2023-12-14 15:44:12 -06:00

111 lines
4.6 KiB
Plaintext

\begin{thebibliography}{10}
\bibitem{schneier_modeling_1999}
B.~Schneier, ``Modeling {Security} {Threats},'' {\em Dr. Dobb's Journal}, 1999.
\newblock vol. 24, no.12.
\bibitem{j_hale_compliance_nodate}
{J. Hale}, P.~Hawrylak, and M.~Papa, ``Compliance {Method} for a
{Cyber}-{Physical} {System}.''
\newblock U.S. Patent Number 9,471,789, Oct. 18, 2016.
\bibitem{cook_rage_2018}
K.~Cook, ``{RAGE}: {The} {Rage} {Attack} {Graph} {Engine},'' Master's thesis,
The {University} of {Tulsa}, 2018.
\bibitem{berry_graph_2007}
J.~Berry and B.~Hendrickson, ``Graph {Analysis} with {High} {Performance}
{Computing}.,'' {\em Computing in Science and Engineering}, 2007.
\bibitem{zhang_boosting_2017}
J.~Zhang, S.~Khoram, and J.~Li, ``Boosting the performance of {FPGA}-based
graph processor using hybrid memory cube: {A} case for breadth first
search,'' {\em FPGA 2017 - Proceedings of the 2017 ACM/SIGDA International
Symposium on Field-Programmable Gate Arrays}, pp.~207--216, 2017.
\bibitem{ainsworth_graph_2016}
S.~Ainsworth and T.~M. Jones, ``Graph prefetching using data structure
knowledge,'' {\em Proceedings of the International Conference on
Supercomputing}, vol.~01-03-June, 2016.
\bibitem{ou_scalable_2006}
X.~Ou, W.~F. Boyer, and M.~A. Mcqueen, ``A {Scalable} {Approach} to {Attack}
{Graph} {Generation},'' {\em CCS '06: Proceedings of the 13th ACM conference
on Computer and communications security}, pp.~336--345, 2006.
\bibitem{CR-Survey}
F.~Shahzad, M.~Wittmann, T.~Zeiser, G.~Hager, and G.~Wellein, ``An evaluation
of different i/o techniques for checkpoint/restart,'' in {\em 2013 IEEE
International Symposium on Parallel and Distributed Processing, Workshops and
Phd Forum}, pp.~1708--1716, 2013.
\bibitem{hursey2010coordinated}
J.~Hursey, {\em Coordinated checkpoint/restart process fault tolerance for MPI
applications on HPC systems}.
\newblock Indiana University, 2010.
\bibitem{SCR}
A.~Moody, G.~Bronevetsky, K.~Mohror, and B.~R.~d. Supinski, ``Design, modeling,
and evaluation of a scalable multi-level checkpointing system,'' in {\em SC
'10: Proceedings of the 2010 ACM/IEEE International Conference for High
Performance Computing, Networking, Storage and Analysis}, pp.~1--11, 2010.
\bibitem{dmtcp}
J.~Ansel, K.~Arya, and G.~Cooperman, ``Dmtcp: Transparent checkpointing for
cluster computations and the desktop,'' 2009.
\bibitem{BLCR}
J.~Duell, P.~H. Hargrove, and E.~S. Roman, ``Requirements for linux
checkpoint/restart,'' 2 2002.
\bibitem{GraphDB}
G.~Simon-Nagy, R.~Fleiner, and A.~Bánáti, ``Attack graph implementation in
graph database,'' in {\em 2022 IEEE 20th Jubilee International Symposium on
Intelligent Systems and Informatics (SISY)}, pp.~000127--000132, 2022.
\bibitem{Graph-DB}
B.~Yuan, Z.~Pan, F.~Shi, and Z.~Li, ``An attack path generation methods based
on graph database,'' in {\em 2020 IEEE 4th Information Technology,
Networking, Electronic and Automation Control Conference (ITNEC)}, vol.~1,
pp.~1905--1910, 2020.
\bibitem{LAPA}
F.~Yi, H.~Y. Cai, and F.~Z. Xin, ``A logic-based attack graph for analyzing
network security risk against potential attack,'' in {\em 2018 IEEE
International Conference on Networking, Architecture and Storage (NAS)},
pp.~1--4, 2018.
\bibitem{cook_scalable_2016}
K.~Cook, T.~Shaw, J.~Hale, and P.~Hawrylak, ``Scalable attack graph
generation,'' {\em Proceedings of the 11th Annual Cyber and Information
Security Research Conference, CISRC 2016}, 2016.
\bibitem{li_concurrency_2019}
M.~Li, P.~Hawrylak, and J.~Hale, ``Concurrency {Strategies} for {Attack}
{Graph} {Generation},'' {\em Proceedings - 2019 2nd International Conference
on Data Intelligence and Security, ICDIS 2019}, pp.~174--179, 2019.
\bibitem{AG-Sample}
O.~Subasi, S.~Purohit, A.~Bhattacharya, and S.~Chatterjee, ``Impact-driven
sampling strategies for hybrid attack graphs,'' in {\em 2022 IEEE
International Symposium on Technologies for Homeland Security (HST)},
pp.~1--7, 2022.
\bibitem{7087377}
K.~Kaynar and F.~Sivrikaya, ``Distributed attack graph generation,'' {\em IEEE
Transactions on Dependable and Secure Computing}, vol.~13, no.~5,
pp.~519--532, 2016.
\bibitem{li_combining_2019}
M.~Li, P.~Hawrylak, and J.~Hale, ``Combining {OpenCL} and {MPI} to support
heterogeneous computing on a cluster,'' {\em ACM International Conference
Proceeding Series}, 2019.
\bibitem{CR-Simple}
N.~El{-}Sayed and B.~Schroeder, ``Checkpoint/restart in practice: When 'simple
is better','' in {\em 2014 {IEEE} International Conference on Cluster
Computing, {CLUSTER} 2014, Madrid, Spain, September 22-26, 2014}, pp.~84--92,
{IEEE} Computer Society, 2014.
\end{thebibliography}