CS-7863-Final/Report/Schrick-Noah_CS-7863_Final-Report.toc

26 lines
1.6 KiB
TeX

\babel@toc {nil}{}\relax
\contentsline {section}{\numberline {1}Introduction}{2}{}%
\contentsline {subsection}{\numberline {1.1}Attack Graphs}{2}{}%
\contentsline {subsection}{\numberline {1.2}Compliance Graphs}{2}{}%
\contentsline {subsection}{\numberline {1.3}Difficulties of Compliance Graph Analysis}{3}{}%
\contentsline {section}{\numberline {2}Related Works}{3}{}%
\contentsline {section}{\numberline {3}Experimental Networks}{4}{}%
\contentsline {section}{\numberline {4}Centralities and their Applications to Compliance Graphs}{5}{}%
\contentsline {subsection}{\numberline {4.1}Introduction}{5}{}%
\contentsline {subsection}{\numberline {4.2}Degree}{5}{}%
\contentsline {subsection}{\numberline {4.3}Betweenness}{5}{}%
\contentsline {subsection}{\numberline {4.4}Katz}{6}{}%
\contentsline {subsection}{\numberline {4.5}K-Path Edge}{7}{}%
\contentsline {subsection}{\numberline {4.6}Adapted Page Rank}{7}{}%
\contentsline {section}{\numberline {5}Transitive Closure}{8}{}%
\contentsline {subsection}{\numberline {5.1}Introduction and Application}{8}{}%
\contentsline {section}{\numberline {6}Dominant Tree}{9}{}%
\contentsline {subsection}{\numberline {6.1}Introduction and Application}{9}{}%
\contentsline {section}{\numberline {7}Results and Result Analysis}{10}{}%
\contentsline {subsection}{\numberline {7.1}HIPAA Network}{10}{}%
\contentsline {subsection}{\numberline {7.2}PCI DSS Network}{10}{}%
\contentsline {section}{\numberline {8}Conclusions and Future Work}{10}{}%
\contentsline {section}{Bibliography}{15}{}%
\contentsline {section}{\numberline {A}HIPAA Results}{17}{}%
\contentsline {section}{\numberline {B}PCI DSS Results}{17}{}%