\begin{thebibliography}{1} \bibitem{phillips_graph-based_1998} C.~Phillips and L.~P. Swiler, ``A graph-based system for network-vulnerability analysis,'' {\em Proceedings New Security Paradigms Workshop}, vol.~Part F1292, pp.~71--79, 1998. \newblock doi: 10.1145/310889.310919. \bibitem{schneier_modeling_1999} B.~Schneier, ``Modeling {Security} {Threats},'' {\em Dr. Dobb's Journal}, 1999. \newblock vol. 24, no.12. \bibitem{j_hale_compliance_nodate} {J. Hale}, P.~Hawrylak, and M.~Papa, ``Compliance {Method} for a {Cyber}-{Physical} {System}.'' \newblock U.S. Patent Number 9,471,789, Oct. 18, 2016. \bibitem{baloyi_guidelines_2019} N.~Baloyi and P.~Kotzé, ``Guidelines for {Data} {Privacy} {Compliance}: {A} {Focus} on {Cyberphysical} {Systems} and {Internet} of {Things},'' in {\em {SAICSIT} '19: {Proceedings} of the {South} {African} {Institute} of {Computer} {Scientists} and {Information} {Technologists} 2019}, (Skukuza South Africa), Association for Computing Machinery, 2019. \bibitem{allman_complying_2006} E.~Allman, ``Complying with {Compliance}: {Blowing} it off is not an option.,'' {\em ACM Queue}, vol.~4, no.~7, 2006. \bibitem{Mieghem2018DirectedGA} P.~V. Mieghem, ``Directed graphs and mysterious complex eigenvalues,'' 2018. \bibitem{ming_diss} M.~Li, {\em {A} {System} for {Attack} {Graph} {Generation} and {Analysis}}. \newblock PhD thesis, The {University} of {Tulsa}, 2021. \bibitem{Guo2017HermitianAM} K.~Guo and B.~Mohar, ``Hermitian adjacency matrix of digraphs and mixed graphs,'' {\em Journal of Graph Theory}, vol.~85, 2017. \bibitem{Brualdi2010SpectraOD} R.~A. Brualdi, ``Spectra of digraphs,'' {\em Linear Algebra and its Applications}, vol.~432, pp.~2181--2213, 2010. \end{thebibliography}