
|
||||
\bibcite{6414589}{5}
|
||||
\bibcite{8228672}{6}
|
||||
\bibcite{9678822}{7}
|
||||
@ -107,14 +117,12 @@
|
||||
\bibcite{9593147}{13}
|
||||
\bibcite{Lou2021}{14}
|
||||
\bibcite{10.1371/journal.pone.0257512}{15}
|
||||
\@writefile{toc}{\contentsline {section}{\numberline {V}Future Works}{11}{}\protected@file@percent }
|
||||
\@writefile{toc}{\contentsline {section}{\numberline {VI}Conclusions}{11}{}\protected@file@percent }
|
||||
\@writefile{toc}{\contentsline {section}{Bibliography}{11}{}\protected@file@percent }
|
||||
\@writefile{toc}{\contentsline {section}{References}{11}{}\protected@file@percent }
|
||||
\bibcite{alaya2022mathematical}{16}
|
||||
\bibcite{NetworkX}{17}
|
||||
\bibcite{reticulate}{18}
|
||||
\bibcite{pracma}{19}
|
||||
\bibcite{RA}{20}
|
||||
\bibstyle{ieeetr}
|
||||
\@writefile{lof}{\contentsline {figure}{\numberline {14}{\ignorespaces Annualized Time Loss Expectancies for the OSHA 1910H Network}}{12}{}\protected@file@percent }
|
||||
\newlabel{fig:osha-ale-t}{{14}{12}{}{}{}}
|
||||
\gdef \@abspage@last{12}
|
||||
|
||||
@ -11,11 +11,12 @@ Repeated entry---line 1768 of file Bibliography.bib
|
||||
: @manual{pracma
|
||||
: ,
|
||||
I'm skipping whatever remains of this entry
|
||||
Warning--I didn't find a database entry for "data"
|
||||
Warning--empty journal in NetworkX
|
||||
Warning--empty year in NetworkX
|
||||
You've used 20 entries,
|
||||
1876 wiz_defined-function locations,
|
||||
591 strings with 7778 characters,
|
||||
592 strings with 7782 characters,
|
||||
and the built_in function-call counts, 5724 in all, are:
|
||||
= -- 524
|
||||
> -- 218
|
||||
|
||||
@ -1,4 +1,4 @@
|
||||
This is pdfTeX, Version 3.141592653-2.6-1.40.26 (TeX Live 2024/Arch Linux) (preloaded format=pdflatex 2024.4.16) 19 APR 2024 12:00
|
||||
This is pdfTeX, Version 3.141592653-2.6-1.40.26 (TeX Live 2024/Arch Linux) (preloaded format=pdflatex 2024.4.16) 19 APR 2024 14:34
|
||||
entering extended mode
|
||||
restricted \write18 enabled.
|
||||
%&-line parsing enabled.
|
||||
@ -140,17 +140,41 @@ File: pdftex.def 2022/09/22 v1.2b Graphics/color driver for pdftex
|
||||
\Gin@req@height=\dimen164
|
||||
\Gin@req@width=\dimen165
|
||||
)
|
||||
(/usr/share/texmf-dist/tex/latex/float/float.sty
|
||||
Package: float 2001/11/08 v1.3d Float enhancements (AL)
|
||||
\c@float@type=\count269
|
||||
\float@exts=\toks19
|
||||
\float@box=\box53
|
||||
\@float@everytoks=\toks20
|
||||
\@floatcapt=\box54
|
||||
)
|
||||
\@float@every@table=\toks21
|
||||
(/usr/share/texmf-dist/tex/latex/caption/caption.sty
|
||||
Package: caption 2023/08/05 v3.6o Customizing captions (AR)
|
||||
|
||||
(/usr/share/texmf-dist/tex/generic/iftex/ifpdf.sty
|
||||
(/usr/share/texmf-dist/tex/latex/caption/caption3.sty
|
||||
Package: caption3 2023/07/31 v2.4d caption3 kernel (AR)
|
||||
\caption@tempdima=\dimen166
|
||||
\captionmargin=\dimen167
|
||||
\caption@leftmargin=\dimen168
|
||||
\caption@rightmargin=\dimen169
|
||||
\caption@width=\dimen170
|
||||
\caption@indent=\dimen171
|
||||
\caption@parindent=\dimen172
|
||||
\caption@hangindent=\dimen173
|
||||
Package caption Info: Unknown document class (or package),
|
||||
(caption) standard defaults will be used.
|
||||
Package caption Info: \@makecaption = \long macro:#1#2->\ifx \@captype \@IEEEta
|
||||
blestring \footnotesize \bgroup \par \centering \@IEEEtabletopskipstrut {\norma
|
||||
lfont \footnotesize #1}\\{\normalfont \footnotesize \scshape #2}\par \addvspace
|
||||
{0.5\baselineskip }\egroup \@IEEEtablecaptionsepspace \else \@IEEEfigurecaptio
|
||||
nsepspace \setbox \@tempboxa \hbox {\normalfont \footnotesize {#1.}\nobreakspac
|
||||
e \nobreakspace #2}\ifdim \wd \@tempboxa >\hsize \setbox \@tempboxa \hbox {\nor
|
||||
malfont \footnotesize {#1.}\nobreakspace \nobreakspace }\parbox [t]{\hsize }{\n
|
||||
ormalfont \footnotesize \noindent \unhbox \@tempboxa #2}\else \ifCLASSOPTIONcon
|
||||
ference \hbox to\hsize {\normalfont \footnotesize \hfil \box \@tempboxa \hfil }
|
||||
\else \hbox to\hsize {\normalfont \footnotesize \box \@tempboxa \hfil }\fi \fi
|
||||
\fi on input line 1175.
|
||||
)
|
||||
|
||||
Package caption Warning: Unknown document class (or package),
|
||||
(caption) standard defaults will be used.
|
||||
See the caption package documentation for explanation.
|
||||
|
||||
\c@caption@flags=\count269
|
||||
\c@continuedfloat=\count270
|
||||
) (/usr/share/texmf-dist/tex/generic/iftex/ifpdf.sty
|
||||
Package: ifpdf 2019/10/25 v3.4 ifpdf legacy package. Use iftex instead.
|
||||
|
||||
(/usr/share/texmf-dist/tex/generic/iftex/iftex.sty
|
||||
@ -158,13 +182,13 @@ Package: iftex 2022/02/03 v1.0f TeX engine tests
|
||||
))
|
||||
(/usr/share/texmf-dist/tex/generic/babel/babel.sty
|
||||
Package: babel 2024/02/07 v24.2 The Babel package
|
||||
\babel@savecnt=\count270
|
||||
\U@D=\dimen166
|
||||
\babel@savecnt=\count271
|
||||
\U@D=\dimen174
|
||||
\l@unhyphenated=\language5
|
||||
|
||||
(/usr/share/texmf-dist/tex/generic/babel/txtbabel.def)
|
||||
\bbl@readstream=\read2
|
||||
\bbl@dirlevel=\count271
|
||||
\bbl@dirlevel=\count272
|
||||
Package babel Info: You haven't specified a language as a class or package
|
||||
(babel) option. I'll load 'nil'. Reported on input line 4258.
|
||||
|
||||
@ -177,8 +201,8 @@ Package: dsfont 1995/08/01 v0.1 Double stroke roman fonts
|
||||
)
|
||||
(/usr/share/texmf-dist/tex/latex/base/inputenc.sty
|
||||
Package: inputenc 2021/02/14 v1.3d Input encoding file
|
||||
\inpenc@prehook=\toks22
|
||||
\inpenc@posthook=\toks23
|
||||
\inpenc@prehook=\toks19
|
||||
\inpenc@posthook=\toks20
|
||||
)
|
||||
(/usr/share/texmf-dist/tex/latex/tools/indentfirst.sty
|
||||
Package: indentfirst 2023/07/02 v1.03 Indent first paragraph (DPC)
|
||||
@ -209,8 +233,8 @@ Package tocloft Info: The document has section divisions on input line 51.
|
||||
\cftbeforefigskip=\skip71
|
||||
\cftfigindent=\skip72
|
||||
\cftfignumwidth=\skip73
|
||||
\c@lofdepth=\count272
|
||||
\c@lotdepth=\count273
|
||||
\c@lofdepth=\count273
|
||||
\c@lotdepth=\count274
|
||||
\cftbeforelottitleskip=\skip74
|
||||
\cftafterlottitleskip=\skip75
|
||||
\cftbeforetabskip=\skip76
|
||||
@ -227,67 +251,67 @@ Package: amstext 2021/08/26 v2.01 AMS text
|
||||
|
||||
(/usr/share/texmf-dist/tex/latex/amsmath/amsgen.sty
|
||||
File: amsgen.sty 1999/11/30 v2.0 generic functions
|
||||
\@emptytoks=\toks24
|
||||
\ex@=\dimen167
|
||||
\@emptytoks=\toks21
|
||||
\ex@=\dimen175
|
||||
))
|
||||
(/usr/share/texmf-dist/tex/latex/amsmath/amsbsy.sty
|
||||
Package: amsbsy 1999/11/29 v1.2d Bold Symbols
|
||||
\pmbraise@=\dimen168
|
||||
\pmbraise@=\dimen176
|
||||
)
|
||||
(/usr/share/texmf-dist/tex/latex/amsmath/amsopn.sty
|
||||
Package: amsopn 2022/04/08 v2.04 operator names
|
||||
)
|
||||
\inf@bad=\count274
|
||||
\inf@bad=\count275
|
||||
LaTeX Info: Redefining \frac on input line 234.
|
||||
\uproot@=\count275
|
||||
\leftroot@=\count276
|
||||
\uproot@=\count276
|
||||
\leftroot@=\count277
|
||||
LaTeX Info: Redefining \overline on input line 399.
|
||||
LaTeX Info: Redefining \colon on input line 410.
|
||||
\classnum@=\count277
|
||||
\DOTSCASE@=\count278
|
||||
\classnum@=\count278
|
||||
\DOTSCASE@=\count279
|
||||
LaTeX Info: Redefining \ldots on input line 496.
|
||||
LaTeX Info: Redefining \dots on input line 499.
|
||||
LaTeX Info: Redefining \cdots on input line 620.
|
||||
\Mathstrutbox@=\box55
|
||||
\strutbox@=\box56
|
||||
\Mathstrutbox@=\box53
|
||||
\strutbox@=\box54
|
||||
LaTeX Info: Redefining \big on input line 722.
|
||||
LaTeX Info: Redefining \Big on input line 723.
|
||||
LaTeX Info: Redefining \bigg on input line 724.
|
||||
LaTeX Info: Redefining \Bigg on input line 725.
|
||||
\big@size=\dimen169
|
||||
\big@size=\dimen177
|
||||
LaTeX Font Info: Redeclaring font encoding OML on input line 743.
|
||||
LaTeX Font Info: Redeclaring font encoding OMS on input line 744.
|
||||
\macc@depth=\count279
|
||||
\macc@depth=\count280
|
||||
LaTeX Info: Redefining \bmod on input line 905.
|
||||
LaTeX Info: Redefining \pmod on input line 910.
|
||||
LaTeX Info: Redefining \smash on input line 940.
|
||||
LaTeX Info: Redefining \relbar on input line 970.
|
||||
LaTeX Info: Redefining \Relbar on input line 971.
|
||||
\c@MaxMatrixCols=\count280
|
||||
\c@MaxMatrixCols=\count281
|
||||
\dotsspace@=\muskip16
|
||||
\c@parentequation=\count281
|
||||
\dspbrk@lvl=\count282
|
||||
\tag@help=\toks25
|
||||
\row@=\count283
|
||||
\column@=\count284
|
||||
\maxfields@=\count285
|
||||
\andhelp@=\toks26
|
||||
\eqnshift@=\dimen170
|
||||
\alignsep@=\dimen171
|
||||
\tagshift@=\dimen172
|
||||
\tagwidth@=\dimen173
|
||||
\totwidth@=\dimen174
|
||||
\lineht@=\dimen175
|
||||
\@envbody=\toks27
|
||||
\c@parentequation=\count282
|
||||
\dspbrk@lvl=\count283
|
||||
\tag@help=\toks22
|
||||
\row@=\count284
|
||||
\column@=\count285
|
||||
\maxfields@=\count286
|
||||
\andhelp@=\toks23
|
||||
\eqnshift@=\dimen178
|
||||
\alignsep@=\dimen179
|
||||
\tagshift@=\dimen180
|
||||
\tagwidth@=\dimen181
|
||||
\totwidth@=\dimen182
|
||||
\lineht@=\dimen183
|
||||
\@envbody=\toks24
|
||||
\multlinegap=\skip80
|
||||
\multlinetaggap=\skip81
|
||||
\mathdisplay@stack=\toks28
|
||||
\mathdisplay@stack=\toks25
|
||||
LaTeX Info: Redefining \[ on input line 2953.
|
||||
LaTeX Info: Redefining \] on input line 2954.
|
||||
)
|
||||
(/usr/share/texmf-dist/tex/latex/algorithm2e/algorithm2e.sty
|
||||
Package: algorithm2e 2017/07/18 v5.2 algorithms environments
|
||||
\c@AlgoLine=\count286
|
||||
\c@AlgoLine=\count287
|
||||
|
||||
(/usr/share/texmf-dist/tex/latex/base/ifthen.sty
|
||||
Package: ifthen 2022/04/13 v1.1d Standard LaTeX ifthen package (DPC)
|
||||
@ -296,7 +320,7 @@ Package: ifthen 2022/04/13 v1.1d Standard LaTeX ifthen package (DPC)
|
||||
|
||||
(/usr/share/texmf-dist/tex/latex/ifoddpage/ifoddpage.sty
|
||||
Package: ifoddpage 2022/10/18 v1.2 Conditionals for odd/even page detection
|
||||
\c@checkoddpage=\count287
|
||||
\c@checkoddpage=\count288
|
||||
)
|
||||
(/usr/share/texmf-dist/tex/latex/tools/xspace.sty
|
||||
Package: xspace 2014/10/28 v1.13 Space after command names (DPC,MH)
|
||||
@ -312,71 +336,71 @@ Package: relsize 2013/03/29 ver 4.1
|
||||
\skiplength=\skip88
|
||||
\algomargin=\skip89
|
||||
\skipalgocfslide=\skip90
|
||||
\algowidth=\dimen176
|
||||
\inoutsize=\dimen177
|
||||
\inoutindent=\dimen178
|
||||
\interspacetitleruled=\dimen179
|
||||
\interspacealgoruled=\dimen180
|
||||
\interspacetitleboxruled=\dimen181
|
||||
\algowidth=\dimen184
|
||||
\inoutsize=\dimen185
|
||||
\inoutindent=\dimen186
|
||||
\interspacetitleruled=\dimen187
|
||||
\interspacealgoruled=\dimen188
|
||||
\interspacetitleboxruled=\dimen189
|
||||
\algocf@ruledwidth=\skip91
|
||||
\algocf@inoutbox=\box57
|
||||
\algocf@inputbox=\box58
|
||||
\algocf@inoutbox=\box55
|
||||
\algocf@inputbox=\box56
|
||||
\AlCapSkip=\skip92
|
||||
\AlCapHSkip=\skip93
|
||||
\algoskipindent=\skip94
|
||||
\algocf@nlbox=\box59
|
||||
\algocf@hangingbox=\box60
|
||||
\algocf@untilbox=\box61
|
||||
\algocf@nlbox=\box57
|
||||
\algocf@hangingbox=\box58
|
||||
\algocf@untilbox=\box59
|
||||
\algocf@skipuntil=\skip95
|
||||
\algocf@capbox=\box62
|
||||
\algocf@capbox=\box60
|
||||
\algocf@lcaptionbox=\skip96
|
||||
\algoheightruledefault=\skip97
|
||||
\algoheightrule=\skip98
|
||||
\algotitleheightruledefault=\skip99
|
||||
\algotitleheightrule=\skip100
|
||||
\c@algocfline=\count288
|
||||
\c@algocfproc=\count289
|
||||
\c@algocf=\count290
|
||||
\algocf@algoframe=\box63
|
||||
\algocf@algobox=\box64
|
||||
\c@algocfline=\count289
|
||||
\c@algocfproc=\count290
|
||||
\c@algocf=\count291
|
||||
\algocf@algoframe=\box61
|
||||
\algocf@algobox=\box62
|
||||
)
|
||||
(/usr/share/texmf-dist/tex/latex/l3backend/l3backend-pdftex.def
|
||||
File: l3backend-pdftex.def 2024-02-20 L3 backend support: PDF output (pdfTeX)
|
||||
\l__color_backend_stack_int=\count291
|
||||
\l__pdf_internal_box=\box65
|
||||
\l__color_backend_stack_int=\count292
|
||||
\l__pdf_internal_box=\box63
|
||||
)
|
||||
(./output/Schrick-Noah_CG-Ep-Modeling.aux)
|
||||
\openout1 = `Schrick-Noah_CG-Ep-Modeling.aux'.
|
||||
|
||||
LaTeX Font Info: Checking defaults for OML/cmm/m/it on input line 27.
|
||||
LaTeX Font Info: ... okay on input line 27.
|
||||
LaTeX Font Info: Checking defaults for OMS/cmsy/m/n on input line 27.
|
||||
LaTeX Font Info: ... okay on input line 27.
|
||||
LaTeX Font Info: Checking defaults for OT1/cmr/m/n on input line 27.
|
||||
LaTeX Font Info: ... okay on input line 27.
|
||||
LaTeX Font Info: Checking defaults for T1/cmr/m/n on input line 27.
|
||||
LaTeX Font Info: ... okay on input line 27.
|
||||
LaTeX Font Info: Checking defaults for TS1/cmr/m/n on input line 27.
|
||||
LaTeX Font Info: ... okay on input line 27.
|
||||
LaTeX Font Info: Checking defaults for OMX/cmex/m/n on input line 27.
|
||||
LaTeX Font Info: ... okay on input line 27.
|
||||
LaTeX Font Info: Checking defaults for U/cmr/m/n on input line 27.
|
||||
LaTeX Font Info: ... okay on input line 27.
|
||||
LaTeX Font Info: Checking defaults for OML/cmm/m/it on input line 28.
|
||||
LaTeX Font Info: ... okay on input line 28.
|
||||
LaTeX Font Info: Checking defaults for OMS/cmsy/m/n on input line 28.
|
||||
LaTeX Font Info: ... okay on input line 28.
|
||||
LaTeX Font Info: Checking defaults for OT1/cmr/m/n on input line 28.
|
||||
LaTeX Font Info: ... okay on input line 28.
|
||||
LaTeX Font Info: Checking defaults for T1/cmr/m/n on input line 28.
|
||||
LaTeX Font Info: ... okay on input line 28.
|
||||
LaTeX Font Info: Checking defaults for TS1/cmr/m/n on input line 28.
|
||||
LaTeX Font Info: ... okay on input line 28.
|
||||
LaTeX Font Info: Checking defaults for OMX/cmex/m/n on input line 28.
|
||||
LaTeX Font Info: ... okay on input line 28.
|
||||
LaTeX Font Info: Checking defaults for U/cmr/m/n on input line 28.
|
||||
LaTeX Font Info: ... okay on input line 28.
|
||||
|
||||
-- Lines per column: 56 (exact).
|
||||
(/usr/share/texmf-dist/tex/context/base/mkii/supp-pdf.mkii
|
||||
[Loading MPS to PDF converter (version 2006.09.02).]
|
||||
\scratchcounter=\count292
|
||||
\scratchdimen=\dimen182
|
||||
\scratchbox=\box66
|
||||
\nofMPsegments=\count293
|
||||
\nofMParguments=\count294
|
||||
\everyMPshowfont=\toks29
|
||||
\MPscratchCnt=\count295
|
||||
\MPscratchDim=\dimen183
|
||||
\MPnumerator=\count296
|
||||
\makeMPintoPDFobject=\count297
|
||||
\everyMPtoPDFconversion=\toks30
|
||||
\scratchcounter=\count293
|
||||
\scratchdimen=\dimen190
|
||||
\scratchbox=\box64
|
||||
\nofMPsegments=\count294
|
||||
\nofMParguments=\count295
|
||||
\everyMPshowfont=\toks26
|
||||
\MPscratchCnt=\count296
|
||||
\MPscratchDim=\dimen191
|
||||
\MPnumerator=\count297
|
||||
\makeMPintoPDFobject=\count298
|
||||
\everyMPtoPDFconversion=\toks27
|
||||
) (/usr/share/texmf-dist/tex/latex/epstopdf-pkg/epstopdf-base.sty
|
||||
Package: epstopdf-base 2020-01-24 v2.11 Base part for package epstopdf
|
||||
Package epstopdf-base Info: Redefining graphics rule for `.eps' on input line 4
|
||||
@ -386,7 +410,10 @@ Package epstopdf-base Info: Redefining graphics rule for `.eps' on input line 4
|
||||
File: epstopdf-sys.cfg 2010/07/13 v1.3 Configuration of (r)epstopdf for TeX Liv
|
||||
e
|
||||
))
|
||||
Underfull \hbox (badness 10000) in paragraph at lines 58--60
|
||||
Package caption Info: Begin \AtBeginDocument code.
|
||||
Package caption Info: End \AtBeginDocument code.
|
||||
|
||||
Underfull \hbox (badness 10000) in paragraph at lines 59--61
|
||||
[]\OT1/ptm/b/it/9 Index Terms\OT1/ptm/b/n/9 ---Compliance Graph; Attack Graph;
|
||||
[]
|
||||
|
||||
@ -395,291 +422,317 @@ ts/enc/dvips/base/8r.enc}
|
||||
|
||||
|
||||
]
|
||||
Underfull \hbox (badness 1371) in paragraph at lines 76--77
|
||||
Underfull \hbox (badness 1371) in paragraph at lines 77--78
|
||||
\OT1/ptm/m/n/10 systems, the authors of [[]] present a S$\OML/cmm/m/it/10 I[]$$
|
||||
I[]$\OT1/ptm/m/n/10 SD model
|
||||
[]
|
||||
|
||||
|
||||
Underfull \hbox (badness 2903) in paragraph at lines 76--77
|
||||
Underfull \hbox (badness 2903) in paragraph at lines 77--78
|
||||
\OT1/ptm/m/n/10 (Susceptible, Infected-with-Strain-1, Infected-with-Strain-2,
|
||||
[]
|
||||
|
||||
|
||||
Underfull \hbox (badness 10000) in paragraph at lines 76--77
|
||||
Underfull \hbox (badness 10000) in paragraph at lines 77--78
|
||||
|
||||
[]
|
||||
|
||||
|
||||
Overfull \hbox (41.39592pt too wide) in paragraph at lines 78--89
|
||||
LaTeX Font Warning: Command \footnotesize invalid in math mode on input line 80
|
||||
.
|
||||
|
||||
|
||||
Overfull \hbox (8.9552pt too wide) in paragraph at lines 79--91
|
||||
[]$[][]$
|
||||
[]
|
||||
|
||||
|
||||
Underfull \hbox (badness 10000) in paragraph at lines 78--89
|
||||
Underfull \hbox (badness 10000) in paragraph at lines 79--91
|
||||
|
||||
[]
|
||||
|
||||
|
||||
Underfull \hbox (badness 3118) in paragraph at lines 90--91
|
||||
Underfull \hbox (badness 3118) in paragraph at lines 92--93
|
||||
[]\OT1/ptm/m/n/10 Fitting compliance graph analysis to an SIS model
|
||||
[]
|
||||
|
||||
|
||||
Underfull \hbox (badness 10000) in paragraph at lines 90--91
|
||||
Underfull \hbox (badness 10000) in paragraph at lines 92--93
|
||||
|
||||
[]
|
||||
|
||||
|
||||
Underfull \hbox (badness 10000) in paragraph at lines 92--103
|
||||
Underfull \hbox (badness 10000) in paragraph at lines 94--105
|
||||
|
||||
[]
|
||||
|
||||
|
||||
Underfull \vbox (badness 6493) has occurred while \output is active []
|
||||
Underfull \vbox (badness 10000) has occurred while \output is active []
|
||||
|
||||
|
||||
Underfull \hbox (badness 3281) in paragraph at lines 107--108
|
||||
Underfull \hbox (badness 3281) in paragraph at lines 109--110
|
||||
\OT1/ptm/m/n/10 analysis (which has been adapted for the multi-strain
|
||||
[]
|
||||
|
||||
|
||||
LaTeX Warning: No positions in optional float specifier.
|
||||
Default added (so using `tbp') on input line 109.
|
||||
|
||||
|
||||
Overfull \hbox (16.66411pt too wide) in paragraph at lines 112--123
|
||||
[][]
|
||||
[]
|
||||
Default added (so using `tbp') on input line 111.
|
||||
|
||||
|
||||
LaTeX Warning: No positions in optional float specifier.
|
||||
Default added (so using `tbp') on input line 125.
|
||||
Default added (so using `tbp') on input line 127.
|
||||
|
||||
|
||||
Underfull \hbox (badness 1701) in paragraph at lines 139--139
|
||||
Underfull \hbox (badness 1701) in paragraph at lines 130--130
|
||||
\OT1/ptm/m/n/10 Each parameter is contextualized to compliance graphs,
|
||||
[]
|
||||
|
||||
|
||||
Overfull \hbox (9.88812pt too wide) in paragraph at lines 128--141
|
||||
[][]
|
||||
[]
|
||||
|
||||
|
||||
Underfull \vbox (badness 10000) has occurred while \output is active []
|
||||
|
||||
[2]
|
||||
<./images/model-flow.drawio.png, id=22, 728.7225pt x 281.05pt>
|
||||
<./images/model-flow.drawio.png, id=28, 728.7225pt x 281.05pt>
|
||||
File: ./images/model-flow.drawio.png Graphic file (type png)
|
||||
<use ./images/model-flow.drawio.png>
|
||||
Package pdftex.def Info: ./images/model-flow.drawio.png used on input line 157
|
||||
Package pdftex.def Info: ./images/model-flow.drawio.png used on input line 159
|
||||
.
|
||||
(pdftex.def) Requested size: 252.0pt x 97.18964pt.
|
||||
|
||||
Underfull \hbox (badness 1584) in paragraph at lines 162--162
|
||||
[]\OT1/ptm/m/n/10 Fig. 1: |SEIRDS Epidemiology Model. Display of each
|
||||
[]
|
||||
|
||||
|
||||
Underfull \hbox (badness 2837) in paragraph at lines 162--162
|
||||
\OT1/ptm/m/n/10 mathematical representation of the relationship between
|
||||
[]
|
||||
|
||||
|
||||
LaTeX Warning: No positions in optional float specifier.
|
||||
Default added (so using `tbp') on input line 166.
|
||||
|
||||
[3 <./images/model-flow.drawio.png>]
|
||||
|
||||
LaTeX Warning: Reference `ch:example-networks' on page 4 undefined on input lin
|
||||
e 207.
|
||||
|
||||
|
||||
LaTeX Warning: Reference `ch:example-networks' on page 4 undefined on input lin
|
||||
e 207.
|
||||
Default added (so using `tbp') on input line 168.
|
||||
|
||||
|
||||
Underfull \vbox (badness 10000) has occurred while \output is active []
|
||||
|
||||
[3 <./images/model-flow.drawio.png>]
|
||||
|
||||
Overfull \hbox (43.55424pt too wide) detected at line 256
|
||||
[][][]
|
||||
[]
|
||||
LaTeX Warning: Citation `data' on page 4 undefined on input line 209.
|
||||
|
||||
|
||||
LaTeX Warning: Reference `ch:example-networks' on page 4 undefined on input lin
|
||||
e 258.
|
||||
LaTeX Warning: Citation `data' on page 4 undefined on input line 209.
|
||||
|
||||
|
||||
Underfull \hbox (badness 2150) in paragraph at lines 258--259
|
||||
Underfull \vbox (badness 10000) has occurred while \output is active []
|
||||
|
||||
[4]
|
||||
|
||||
LaTeX Font Warning: Command \small invalid in math mode on input line 256.
|
||||
|
||||
|
||||
LaTeX Warning: Citation `data' on page 5 undefined on input line 264.
|
||||
|
||||
|
||||
Underfull \hbox (badness 2150) in paragraph at lines 264--265
|
||||
\OT1/ptm/m/n/10 repair, or replacement. For components without a pre-
|
||||
[]
|
||||
|
||||
|
||||
Underfull \vbox (badness 6510) has occurred while \output is active []
|
||||
|
||||
[4]
|
||||
Underfull \vbox (badness 10000) has occurred while \output is active []
|
||||
|
||||
<./images/unknown_infec_rate.png, id=31, 788.19469pt x 640.64343pt>
|
||||
<./images/unknown_infec_rate.png, id=38, 788.19469pt x 640.64343pt>
|
||||
File: ./images/unknown_infec_rate.png Graphic file (type png)
|
||||
<use ./images/unknown_infec_rate.png>
|
||||
Package pdftex.def Info: ./images/unknown_infec_rate.png used on input line 27
|
||||
7.
|
||||
Package pdftex.def Info: ./images/unknown_infec_rate.png used on input line 28
|
||||
3.
|
||||
(pdftex.def) Requested size: 252.0pt x 204.82434pt.
|
||||
[5 <./images/unknown_infec_rate.png>]
|
||||
Underfull \vbox (badness 5302) has occurred while \output is active []
|
||||
|
||||
<./images/oil_change.png, id=37, 984.67876pt x 568.1225pt>
|
||||
<./images/oil_change.png, id=46, 984.67876pt x 568.1225pt>
|
||||
File: ./images/oil_change.png Graphic file (type png)
|
||||
<use ./images/oil_change.png>
|
||||
Package pdftex.def Info: ./images/oil_change.png used on input line 332.
|
||||
Package pdftex.def Info: ./images/oil_change.png used on input line 339.
|
||||
(pdftex.def) Requested size: 252.0pt x 145.39377pt.
|
||||
<./images/drive_belt.png, id=38, 984.67876pt x 568.1225pt>
|
||||
|
||||
Underfull \hbox (badness 3668) in paragraph at lines 343--343
|
||||
\OT1/ptm/m/n/10 Network's Oil Change Violation. This epidemic curve
|
||||
[]
|
||||
|
||||
<./images/drive_belt.png, id=47, 984.67876pt x 568.1225pt>
|
||||
File: ./images/drive_belt.png Graphic file (type png)
|
||||
<use ./images/drive_belt.png>
|
||||
Package pdftex.def Info: ./images/drive_belt.png used on input line 341.
|
||||
Package pdftex.def Info: ./images/drive_belt.png used on input line 348.
|
||||
(pdftex.def) Requested size: 252.0pt x 145.39377pt.
|
||||
|
||||
|
||||
LaTeX Warning: Reference `ch:example-networks' on page 6 undefined on input lin
|
||||
e 345.
|
||||
LaTeX Warning: Citation `data' on page 6 undefined on input line 352.
|
||||
|
||||
|
||||
LaTeX Warning: Reference `ch:example-networks' on page 6 undefined on input lin
|
||||
e 345.
|
||||
LaTeX Warning: Citation `data' on page 6 undefined on input line 352.
|
||||
|
||||
<./images/sec_asses.png, id=39, 984.67876pt x 568.1225pt>
|
||||
|
||||
Underfull \hbox (badness 5490) in paragraph at lines 352--352
|
||||
\OT1/ptm/m/n/10 Network's Drive Belt Violation. This epidemic curve
|
||||
[]
|
||||
|
||||
<./images/sec_asses.png, id=48, 984.67876pt x 568.1225pt>
|
||||
File: ./images/sec_asses.png Graphic file (type png)
|
||||
<use ./images/sec_asses.png>
|
||||
Package pdftex.def Info: ./images/sec_asses.png used on input line 350.
|
||||
Package pdftex.def Info: ./images/sec_asses.png used on input line 357.
|
||||
(pdftex.def) Requested size: 252.0pt x 145.39377pt.
|
||||
<./images/osha_end.png, id=40, 984.67876pt x 568.1225pt>
|
||||
<./images/osha_end.png, id=49, 984.67876pt x 568.1225pt>
|
||||
File: ./images/osha_end.png Graphic file (type png)
|
||||
<use ./images/osha_end.png>
|
||||
Package pdftex.def Info: ./images/osha_end.png used on input line 358.
|
||||
Package pdftex.def Info: ./images/osha_end.png used on input line 365.
|
||||
(pdftex.def) Requested size: 252.0pt x 145.39377pt.
|
||||
<./images/osha-ep-nothing.png, id=41, 984.67876pt x 568.1225pt>
|
||||
<./images/osha-ep-nothing.png, id=50, 984.67876pt x 568.1225pt>
|
||||
File: ./images/osha-ep-nothing.png Graphic file (type png)
|
||||
<use ./images/osha-ep-nothing.png>
|
||||
Package pdftex.def Info: ./images/osha-ep-nothing.png used on input line 366.
|
||||
Package pdftex.def Info: ./images/osha-ep-nothing.png used on input line 373.
|
||||
(pdftex.def) Requested size: 252.0pt x 145.39377pt.
|
||||
[6 <./images/oil_change.png>] [7 <./images/drive_belt.png> <./images/sec_asses.
|
||||
png> <./images/osha_end.png> <./images/osha-ep-nothing.png>]
|
||||
Underfull \hbox (badness 4156) in paragraph at lines 381--382
|
||||
[6]
|
||||
Underfull \hbox (badness 4156) in paragraph at lines 388--389
|
||||
\OT1/ptm/m/n/10 an increase in either the $\OML/cmm/m/it/10 Exposed$ \OT1/ptm/m
|
||||
/n/10 or $\OML/cmm/m/it/10 Infected$
|
||||
[]
|
||||
|
||||
|
||||
Underfull \hbox (badness 4001) in paragraph at lines 383--384
|
||||
Underfull \hbox (badness 4001) in paragraph at lines 390--391
|
||||
[]\OT1/ptm/m/n/10 A decrease in the $\OML/cmm/m/it/10 Infected$ \OT1/ptm/m/n/10
|
||||
compartment causes
|
||||
[]
|
||||
|
||||
|
||||
Underfull \hbox (badness 1527) in paragraph at lines 383--384
|
||||
Underfull \hbox (badness 1527) in paragraph at lines 390--391
|
||||
\OT1/ptm/m/n/10 an increase in either the $\OML/cmm/m/it/10 Recovered$ \OT1/ptm
|
||||
/m/n/10 or $\OML/cmm/m/it/10 Deceased$
|
||||
[]
|
||||
|
||||
|
||||
LaTeX Warning: Reference `ch:Intro' on page 8 undefined on input line 396.
|
||||
|
||||
|
||||
LaTeX Warning: Reference `ch:rel-works' on page 8 undefined on input line 396.
|
||||
|
||||
|
||||
LaTeX Warning: Reference `ch:example-networks' on page 8 undefined on input lin
|
||||
e 396.
|
||||
|
||||
|
||||
Overfull \hbox (59.90427pt too wide) detected at line 404
|
||||
[][][]
|
||||
[7 <./images/oil_change.png> <./images/drive_belt.png>]
|
||||
Underfull \hbox (badness 1776) in paragraph at lines 403--404
|
||||
\OT1/ptm/m/n/10 or investigations of the National Vulnerability Database
|
||||
[]
|
||||
|
||||
|
||||
Underfull \hbox (badness 1715) in paragraph at lines 406--407
|
||||
LaTeX Font Warning: Command \tiny invalid in math mode on input line 406.
|
||||
|
||||
LaTeX Font Info: Calculating math sizes for size <> on input line 412.
|
||||
|
||||
LaTeX Font Warning: Font shape `OT1/cmr/m/n' in size <> not available
|
||||
(Font) size <5> substituted on input line 412.
|
||||
|
||||
|
||||
LaTeX Font Warning: Font shape `OT1/cmr/m/n' in size <0.7> not available
|
||||
(Font) size <5> substituted on input line 412.
|
||||
|
||||
|
||||
LaTeX Font Warning: Font shape `OT1/cmr/m/n' in size <0.5> not available
|
||||
(Font) size <5> substituted on input line 412.
|
||||
|
||||
|
||||
LaTeX Font Warning: Font shape `OML/cmm/m/it' in size <> not available
|
||||
(Font) size <5> substituted on input line 412.
|
||||
|
||||
|
||||
LaTeX Font Warning: Font shape `OML/cmm/m/it' in size <0.7> not available
|
||||
(Font) size <5> substituted on input line 412.
|
||||
|
||||
|
||||
LaTeX Font Warning: Font shape `OML/cmm/m/it' in size <0.5> not available
|
||||
(Font) size <5> substituted on input line 412.
|
||||
|
||||
|
||||
LaTeX Font Warning: Font shape `OMS/cmsy/m/n' in size <> not available
|
||||
(Font) size <5> substituted on input line 412.
|
||||
|
||||
|
||||
LaTeX Font Warning: Font shape `OMS/cmsy/m/n' in size <0.7> not available
|
||||
(Font) size <5> substituted on input line 412.
|
||||
|
||||
|
||||
LaTeX Font Warning: Font shape `OMS/cmsy/m/n' in size <0.5> not available
|
||||
(Font) size <5> substituted on input line 412.
|
||||
|
||||
|
||||
Underfull \hbox (badness 1715) in paragraph at lines 414--415
|
||||
[]\OT1/ptm/m/n/10 Included in the presentation of ALE in Equation 6[],
|
||||
[]
|
||||
|
||||
<./images/Obj1.png, id=56, 816.04875pt x 210.7875pt>
|
||||
[8 <./images/sec_asses.png> <./images/osha_end.png> <./images/osha-ep-nothing.p
|
||||
ng>]
|
||||
<./images/Obj1.png, id=67, 816.04875pt x 210.7875pt>
|
||||
File: ./images/Obj1.png Graphic file (type png)
|
||||
<use ./images/Obj1.png>
|
||||
Package pdftex.def Info: ./images/Obj1.png used on input line 418.
|
||||
Package pdftex.def Info: ./images/Obj1.png used on input line 426.
|
||||
(pdftex.def) Requested size: 252.0pt x 65.09258pt.
|
||||
|
||||
LaTeX Warning: Reference `ch:example-networks' on page 8 undefined on input lin
|
||||
e 426.
|
||||
|
||||
LaTeX Warning: Citation `data' on page 9 undefined on input line 434.
|
||||
|
||||
LaTeX Warning: Reference `sec:Automotive' on page 8 undefined on input line 426
|
||||
.
|
||||
|
||||
|
||||
LaTeX Warning: Reference `sec:Healthcare' on page 8 undefined on input line 426
|
||||
.
|
||||
|
||||
|
||||
LaTeX Warning: Reference `sec:OSHA' on page 8 undefined on input line 426.
|
||||
|
||||
[8]
|
||||
<./images/car-ale-mon.png, id=60, 984.67876pt x 568.1225pt>
|
||||
<./images/car-ale-mon.png, id=68, 984.67876pt x 568.1225pt>
|
||||
File: ./images/car-ale-mon.png Graphic file (type png)
|
||||
<use ./images/car-ale-mon.png>
|
||||
Package pdftex.def Info: ./images/car-ale-mon.png used on input line 429.
|
||||
Package pdftex.def Info: ./images/car-ale-mon.png used on input line 437.
|
||||
(pdftex.def) Requested size: 252.0pt x 145.39377pt.
|
||||
<./images/car-ale-t.png, id=61, 984.67876pt x 568.1225pt>
|
||||
<./images/car-ale-t.png, id=69, 984.67876pt x 568.1225pt>
|
||||
File: ./images/car-ale-t.png Graphic file (type png)
|
||||
<use ./images/car-ale-t.png>
|
||||
Package pdftex.def Info: ./images/car-ale-t.png used on input line 438.
|
||||
Package pdftex.def Info: ./images/car-ale-t.png used on input line 446.
|
||||
(pdftex.def) Requested size: 252.0pt x 145.39377pt.
|
||||
<./images/hip-ale-mon.png, id=62, 984.67876pt x 568.1225pt>
|
||||
|
||||
Underfull \hbox (badness 4193) in paragraph at lines 450--450
|
||||
[]\OT1/ptm/m/n/10 Fig. 10: |Annualized Time Loss Expectancies for the
|
||||
[]
|
||||
|
||||
|
||||
Underfull \hbox (badness 1371) in paragraph at lines 450--450
|
||||
\OT1/ptm/m/n/10 automobile maintenance network per year. Each loss is
|
||||
[]
|
||||
|
||||
<./images/hip-ale-mon.png, id=70, 984.67876pt x 568.1225pt>
|
||||
File: ./images/hip-ale-mon.png Graphic file (type png)
|
||||
<use ./images/hip-ale-mon.png>
|
||||
Package pdftex.def Info: ./images/hip-ale-mon.png used on input line 447.
|
||||
Package pdftex.def Info: ./images/hip-ale-mon.png used on input line 455.
|
||||
(pdftex.def) Requested size: 252.0pt x 145.39377pt.
|
||||
<./images/hip-ale-t.png, id=63, 984.67876pt x 568.1225pt>
|
||||
<./images/hip-ale-t.png, id=71, 984.67876pt x 568.1225pt>
|
||||
File: ./images/hip-ale-t.png Graphic file (type png)
|
||||
<use ./images/hip-ale-t.png>
|
||||
Package pdftex.def Info: ./images/hip-ale-t.png used on input line 456.
|
||||
Package pdftex.def Info: ./images/hip-ale-t.png used on input line 464.
|
||||
(pdftex.def) Requested size: 252.0pt x 145.39377pt.
|
||||
<./images/osha-ale-mon.png, id=64, 984.67876pt x 568.1225pt>
|
||||
<./images/osha-ale-mon.png, id=72, 984.67876pt x 568.1225pt>
|
||||
File: ./images/osha-ale-mon.png Graphic file (type png)
|
||||
<use ./images/osha-ale-mon.png>
|
||||
Package pdftex.def Info: ./images/osha-ale-mon.png used on input line 465.
|
||||
Package pdftex.def Info: ./images/osha-ale-mon.png used on input line 473.
|
||||
(pdftex.def) Requested size: 252.0pt x 145.39377pt.
|
||||
<./images/osha-ale-t.png, id=65, 984.67876pt x 568.1225pt>
|
||||
<./images/osha-ale-t.png, id=73, 984.67876pt x 568.1225pt>
|
||||
File: ./images/osha-ale-t.png Graphic file (type png)
|
||||
<use ./images/osha-ale-t.png>
|
||||
Package pdftex.def Info: ./images/osha-ale-t.png used on input line 474.
|
||||
Package pdftex.def Info: ./images/osha-ale-t.png used on input line 482.
|
||||
(pdftex.def) Requested size: 252.0pt x 145.39377pt.
|
||||
[9 <./images/Obj1.png> <./images/car-ale-mon.png> <./images/car-ale-t.png> <./
|
||||
images/hip-ale-mon.png>]
|
||||
Underfull \hbox (badness 4120) in paragraph at lines 484--485
|
||||
|
||||
Underfull \hbox (badness 4120) in paragraph at lines 492--493
|
||||
[]\OT1/ptm/m/n/10 In all Figures that presented expected time losses,
|
||||
[]
|
||||
|
||||
[10 <./images/hip-ale-t.png> <./images/osha-ale-mon.png> <./images/osha-ale-t.p
|
||||
ng>]
|
||||
[9 <./images/Obj1.png> <./images/car-ale-mon.png>]
|
||||
|
||||
LaTeX Warning: Reference `ch:example-networks' on page 11 undefined on input li
|
||||
ne 501.
|
||||
LaTeX Warning: Citation `data' on page 10 undefined on input line 509.
|
||||
|
||||
|
||||
Underfull \hbox (badness 8056) in paragraph at lines 501--502
|
||||
Underfull \hbox (badness 8056) in paragraph at lines 509--510
|
||||
[]\OT1/ptm/m/n/10 This work presented and implemented a SEIRDS
|
||||
[]
|
||||
|
||||
|
||||
Underfull \hbox (badness 1688) in paragraph at lines 501--502
|
||||
\OT1/ptm/m/n/10 maintaining compliance. This approach is shown to be
|
||||
[]
|
||||
|
||||
[10 <./images/car-ale-t.png> <./images/hip-ale-mon.png>]
|
||||
(./output/Schrick-Noah_CG-Ep-Modeling.bbl
|
||||
Underfull \hbox (badness 1681) in paragraph at lines 17--21
|
||||
\OT1/ptm/m/n/8 T. Chumachenko, ``Simulation of covid-19 dynamics using ridge
|
||||
[]
|
||||
|
||||
|
||||
[11 <./images/hip-ale-t.png> <./images/osha-ale-mon.png>]
|
||||
Underfull \hbox (badness 3579) in paragraph at lines 74--78
|
||||
\OT1/ptm/m/n/8 sensor networks,'' in \OT1/ptm/m/it/8 2021 International Balkan
|
||||
Conference on
|
||||
[]
|
||||
|
||||
[11]
|
||||
|
||||
Underfull \hbox (badness 2865) in paragraph at lines 94--97
|
||||
\OT1/ptm/m/n/8 structure, dynamics, and function using networkx,'' Available:
|
||||
[]
|
||||
@ -702,47 +755,53 @@ Before submitting the final camera ready copy, remember to:
|
||||
uses only Type 1 fonts and that every step in the generation
|
||||
process uses the appropriate paper size.
|
||||
|
||||
[12
|
||||
|
||||
] (./output/Schrick-Noah_CG-Ep-Modeling.aux)
|
||||
[12 <./images/osha-ale-t.png>] (./output/Schrick-Noah_CG-Ep-Modeling.aux)
|
||||
***********
|
||||
LaTeX2e <2023-11-01> patch level 1
|
||||
L3 programming layer <2024-02-20>
|
||||
***********
|
||||
|
||||
|
||||
LaTeX Font Warning: Size substitutions with differences
|
||||
(Font) up to 4.5pt have occurred.
|
||||
|
||||
|
||||
LaTeX Warning: There were undefined references.
|
||||
|
||||
|
||||
LaTeX Warning: Label(s) may have changed. Rerun to get cross-references right.
|
||||
|
||||
)
|
||||
Here is how much of TeX's memory you used:
|
||||
5655 strings out of 476076
|
||||
97149 string characters out of 5793775
|
||||
1955187 words of memory out of 5000000
|
||||
27705 multiletter control sequences out of 15000+600000
|
||||
596834 words of font info for 100 fonts, out of 8000000 for 9000
|
||||
6941 strings out of 476076
|
||||
122124 string characters out of 5793775
|
||||
1954187 words of memory out of 5000000
|
||||
28984 multiletter control sequences out of 15000+600000
|
||||
599701 words of font info for 108 fonts, out of 8000000 for 9000
|
||||
14 hyphenation exceptions out of 8191
|
||||
57i,18n,65p,1724b,532s stack positions out of 10000i,1000n,20000p,200000b,200000s
|
||||
57i,18n,65p,1727b,555s stack positions out of 10000i,1000n,20000p,200000b,200000s
|
||||
</usr/share/texmf-dist/fonts/type1/public/amsfonts/cm/cmex10.pfb></usr/share/
|
||||
texmf-dist/fonts/type1/public/amsfonts/cmextra/cmex7.pfb></usr/share/texmf-dist
|
||||
/fonts/type1/public/amsfonts/cm/cmmi10.pfb></usr/share/texmf-dist/fonts/type1/p
|
||||
ublic/amsfonts/cm/cmmi5.pfb></usr/share/texmf-dist/fonts/type1/public/amsfonts/
|
||||
cm/cmmi6.pfb></usr/share/texmf-dist/fonts/type1/public/amsfonts/cm/cmmi7.pfb></
|
||||
usr/share/texmf-dist/fonts/type1/public/amsfonts/cm/cmmi8.pfb></usr/share/texmf
|
||||
-dist/fonts/type1/public/amsfonts/cm/cmr10.pfb></usr/share/texmf-dist/fonts/typ
|
||||
e1/public/amsfonts/cm/cmr5.pfb></usr/share/texmf-dist/fonts/type1/public/amsfon
|
||||
ts/cm/cmr7.pfb></usr/share/texmf-dist/fonts/type1/public/amsfonts/cm/cmsy10.pfb
|
||||
></usr/share/texmf-dist/fonts/type1/public/amsfonts/cm/cmsy7.pfb></usr/share/te
|
||||
xmf-dist/fonts/type1/urw/times/utmb8a.pfb></usr/share/texmf-dist/fonts/type1/ur
|
||||
w/times/utmbi8a.pfb></usr/share/texmf-dist/fonts/type1/urw/times/utmr8a.pfb></u
|
||||
sr/share/texmf-dist/fonts/type1/urw/times/utmri8a.pfb>
|
||||
Output written on ./output/Schrick-Noah_CG-Ep-Modeling.pdf (12 pages, 392875 by
|
||||
/fonts/type1/public/amsfonts/cmextra/cmex8.pfb></usr/share/texmf-dist/fonts/typ
|
||||
e1/public/amsfonts/cm/cmmi10.pfb></usr/share/texmf-dist/fonts/type1/public/amsf
|
||||
onts/cm/cmmi5.pfb></usr/share/texmf-dist/fonts/type1/public/amsfonts/cm/cmmi6.p
|
||||
fb></usr/share/texmf-dist/fonts/type1/public/amsfonts/cm/cmmi7.pfb></usr/share/
|
||||
texmf-dist/fonts/type1/public/amsfonts/cm/cmmi8.pfb></usr/share/texmf-dist/font
|
||||
s/type1/public/amsfonts/cm/cmmi9.pfb></usr/share/texmf-dist/fonts/type1/public/
|
||||
amsfonts/cm/cmr10.pfb></usr/share/texmf-dist/fonts/type1/public/amsfonts/cm/cmr
|
||||
5.pfb></usr/share/texmf-dist/fonts/type1/public/amsfonts/cm/cmr6.pfb></usr/shar
|
||||
e/texmf-dist/fonts/type1/public/amsfonts/cm/cmr7.pfb></usr/share/texmf-dist/fon
|
||||
ts/type1/public/amsfonts/cm/cmr8.pfb></usr/share/texmf-dist/fonts/type1/public/
|
||||
amsfonts/cm/cmr9.pfb></usr/share/texmf-dist/fonts/type1/public/amsfonts/cm/cmsy
|
||||
10.pfb></usr/share/texmf-dist/fonts/type1/public/amsfonts/cm/cmsy5.pfb></usr/sh
|
||||
are/texmf-dist/fonts/type1/public/amsfonts/cm/cmsy7.pfb></usr/share/texmf-dist/
|
||||
fonts/type1/public/amsfonts/cm/cmsy8.pfb></usr/share/texmf-dist/fonts/type1/pub
|
||||
lic/amsfonts/cm/cmsy9.pfb></usr/share/texmf-dist/fonts/type1/urw/times/utmb8a.p
|
||||
fb></usr/share/texmf-dist/fonts/type1/urw/times/utmbi8a.pfb></usr/share/texmf-d
|
||||
ist/fonts/type1/urw/times/utmr8a.pfb></usr/share/texmf-dist/fonts/type1/urw/tim
|
||||
es/utmri8a.pfb>
|
||||
Output written on ./output/Schrick-Noah_CG-Ep-Modeling.pdf (12 pages, 474868 by
|
||||
tes).
|
||||
PDF statistics:
|
||||
153 PDF objects out of 1000 (max. 8388607)
|
||||
78 compressed objects within 1 object stream
|
||||
194 PDF objects out of 1000 (max. 8388607)
|
||||
102 compressed objects within 2 object streams
|
||||
0 named destinations out of 1000 (max. 500000)
|
||||
71 words of extra memory for PDF output out of 10000 (max. 10000000)
|
||||
|
||||
|
||||
Binary file not shown.
Loading…
x
Reference in New Issue
Block a user