\begin{thebibliography}{10} \bibitem{schneier_modeling_1999} B.~Schneier, ``Modeling {Security} {Threats},'' {\em Dr. Dobb's Journal}, 1999. \newblock vol. 24, no.12. \bibitem{j_hale_compliance_nodate} {J. Hale}, P.~Hawrylak, and M.~Papa, ``Compliance {Method} for a {Cyber}-{Physical} {System}.'' \newblock U.S. Patent Number 9,471,789, Oct. 18, 2016. \bibitem{cook_rage_2018} K.~Cook, ``{RAGE}: {The} {Rage} {Attack} {Graph} {Engine},'' Master's thesis, The {University} of {Tulsa}, 2018. \bibitem{berry_graph_2007} J.~Berry and B.~Hendrickson, ``Graph {Analysis} with {High} {Performance} {Computing}.,'' {\em Computing in Science and Engineering}, 2007. \bibitem{zhang_boosting_2017} J.~Zhang, S.~Khoram, and J.~Li, ``Boosting the performance of {FPGA}-based graph processor using hybrid memory cube: {A} case for breadth first search,'' {\em FPGA 2017 - Proceedings of the 2017 ACM/SIGDA International Symposium on Field-Programmable Gate Arrays}, pp.~207--216, 2017. \bibitem{ainsworth_graph_2016} S.~Ainsworth and T.~M. Jones, ``Graph prefetching using data structure knowledge,'' {\em Proceedings of the International Conference on Supercomputing}, vol.~01-03-June, 2016. \bibitem{ou_scalable_2006} X.~Ou, W.~F. Boyer, and M.~A. Mcqueen, ``A {Scalable} {Approach} to {Attack} {Graph} {Generation},'' {\em CCS '06: Proceedings of the 13th ACM conference on Computer and communications security}, pp.~336--345, 2006. \bibitem{CR-Survey} F.~Shahzad, M.~Wittmann, T.~Zeiser, G.~Hager, and G.~Wellein, ``An evaluation of different i/o techniques for checkpoint/restart,'' in {\em 2013 IEEE International Symposium on Parallel and Distributed Processing, Workshops and Phd Forum}, pp.~1708--1716, 2013. \bibitem{hursey2010coordinated} J.~Hursey, {\em Coordinated checkpoint/restart process fault tolerance for MPI applications on HPC systems}. \newblock Indiana University, 2010. \bibitem{SCR} A.~Moody, G.~Bronevetsky, K.~Mohror, and B.~R.~d. Supinski, ``Design, modeling, and evaluation of a scalable multi-level checkpointing system,'' in {\em SC '10: Proceedings of the 2010 ACM/IEEE International Conference for High Performance Computing, Networking, Storage and Analysis}, pp.~1--11, 2010. \bibitem{dmtcp} J.~Ansel, K.~Arya, and G.~Cooperman, ``Dmtcp: Transparent checkpointing for cluster computations and the desktop,'' 2009. \bibitem{BLCR} J.~Duell, P.~H. Hargrove, and E.~S. Roman, ``Requirements for linux checkpoint/restart,'' 2 2002. \bibitem{GraphDB} G.~Simon-Nagy, R.~Fleiner, and A.~Bánáti, ``Attack graph implementation in graph database,'' in {\em 2022 IEEE 20th Jubilee International Symposium on Intelligent Systems and Informatics (SISY)}, pp.~000127--000132, 2022. \bibitem{Graph-DB} B.~Yuan, Z.~Pan, F.~Shi, and Z.~Li, ``An attack path generation methods based on graph database,'' in {\em 2020 IEEE 4th Information Technology, Networking, Electronic and Automation Control Conference (ITNEC)}, vol.~1, pp.~1905--1910, 2020. \bibitem{LAPA} F.~Yi, H.~Y. Cai, and F.~Z. Xin, ``A logic-based attack graph for analyzing network security risk against potential attack,'' in {\em 2018 IEEE International Conference on Networking, Architecture and Storage (NAS)}, pp.~1--4, 2018. \bibitem{cook_scalable_2016} K.~Cook, T.~Shaw, J.~Hale, and P.~Hawrylak, ``Scalable attack graph generation,'' {\em Proceedings of the 11th Annual Cyber and Information Security Research Conference, CISRC 2016}, 2016. \bibitem{li_concurrency_2019} M.~Li, P.~Hawrylak, and J.~Hale, ``Concurrency {Strategies} for {Attack} {Graph} {Generation},'' {\em Proceedings - 2019 2nd International Conference on Data Intelligence and Security, ICDIS 2019}, pp.~174--179, 2019. \bibitem{AG-Sample} O.~Subasi, S.~Purohit, A.~Bhattacharya, and S.~Chatterjee, ``Impact-driven sampling strategies for hybrid attack graphs,'' in {\em 2022 IEEE International Symposium on Technologies for Homeland Security (HST)}, pp.~1--7, 2022. \bibitem{7087377} K.~Kaynar and F.~Sivrikaya, ``Distributed attack graph generation,'' {\em IEEE Transactions on Dependable and Secure Computing}, vol.~13, no.~5, pp.~519--532, 2016. \bibitem{li_combining_2019} M.~Li, P.~Hawrylak, and J.~Hale, ``Combining {OpenCL} and {MPI} to support heterogeneous computing on a cluster,'' {\em ACM International Conference Proceeding Series}, 2019. \bibitem{CR-Simple} N.~El{-}Sayed and B.~Schroeder, ``Checkpoint/restart in practice: When 'simple is better','' in {\em 2014 {IEEE} International Conference on Cluster Computing, {CLUSTER} 2014, Madrid, Spain, September 22-26, 2014}, pp.~84--92, {IEEE} Computer Society, 2014. \end{thebibliography}