CS-7863-Final/Report/Schrick-Noah_CS-7863_Final-Report.bbl
2022-05-02 22:25:24 -05:00

101 lines
4.0 KiB
Plaintext
Raw Permalink Blame History

This file contains ambiguous Unicode characters

This file contains Unicode characters that might be confused with other characters. If you think that this is intentional, you can safely ignore this warning. Use the Escape button to reveal them.

\begin{thebibliography}{10}
\bibitem{phillips_graph-based_1998}
C.~Phillips and L.~P. Swiler, ``A graph-based system for network-vulnerability
analysis,'' {\em Proceedings New Security Paradigms Workshop}, vol.~Part
F1292, pp.~71--79, 1998.
\newblock doi: 10.1145/310889.310919.
\bibitem{schneier_modeling_1999}
B.~Schneier, ``Modeling {Security} {Threats},'' {\em Dr. Dobb's Journal}, 1999.
\newblock vol. 24, no.12.
\bibitem{j_hale_compliance_nodate}
{J. Hale}, P.~Hawrylak, and M.~Papa, ``Compliance {Method} for a
{Cyber}-{Physical} {System}.''
\newblock U.S. Patent Number 9,471,789, Oct. 18, 2016.
\bibitem{baloyi_guidelines_2019}
N.~Baloyi and P.~Kotzé, ``Guidelines for {Data} {Privacy} {Compliance}: {A}
{Focus} on {Cyberphysical} {Systems} and {Internet} of {Things},'' in {\em
{SAICSIT} '19: {Proceedings} of the {South} {African} {Institute} of
{Computer} {Scientists} and {Information} {Technologists} 2019}, (Skukuza
South Africa), Association for Computing Machinery, 2019.
\bibitem{allman_complying_2006}
E.~Allman, ``Complying with {Compliance}: {Blowing} it off is not an option.,''
{\em ACM Queue}, vol.~4, no.~7, 2006.
\bibitem{newman2010networks}
M.~Newman, {\em Networks: An Introduction}.
\newblock Oxford University Press, 2010.
\bibitem{Mieghem2018DirectedGA}
P.~V. Mieghem, ``Directed graphs and mysterious complex eigenvalues,'' 2018.
\bibitem{ming_diss}
M.~Li, {\em {A} {System} for {Attack} {Graph} {Generation} and {Analysis}}.
\newblock PhD thesis, The {University} of {Tulsa}, 2021.
\bibitem{Guo2017HermitianAM}
K.~Guo and B.~Mohar, ``Hermitian adjacency matrix of digraphs and mixed
graphs,'' {\em Journal of Graph Theory}, vol.~85, 2017.
\bibitem{Brualdi2010SpectraOD}
R.~A. Brualdi, ``Spectra of digraphs,'' {\em Linear Algebra and its
Applications}, vol.~432, pp.~2181--2213, 2010.
\bibitem{noauthor_health_1996}
``Health {Insurance} {Portability} and {Accountability} {Act} of 1996.''
\newblock Pub. L. No. 104-191. 1996 [Online]. Available:
https://www.govinfo.gov/content/pkg/PLAW-104publ191/html/PLAW-104publ191.htm.
\bibitem{PCI}
P.~S.~S. Council, ``Payment {Card} {Industry} {(PCI)} {Data} {Security}
{Standard},'' May 2018.
\newblock {Available:
https://www.pcisecuritystandards.org/documents/PCI$\_$DSS$\_$v3-2-1.pdf}.
\bibitem{PMID:30064421}
M.~Ashtiani, A.~Salehzadeh-Yazdi, Z.~Razaghi-Moghadam, H.~Hennig,
O.~Wolkenhauer, M.~Mirzaie, and M.~Jafari, ``A systematic survey of
centrality measures for protein-protein interaction networks,'' {\em BMC
systems biology}, vol.~12, p.~80, July 2018.
\bibitem{Katz}
L.~Katz, ``{A new status index derived from sociometric analysis},'' {\em
Psychometrika}, vol.~18, pp.~39--43, March 1953.
\bibitem{K_Path_Edge}
P.~D. Meo, E.~Ferrara, G.~Fiumara, and A.~Ricciardello, ``A novel measure of
edge centrality in social networks,'' {\em Knowledge-Based Systems}, vol.~30,
pp.~136--150, jun 2012.
\bibitem{PageRank}
S.~Brin and L.~Page, ``The anatomy of a large-scale hypertextual web search
engine,'' {\em Computer Networks and ISDN Systems}, vol.~30, no.~1,
pp.~107--117, 1998.
\newblock Proceedings of the Seventh International World Wide Web Conference.
\bibitem{Adapted_PageRank}
T.~Agryzkov, J.~L. Oliver, L.~Tortosa, and J.-F. Vicent, ``An algorithm for
ranking the nodes of an urban network based on the concept of pagerank
vector,'' {\em Appl. Math. Comput.}, vol.~219, pp.~2186--2193, 2012.
\bibitem{li_combining_2019}
M.~Li, P.~Hawrylak, and J.~Hale, ``Combining {OpenCL} and {MPI} to support
heterogeneous computing on a cluster,'' {\em ACM International Conference
Proceeding Series}, 2019.
\bibitem{zeng_cyber_2017}
K.~Zeng, ``Cyber {Attack} {Analysis} {Based} on {Markov} {Process} {Model},''
2017.
\bibitem{dominance}
R.~T. Prosser, ``Applications of boolean matrices to the analysis of flow
diagrams,'' in {\em Papers Presented at the December 1-3, 1959, Eastern Joint
IRE-AIEE-ACM Computer Conference}, IRE-AIEE-ACM '59 (Eastern), (New York, NY,
USA), p.~133138, Association for Computing Machinery, 1959.
\end{thebibliography}