Outline for entire thesis

This commit is contained in:
Noah L. Schrick 2022-02-25 16:48:12 -06:00
parent 08dae8e19a
commit c0ed4c3607
21 changed files with 317 additions and 436 deletions

View File

@ -1,24 +1,19 @@
\relax \relax
\@writefile{toc}{\contentsline {section}{\hspace {-\parindent }APPENDIX A:\ \ {\bf \uppercase {THE FIRST APPENDIX}} }{22}{}\protected@file@percent } \@writefile{toc}{\contentsline {section}{\hspace {-\parindent }APPENDIX A:\ \ {\bf \uppercase {THE FIRST APPENDIX}} }{18}{}\protected@file@percent }
\newlabel{App:A}{{A}{22}} \newlabel{App:A}{{A}{18}}
\@writefile{lot}{\contentsline {table}{\numberline {A.1}{\ignorespaces Title of the Only Table in this Appendix.}}{22}{}\protected@file@percent } \@writefile{toc}{\contentsline {section}{\hspace {-\parindent }APPENDIX B:\ \ {\bf \uppercase {THE SECOND APPENDIX}} }{19}{}\protected@file@percent }
\@writefile{toc}{\contentsline {section}{\hspace {-\parindent }APPENDIX B:\ \ {\bf \uppercase {THE SECOND APPENDIX}} }{23}{}\protected@file@percent } \newlabel{App:B}{{B}{19}}
\newlabel{App:B}{{B}{23}} \@writefile{toc}{\contentsline {section}{\numberline {B.1}\bf A Heading in an Appendix}{19}{}\protected@file@percent }
\@writefile{toc}{\contentsline {section}{\numberline {B.1}\bf A Heading in an Appendix}{23}{}\protected@file@percent } \@writefile{toc}{\contentsline {subsection}{\numberline {B.1.1}\it A Subheading in an Appendix}{19}{}\protected@file@percent }
\@writefile{toc}{\contentsline {subsection}{\numberline {B.1.1}\it A Subheading in an Appendix}{23}{}\protected@file@percent } \@writefile{toc}{\contentsline {subsubsection}{A Sub-subsection in an Appendix}{19}{}\protected@file@percent }
\@writefile{toc}{\contentsline {subsubsection}{A Sub-subsection in an Appendix}{23}{}\protected@file@percent }
\@writefile{lot}{\contentsline {table}{\numberline {B.1}{\ignorespaces Title of the First Table in this Appendix.}}{23}{}\protected@file@percent }
\@writefile{lof}{\contentsline {figure}{\numberline {B.1}{\ignorespaces Title of the First Figure in this Appendix.}}{24}{}\protected@file@percent }
\@writefile{lot}{\contentsline {table}{\numberline {B.2}{\ignorespaces Title of the Second Table in this Appendix.}}{24}{}\protected@file@percent }
\@writefile{lof}{\contentsline {figure}{\numberline {B.2}{\ignorespaces Title of the Second Figure in this Appendix.}}{24}{}\protected@file@percent }
\@setckpt{Appendices}{ \@setckpt{Appendices}{
\setcounter{page}{25} \setcounter{page}{20}
\setcounter{equation}{0} \setcounter{equation}{0}
\setcounter{enumi}{0} \setcounter{enumi}{0}
\setcounter{enumii}{0} \setcounter{enumii}{0}
\setcounter{enumiii}{0} \setcounter{enumiii}{0}
\setcounter{enumiv}{6} \setcounter{enumiv}{6}
\setcounter{footnote}{1} \setcounter{footnote}{0}
\setcounter{mpfootnote}{0} \setcounter{mpfootnote}{0}
\setcounter{part}{0} \setcounter{part}{0}
\setcounter{chapter}{7} \setcounter{chapter}{7}
@ -27,8 +22,8 @@
\setcounter{subsubsection}{0} \setcounter{subsubsection}{0}
\setcounter{paragraph}{0} \setcounter{paragraph}{0}
\setcounter{subparagraph}{0} \setcounter{subparagraph}{0}
\setcounter{figure}{2} \setcounter{figure}{0}
\setcounter{table}{2} \setcounter{table}{0}
\setcounter{lofdepth}{1} \setcounter{lofdepth}{1}
\setcounter{lotdepth}{1} \setcounter{lotdepth}{1}
\setcounter{appendixno}{2} \setcounter{appendixno}{2}

View File

@ -1,50 +1,7 @@
\TUappendix{THE FIRST APPENDIX} \TUappendix{THE FIRST APPENDIX}
\label{App:A} \label{App:A}
Text in the appendix. Now we will type in a little more text so
that we can see if the paragraph is properly indented.
\begin{table}
\suppressfloats[t] \centerline{Normally a table would go here.}
\caption{Title of the Only Table in this Appendix.}
\end{table}
\TUappendix{THE SECOND APPENDIX} \TUappendix{THE SECOND APPENDIX}
\label{App:B} \label{App:B}
Of course this is the material that goes in the second appendix.
What did you expect to find here?
\TUsection{A Heading in an Appendix} \TUsection{A Heading in an Appendix}
A recent modification corrects the numbering of sections,
subsections and subsubsection in the appendix.
\TUsubsection{A Subheading in an Appendix} \TUsubsection{A Subheading in an Appendix}
\TUsubsubsection{A Sub-subsection in an Appendix}
The subsection appears to work.
\TUsubsubsection{A Sub-subsection in an Appendix} And the sub subsection also works. Finally we test that figures
and tables also work.
\begin{table}
\suppressfloats[t] \centerline{Normally a table would go here.}
\caption{Title of the First Table in this Appendix.}
\end{table}
\begin{figure}
\suppressfloats[t]
\centerline{Normally a figure would go here.}
\caption{Title of the First Figure in this Appendix.}
\end{figure}
\begin{table}
\suppressfloats[t] \centerline{Normally a table would go here.}
\caption{Title of the Second Table in this Appendix.}
\end{table}
\begin{figure}
\suppressfloats[t] \centerline{Normally a figure would go here.}
\caption{Title of the Second Figure in this Appendix.}
\end{figure}

View File

@ -1,14 +1,10 @@
\relax \relax
\@writefile{toc}{\contentsline {chapter}{\numberline {CHAPTER 1: }{\bf \uppercase {INTRODUCTION}}}{1}{}\protected@file@percent } \@writefile{toc}{\contentsline {chapter}{\numberline {CHAPTER 1: }{\bf \uppercase {INTRODUCTION}}}{1}{}\protected@file@percent }
\@writefile{toc}{\contentsline {section}{\numberline {1.1}\bf First Heading: The Introduction}{1}{}\protected@file@percent } \@writefile{toc}{\contentsline {section}{\numberline {1.1}\bf Introduction to Attack Graphs}{1}{}\protected@file@percent }
\@writefile{toc}{\contentsline {section}{\numberline {1.2}\bf Second Heading}{1}{}\protected@file@percent } \@writefile{toc}{\contentsline {section}{\numberline {1.2}\bf Application to Cybersecurity and Compliance}{1}{}\protected@file@percent }
\@writefile{toc}{\contentsline {subsection}{\numberline {1.2.1}\it First Subheading}{1}{}\protected@file@percent } \@writefile{toc}{\contentsline {section}{\numberline {1.3}\bf Objectives and Contributions}{1}{}\protected@file@percent }
\@writefile{toc}{\contentsline {subsection}{\numberline {1.2.2}\it Second Subheading}{1}{}\protected@file@percent }
\@writefile{toc}{\contentsline {subsubsection}{First Sub-subsection Header}{1}{}\protected@file@percent }
\@writefile{lof}{\contentsline {figure}{\numberline {1.1}{\ignorespaces Title of the First Figure.}}{1}{}\protected@file@percent }
\@writefile{lot}{\contentsline {table}{\numberline {1.1}{\ignorespaces Title of the First Table.}}{2}{}\protected@file@percent }
\@setckpt{Chapter1}{ \@setckpt{Chapter1}{
\setcounter{page}{3} \setcounter{page}{2}
\setcounter{equation}{0} \setcounter{equation}{0}
\setcounter{enumi}{0} \setcounter{enumi}{0}
\setcounter{enumii}{0} \setcounter{enumii}{0}
@ -18,13 +14,13 @@
\setcounter{mpfootnote}{0} \setcounter{mpfootnote}{0}
\setcounter{part}{0} \setcounter{part}{0}
\setcounter{chapter}{1} \setcounter{chapter}{1}
\setcounter{section}{2} \setcounter{section}{3}
\setcounter{subsection}{2} \setcounter{subsection}{0}
\setcounter{subsubsection}{0} \setcounter{subsubsection}{0}
\setcounter{paragraph}{0} \setcounter{paragraph}{0}
\setcounter{subparagraph}{0} \setcounter{subparagraph}{0}
\setcounter{figure}{1} \setcounter{figure}{0}
\setcounter{table}{1} \setcounter{table}{0}
\setcounter{lofdepth}{1} \setcounter{lofdepth}{1}
\setcounter{lotdepth}{1} \setcounter{lotdepth}{1}
} }

View File

@ -1,29 +1,7 @@
\TUchapter{INTRODUCTION} \TUchapter{INTRODUCTION}
\TUsection{First Heading: The Introduction} \TUsection{Introduction to Attack Graphs}
%This is the first section of the introduction. For additional
%information see %\cite{Sham,Scot95} or just for fun you may wish to
%read \cite{Mathematica}.
Here is the beginning of a second paragraph. \TUsection{Application to Cybersecurity and Compliance}
\TUsection{Objectives and Contributions}
\TUsection{Second Heading} This is the text for the second
section.
\TUsubsection{First Subheading} This is text for the first
subsection.
\TUsubsection{Second Subheading}
This is the text which lies in the second subsection.
\TUsubsubsection{First Sub-subsection Header} This
language lies in the first sub subsection. Since they are the same
font and indentation, the header looks a little bit like the text
itself, so there is a colon and a little extra space after the
sub-subsection heading. This is all taken care of in the TUthesis
style page. Here, we refer to Appendix~\ref{App:A} and Appendix~\ref{App:B} to check that
the references appear as capital letters.
\begin{figure}
\centerline{Normally a figure would go here.}
\caption{Title of the First Figure.}
\end{figure}
\begin{table}
\centerline{Normally a table would go here.}
\caption{Title of the First Table.}
\end{table}

View File

@ -1,28 +1,27 @@
\relax \relax
\@writefile{toc}{\contentsline {chapter}{\numberline {CHAPTER 2: }{\bf \uppercase {RELATED WORKS}}}{3}{}\protected@file@percent } \@writefile{toc}{\contentsline {chapter}{\numberline {CHAPTER 2: }{\bf \uppercase {RELATED WORKS}}}{2}{}\protected@file@percent }
\@writefile{toc}{\contentsline {section}{\numberline {2.1}\bf First Heading}{3}{}\protected@file@percent } \@writefile{toc}{\contentsline {section}{\numberline {2.1}\bf Introduction to Graph Generation}{2}{}\protected@file@percent }
\@writefile{toc}{\contentsline {section}{\numberline {2.2}\bf Second Heading}{4}{}\protected@file@percent } \@writefile{toc}{\contentsline {section}{\numberline {2.2}\bf Improvements to Attack Graph Generation}{2}{}\protected@file@percent }
\@writefile{lof}{\contentsline {figure}{\numberline {2.1}{\ignorespaces Title of the Second Figure}}{4}{}\protected@file@percent } \@writefile{toc}{\contentsline {section}{\numberline {2.3}\bf Attack Dependency Graphs}{2}{}\protected@file@percent }
\@writefile{lot}{\contentsline {table}{\numberline {2.1}{\ignorespaces Title of the Second Table}}{4}{}\protected@file@percent } \@writefile{toc}{\contentsline {section}{\numberline {2.4}\bf Compliance Graphs}{2}{}\protected@file@percent }
\@writefile{lot}{\contentsline {table}{\numberline {2.2}{\ignorespaces Title of the Third Table}}{4}{}\protected@file@percent }
\@setckpt{Chapter2}{ \@setckpt{Chapter2}{
\setcounter{page}{5} \setcounter{page}{3}
\setcounter{equation}{0} \setcounter{equation}{0}
\setcounter{enumi}{0} \setcounter{enumi}{0}
\setcounter{enumii}{0} \setcounter{enumii}{0}
\setcounter{enumiii}{0} \setcounter{enumiii}{0}
\setcounter{enumiv}{0} \setcounter{enumiv}{0}
\setcounter{footnote}{1} \setcounter{footnote}{0}
\setcounter{mpfootnote}{0} \setcounter{mpfootnote}{0}
\setcounter{part}{0} \setcounter{part}{0}
\setcounter{chapter}{2} \setcounter{chapter}{2}
\setcounter{section}{2} \setcounter{section}{4}
\setcounter{subsection}{0} \setcounter{subsection}{0}
\setcounter{subsubsection}{0} \setcounter{subsubsection}{0}
\setcounter{paragraph}{0} \setcounter{paragraph}{0}
\setcounter{subparagraph}{0} \setcounter{subparagraph}{0}
\setcounter{figure}{1} \setcounter{figure}{0}
\setcounter{table}{2} \setcounter{table}{0}
\setcounter{lofdepth}{1} \setcounter{lofdepth}{1}
\setcounter{lotdepth}{1} \setcounter{lotdepth}{1}
} }

View File

@ -1,22 +1,11 @@
\TUchapter{RELATED WORKS} \TUchapter{RELATED WORKS}
\TUsection{First Heading} \TUsection{Introduction to Graph Generation}
\par This is the beginning of the second chapter and the first section of the second chapter. The rest of the text in this section is meaningless filler.\footnote{The filler used on this page is of a family called \emph{Lorem Ipsum}. It was generated by http://www.lipsum.com/feed/html on August 18, 2014 at 8:08 pm Central Time. The site explains the history of \emph{Lorem Ipsum} filler, the reason for using it, and a procedure for generating it.}
Lorem ipsum dolor sit amet, consectetur adipiscing elit. Integer luctus feugiat odio et fermentum. Etiam ut vulputate tellus. Aenean sed libero nec nibh gravida consequat eu vel diam. Nullam at accumsan purus. Nullam sit amet nulla et orci dapibus mollis. Etiam placerat, lacus eget venenatis bibendum, metus odio commodo nisi, sed scelerisque nulla odio vel nibh. Mauris vitae elementum turpis. \TUsection{Improvements to Attack Graph Generation}
\TUsection{Attack Dependency Graphs}
\TUsection{Compliance Graphs}
Proin eu lectus non odio vestibulum fermentum nec et leo. Integer ut leo velit. Curabitur nec est eget felis accumsan interdum. Duis fermentum turpis id mauris blandit convallis. Morbi risus arcu, ornare eget lectus in, accumsan rutrum mi. Nulla facilisi. Donec iaculis nisl vitae erat luctus, vitae consequat mi condimentum. Duis imperdiet enim sapien, vitae suscipit neque ullamcorper sit amet. Aliquam placerat lorem risus, at tempor lectus placerat egestas. Vestibulum rhoncus, eros ut posuere cursus, mauris nisl egestas tortor, ac dignissim est libero pretium arcu. Fusce mollis lacus est, id vulputate leo ultrices sit amet. Quisque condimentum justo risus, posuere volutpat velit congue tempor. Integer quis nunc at nibh posuere congue ut et diam. Vestibulum ante ipsum primis in faucibus orci luctus et ultrices posuere cubilia Curae; Maecenas id feugiat est, sit amet viverra tortor.
\TUsection{Second Heading} Second section of the second chapter.
\begin{figure}[htp]
\vspace{.2truein} \centerline{Normally a figure would go here.}
\caption{Title of the Second Figure}
\end{figure}
\begin{table}[htp]
\vspace{.2truein} \centerline{Normally a figure would go here.}
\caption{Title of the Second Table}
\end{table}
\begin{table}[htp]
\vspace{.2truein} \centerline{Normally a figure would go here.}
\caption{Title of the Third Table}
\end{table}\\

View File

@ -1,13 +1,13 @@
\relax \relax
\@writefile{toc}{\contentsline {chapter}{\numberline {CHAPTER 3: }{\bf \uppercase {UTILITY EXTENSIONS TO THE RAGE ATTACK GRAPH GENERATOR}}}{5}{}\protected@file@percent } \@writefile{toc}{\contentsline {chapter}{\numberline {CHAPTER 3: }{\bf \uppercase {UTILITY EXTENSIONS TO THE RAGE ATTACK GRAPH GENERATOR}}}{3}{}\protected@file@percent }
\@writefile{toc}{\contentsline {section}{\numberline {3.1}\bf Path Walking}{5}{}\protected@file@percent } \@writefile{toc}{\contentsline {section}{\numberline {3.1}\bf Path Walking}{3}{}\protected@file@percent }
\citation{cook_rage_2018} \citation{cook_rage_2018}
\@writefile{lof}{\contentsline {figure}{\numberline {3.1}{\ignorespaces Path Walking to State 14}}{6}{}\protected@file@percent } \@writefile{lof}{\contentsline {figure}{\numberline {3.1}{\ignorespaces Path Walking to State 14}}{4}{}\protected@file@percent }
\newlabel{fig:PW}{{3.1}{6}} \newlabel{fig:PW}{{3.1}{4}}
\@writefile{toc}{\contentsline {section}{\numberline {3.2}\bf Compound Operators}{6}{}\protected@file@percent } \@writefile{toc}{\contentsline {section}{\numberline {3.2}\bf Compound Operators}{4}{}\protected@file@percent }
\@writefile{toc}{\contentsline {section}{\numberline {3.3}\bf Color Coding}{7}{}\protected@file@percent } \@writefile{toc}{\contentsline {section}{\numberline {3.3}\bf Color Coding}{5}{}\protected@file@percent }
\@writefile{lof}{\contentsline {figure}{\numberline {3.2}{\ignorespaces Color Coding a Small Network Based on Violations}}{8}{}\protected@file@percent } \@writefile{lof}{\contentsline {figure}{\numberline {3.2}{\ignorespaces Color Coding a Small Network Based on Violations}}{6}{}\protected@file@percent }
\newlabel{fig:CC}{{3.2}{8}} \newlabel{fig:CC}{{3.2}{6}}
\citation{cook_rage_2018} \citation{cook_rage_2018}
\citation{li_concurrency_2019} \citation{li_concurrency_2019}
\citation{li_combining_2019} \citation{li_combining_2019}
@ -16,13 +16,13 @@
\citation{berry_graph_2007} \citation{berry_graph_2007}
\citation{cook_rage_2018} \citation{cook_rage_2018}
\citation{zhang_boosting_2017} \citation{zhang_boosting_2017}
\@writefile{toc}{\contentsline {section}{\numberline {3.4}\bf Intermediate Database Storage}{9}{}\protected@file@percent } \@writefile{toc}{\contentsline {section}{\numberline {3.4}\bf Intermediate Database Storage}{7}{}\protected@file@percent }
\@writefile{toc}{\contentsline {subsection}{\numberline {3.4.1}\it Memory Constraint Difficulties}{9}{}\protected@file@percent } \@writefile{toc}{\contentsline {subsection}{\numberline {3.4.1}\it Memory Constraint Difficulties}{7}{}\protected@file@percent }
\@writefile{toc}{\contentsline {subsection}{\numberline {3.4.2}\it Maximizing Performance with Intermediate Database Storage}{10}{}\protected@file@percent } \@writefile{toc}{\contentsline {subsection}{\numberline {3.4.2}\it Maximizing Performance with Intermediate Database Storage}{8}{}\protected@file@percent }
\@writefile{toc}{\contentsline {subsection}{\numberline {3.4.3}\it Portability}{11}{}\protected@file@percent } \@writefile{toc}{\contentsline {subsection}{\numberline {3.4.3}\it Portability}{9}{}\protected@file@percent }
\@writefile{toc}{\contentsline {section}{\numberline {3.5}\bf Relational Operators}{12}{}\protected@file@percent } \@writefile{toc}{\contentsline {section}{\numberline {3.5}\bf Relational Operators}{10}{}\protected@file@percent }
\@setckpt{Chapter3}{ \@setckpt{Chapter3}{
\setcounter{page}{13} \setcounter{page}{11}
\setcounter{equation}{0} \setcounter{equation}{0}
\setcounter{enumi}{0} \setcounter{enumi}{0}
\setcounter{enumii}{0} \setcounter{enumii}{0}

View File

@ -1,28 +1,29 @@
\relax \relax
\@writefile{toc}{\contentsline {chapter}{\numberline {CHAPTER 4: }{\bf \uppercase {SYNCHRONOUS FIRING}}}{13}{}\protected@file@percent } \@writefile{toc}{\contentsline {chapter}{\numberline {CHAPTER 4: }{\bf \uppercase {SYNCHRONOUS FIRING}}}{11}{}\protected@file@percent }
\@writefile{toc}{\contentsline {section}{\numberline {4.1}\bf First Heading}{13}{}\protected@file@percent } \@writefile{toc}{\contentsline {section}{\numberline {4.1}\bf Introduction}{11}{}\protected@file@percent }
\@writefile{toc}{\contentsline {section}{\numberline {4.2}\bf Second Heading}{14}{}\protected@file@percent } \@writefile{toc}{\contentsline {subsection}{\numberline {4.1.1}\it Synchronous Firing in Literature}{11}{}\protected@file@percent }
\@writefile{lof}{\contentsline {figure}{\numberline {4.1}{\ignorespaces Title of the Second Figure}}{14}{}\protected@file@percent } \@writefile{toc}{\contentsline {section}{\numberline {4.2}\bf Necessary Components}{11}{}\protected@file@percent }
\@writefile{lot}{\contentsline {table}{\numberline {4.1}{\ignorespaces Title of the Second Table}}{14}{}\protected@file@percent } \@writefile{toc}{\contentsline {section}{\numberline {4.3}\bf Example Networks and Results}{11}{}\protected@file@percent }
\@writefile{lot}{\contentsline {table}{\numberline {4.2}{\ignorespaces Title of the Third Table}}{14}{}\protected@file@percent } \@writefile{toc}{\contentsline {subsection}{\numberline {4.3.1}\it Example Networks}{11}{}\protected@file@percent }
\@writefile{toc}{\contentsline {subsection}{\numberline {4.3.2}\it Results}{11}{}\protected@file@percent }
\@setckpt{Chapter4}{ \@setckpt{Chapter4}{
\setcounter{page}{15} \setcounter{page}{12}
\setcounter{equation}{0} \setcounter{equation}{0}
\setcounter{enumi}{0} \setcounter{enumi}{0}
\setcounter{enumii}{0} \setcounter{enumii}{0}
\setcounter{enumiii}{0} \setcounter{enumiii}{0}
\setcounter{enumiv}{0} \setcounter{enumiv}{0}
\setcounter{footnote}{1} \setcounter{footnote}{0}
\setcounter{mpfootnote}{0} \setcounter{mpfootnote}{0}
\setcounter{part}{0} \setcounter{part}{0}
\setcounter{chapter}{4} \setcounter{chapter}{4}
\setcounter{section}{2} \setcounter{section}{3}
\setcounter{subsection}{0} \setcounter{subsection}{2}
\setcounter{subsubsection}{0} \setcounter{subsubsection}{0}
\setcounter{paragraph}{0} \setcounter{paragraph}{0}
\setcounter{subparagraph}{0} \setcounter{subparagraph}{0}
\setcounter{figure}{1} \setcounter{figure}{0}
\setcounter{table}{2} \setcounter{table}{0}
\setcounter{lofdepth}{1} \setcounter{lofdepth}{1}
\setcounter{lotdepth}{1} \setcounter{lotdepth}{1}
} }

View File

@ -1,22 +1,13 @@
\TUchapter{SYNCHRONOUS FIRING} \TUchapter{SYNCHRONOUS FIRING}
\TUsection{First Heading} \TUsection{Introduction}
\par This is the beginning of the second chapter and the first section of the second chapter. The rest of the text in this section is meaningless filler.\footnote{The filler used on this page is of a family called \emph{Lorem Ipsum}. It was generated by http://www.lipsum.com/feed/html on August 18, 2014 at 8:08 pm Central Time. The site explains the history of \emph{Lorem Ipsum} filler, the reason for using it, and a procedure for generating it.}
Lorem ipsum dolor sit amet, consectetur adipiscing elit. Integer luctus feugiat odio et fermentum. Etiam ut vulputate tellus. Aenean sed libero nec nibh gravida consequat eu vel diam. Nullam at accumsan purus. Nullam sit amet nulla et orci dapibus mollis. Etiam placerat, lacus eget venenatis bibendum, metus odio commodo nisi, sed scelerisque nulla odio vel nibh. Mauris vitae elementum turpis. \TUsubsection{Synchronous Firing in Literature}
Proin eu lectus non odio vestibulum fermentum nec et leo. Integer ut leo velit. Curabitur nec est eget felis accumsan interdum. Duis fermentum turpis id mauris blandit convallis. Morbi risus arcu, ornare eget lectus in, accumsan rutrum mi. Nulla facilisi. Donec iaculis nisl vitae erat luctus, vitae consequat mi condimentum. Duis imperdiet enim sapien, vitae suscipit neque ullamcorper sit amet. Aliquam placerat lorem risus, at tempor lectus placerat egestas. Vestibulum rhoncus, eros ut posuere cursus, mauris nisl egestas tortor, ac dignissim est libero pretium arcu. Fusce mollis lacus est, id vulputate leo ultrices sit amet. Quisque condimentum justo risus, posuere volutpat velit congue tempor. Integer quis nunc at nibh posuere congue ut et diam. Vestibulum ante ipsum primis in faucibus orci luctus et ultrices posuere cubilia Curae; Maecenas id feugiat est, sit amet viverra tortor. \TUsection{Necessary Components}
\TUsection{Example Networks and Results}
\TUsubsection{Example Networks}
\TUsubsection{Results}
\TUsection{Second Heading} Second section of the second chapter.
\begin{figure}[htp]
\vspace{.2truein} \centerline{Normally a figure would go here.}
\caption{Title of the Second Figure}
\end{figure}
\begin{table}[htp]
\vspace{.2truein} \centerline{Normally a figure would go here.}
\caption{Title of the Second Table}
\end{table}
\begin{table}[htp]
\vspace{.2truein} \centerline{Normally a figure would go here.}
\caption{Title of the Third Table}
\end{table}\\

View File

@ -1,28 +1,46 @@
\relax \relax
\@writefile{toc}{\contentsline {chapter}{\numberline {CHAPTER 5: }{\bf \uppercase {IMPLEMENTATION OF MESSAGE PASSING INTERFACE}}}{15}{}\protected@file@percent } \@writefile{toc}{\contentsline {chapter}{\numberline {CHAPTER 5: }{\bf \uppercase {IMPLEMENTATION OF MESSAGE PASSING INTERFACE}}}{12}{}\protected@file@percent }
\@writefile{toc}{\contentsline {section}{\numberline {5.1}\bf Tasking Approach}{15}{}\protected@file@percent } \@writefile{toc}{\contentsline {section}{\numberline {5.1}\bf Introduction to MPI Utilization for Attack Graph Generation}{12}{}\protected@file@percent }
\@writefile{toc}{\contentsline {section}{\numberline {5.2}\bf Subgraphing Approach}{16}{}\protected@file@percent } \@writefile{toc}{\contentsline {section}{\numberline {5.2}\bf Necessary Components}{12}{}\protected@file@percent }
\@writefile{lof}{\contentsline {figure}{\numberline {5.1}{\ignorespaces Title of the Second Figure}}{16}{}\protected@file@percent } \@writefile{toc}{\contentsline {subsection}{\numberline {5.2.1}\it Serialization}{12}{}\protected@file@percent }
\@writefile{lot}{\contentsline {table}{\numberline {5.1}{\ignorespaces Title of the Second Table}}{16}{}\protected@file@percent } \@writefile{toc}{\contentsline {subsection}{\numberline {5.2.2}\it Data Consistency}{12}{}\protected@file@percent }
\@writefile{lot}{\contentsline {table}{\numberline {5.2}{\ignorespaces Title of the Third Table}}{16}{}\protected@file@percent } \@writefile{toc}{\contentsline {section}{\numberline {5.3}\bf Tasking Approach}{12}{}\protected@file@percent }
\@writefile{toc}{\contentsline {subsection}{\numberline {5.3.1}\it Introduction to the Tasking Approach}{12}{}\protected@file@percent }
\@writefile{toc}{\contentsline {subsection}{\numberline {5.3.2}\it Algorithm Design}{12}{}\protected@file@percent }
\@writefile{toc}{\contentsline {subsubsection}{Communication Structure}{12}{}\protected@file@percent }
\@writefile{toc}{\contentsline {subsubsection}{Task Zero}{12}{}\protected@file@percent }
\@writefile{toc}{\contentsline {subsubsection}{Task One}{12}{}\protected@file@percent }
\@writefile{toc}{\contentsline {subsubsection}{Task Two}{12}{}\protected@file@percent }
\@writefile{toc}{\contentsline {subsubsection}{Task Three}{12}{}\protected@file@percent }
\@writefile{toc}{\contentsline {subsubsection}{Task Four}{12}{}\protected@file@percent }
\@writefile{toc}{\contentsline {subsubsection}{Task Five}{13}{}\protected@file@percent }
\@writefile{toc}{\contentsline {subsection}{\numberline {5.3.3}\it Performance Expectations}{13}{}\protected@file@percent }
\@writefile{toc}{\contentsline {section}{\numberline {5.4}\bf Subgraphing Approach}{13}{}\protected@file@percent }
\@writefile{toc}{\contentsline {subsection}{\numberline {5.4.1}\it Introduction to the Subgraphing Approach}{13}{}\protected@file@percent }
\@writefile{toc}{\contentsline {subsection}{\numberline {5.4.2}\it Algorithm Design}{13}{}\protected@file@percent }
\@writefile{toc}{\contentsline {subsubsection}{Communication Structure}{13}{}\protected@file@percent }
\@writefile{toc}{\contentsline {subsubsection}{Worker Nodes}{13}{}\protected@file@percent }
\@writefile{toc}{\contentsline {subsubsection}{Root Node}{13}{}\protected@file@percent }
\@writefile{toc}{\contentsline {subsubsection}{Database Node}{13}{}\protected@file@percent }
\@writefile{toc}{\contentsline {subsection}{\numberline {5.4.3}\it Performance Expectations}{13}{}\protected@file@percent }
\@setckpt{Chapter5}{ \@setckpt{Chapter5}{
\setcounter{page}{17} \setcounter{page}{14}
\setcounter{equation}{0} \setcounter{equation}{0}
\setcounter{enumi}{0} \setcounter{enumi}{0}
\setcounter{enumii}{0} \setcounter{enumii}{0}
\setcounter{enumiii}{0} \setcounter{enumiii}{0}
\setcounter{enumiv}{0} \setcounter{enumiv}{0}
\setcounter{footnote}{1} \setcounter{footnote}{0}
\setcounter{mpfootnote}{0} \setcounter{mpfootnote}{0}
\setcounter{part}{0} \setcounter{part}{0}
\setcounter{chapter}{5} \setcounter{chapter}{5}
\setcounter{section}{2} \setcounter{section}{4}
\setcounter{subsection}{0} \setcounter{subsection}{3}
\setcounter{subsubsection}{0} \setcounter{subsubsection}{0}
\setcounter{paragraph}{0} \setcounter{paragraph}{0}
\setcounter{subparagraph}{0} \setcounter{subparagraph}{0}
\setcounter{figure}{1} \setcounter{figure}{0}
\setcounter{table}{2} \setcounter{table}{0}
\setcounter{lofdepth}{1} \setcounter{lofdepth}{1}
\setcounter{lotdepth}{1} \setcounter{lotdepth}{1}
} }

View File

@ -1,22 +1,33 @@
\TUchapter{IMPLEMENTATION OF MESSAGE PASSING INTERFACE} \TUchapter{IMPLEMENTATION OF MESSAGE PASSING INTERFACE}
\TUsection{Introduction to MPI Utilization for Attack Graph Generation}
\TUsection{Necessary Components}
\TUsubsection{Serialization}
\TUsubsection{Data Consistency}
\TUsection{Tasking Approach} \TUsection{Tasking Approach}
\par This is the beginning of the second chapter and the first section of the second chapter. The rest of the text in this section is meaningless filler.\footnote{The filler used on this page is of a family called \emph{Lorem Ipsum}. It was generated by http://www.lipsum.com/feed/html on August 18, 2014 at 8:08 pm Central Time. The site explains the history of \emph{Lorem Ipsum} filler, the reason for using it, and a procedure for generating it.} \TUsubsection{Introduction to the Tasking Approach}
Lorem ipsum dolor sit amet, consectetur adipiscing elit. Integer luctus feugiat odio et fermentum. Etiam ut vulputate tellus. Aenean sed libero nec nibh gravida consequat eu vel diam. Nullam at accumsan purus. Nullam sit amet nulla et orci dapibus mollis. Etiam placerat, lacus eget venenatis bibendum, metus odio commodo nisi, sed scelerisque nulla odio vel nibh. Mauris vitae elementum turpis. \TUsubsection{Algorithm Design}
\TUsubsubsection{Communication Structure}
\TUsubsubsection{Task Zero}
\TUsubsubsection{Task One}
\TUsubsubsection{Task Two}
\TUsubsubsection{Task Three}
\TUsubsubsection{Task Four}
\TUsubsubsection{Task Five}
Proin eu lectus non odio vestibulum fermentum nec et leo. Integer ut leo velit. Curabitur nec est eget felis accumsan interdum. Duis fermentum turpis id mauris blandit convallis. Morbi risus arcu, ornare eget lectus in, accumsan rutrum mi. Nulla facilisi. Donec iaculis nisl vitae erat luctus, vitae consequat mi condimentum. Duis imperdiet enim sapien, vitae suscipit neque ullamcorper sit amet. Aliquam placerat lorem risus, at tempor lectus placerat egestas. Vestibulum rhoncus, eros ut posuere cursus, mauris nisl egestas tortor, ac dignissim est libero pretium arcu. Fusce mollis lacus est, id vulputate leo ultrices sit amet. Quisque condimentum justo risus, posuere volutpat velit congue tempor. Integer quis nunc at nibh posuere congue ut et diam. Vestibulum ante ipsum primis in faucibus orci luctus et ultrices posuere cubilia Curae; Maecenas id feugiat est, sit amet viverra tortor. \TUsubsection{Performance Expectations}
\TUsection{Subgraphing Approach}
\TUsubsection{Introduction to the Subgraphing Approach}
\TUsubsection{Algorithm Design}
\TUsubsubsection{Communication Structure}
\TUsubsubsection{Worker Nodes}
\TUsubsubsection{Root Node}
\TUsubsubsection{Database Node}
\TUsubsection{Performance Expectations}
\TUsection{Subgraphing Approach} Second section of the second chapter.
\begin{figure}[htp]
\vspace{.2truein} \centerline{Normally a figure would go here.}
\caption{Title of the Second Figure}
\end{figure}
\begin{table}[htp]
\vspace{.2truein} \centerline{Normally a figure would go here.}
\caption{Title of the Second Table}
\end{table}
\begin{table}[htp]
\vspace{.2truein} \centerline{Normally a figure would go here.}
\caption{Title of the Third Table}
\end{table}\\

View File

@ -1,28 +1,39 @@
\relax \relax
\@writefile{toc}{\contentsline {chapter}{\numberline {CHAPTER 6: }{\bf \uppercase {PERFORMANCE ANALYSIS}}}{17}{}\protected@file@percent } \@writefile{toc}{\contentsline {chapter}{\numberline {CHAPTER 6: }{\bf \uppercase {PERFORMANCE ANALYSIS}}}{14}{}\protected@file@percent }
\@writefile{toc}{\contentsline {section}{\numberline {6.1}\bf First Heading}{17}{}\protected@file@percent } \@writefile{toc}{\contentsline {section}{\numberline {6.1}\bf Small Networks}{14}{}\protected@file@percent }
\@writefile{toc}{\contentsline {section}{\numberline {6.2}\bf Second Heading}{18}{}\protected@file@percent } \@writefile{toc}{\contentsline {subsection}{\numberline {6.1.1}\it Test Information}{14}{}\protected@file@percent }
\@writefile{lof}{\contentsline {figure}{\numberline {6.1}{\ignorespaces Title of the Second Figure}}{18}{}\protected@file@percent } \@writefile{toc}{\contentsline {subsection}{\numberline {6.1.2}\it Results}{14}{}\protected@file@percent }
\@writefile{lot}{\contentsline {table}{\numberline {6.1}{\ignorespaces Title of the Second Table}}{18}{}\protected@file@percent } \@writefile{toc}{\contentsline {subsection}{\numberline {6.1.3}\it Analysis}{14}{}\protected@file@percent }
\@writefile{lot}{\contentsline {table}{\numberline {6.2}{\ignorespaces Title of the Third Table}}{18}{}\protected@file@percent } \@writefile{toc}{\contentsline {section}{\numberline {6.2}\bf Large Networks}{14}{}\protected@file@percent }
\@writefile{toc}{\contentsline {subsection}{\numberline {6.2.1}\it Test Information}{14}{}\protected@file@percent }
\@writefile{toc}{\contentsline {subsection}{\numberline {6.2.2}\it Results}{14}{}\protected@file@percent }
\@writefile{toc}{\contentsline {subsection}{\numberline {6.2.3}\it Analysis}{14}{}\protected@file@percent }
\@writefile{toc}{\contentsline {section}{\numberline {6.3}\bf Large Exploit Lists}{14}{}\protected@file@percent }
\@writefile{toc}{\contentsline {subsection}{\numberline {6.3.1}\it Test Information}{14}{}\protected@file@percent }
\@writefile{toc}{\contentsline {subsection}{\numberline {6.3.2}\it Results}{14}{}\protected@file@percent }
\@writefile{toc}{\contentsline {subsection}{\numberline {6.3.3}\it Analysis}{14}{}\protected@file@percent }
\@writefile{toc}{\contentsline {section}{\numberline {6.4}\bf Distributed Hash Tables}{14}{}\protected@file@percent }
\@writefile{toc}{\contentsline {subsection}{\numberline {6.4.1}\it Test Information}{15}{}\protected@file@percent }
\@writefile{toc}{\contentsline {subsection}{\numberline {6.4.2}\it Results}{15}{}\protected@file@percent }
\@writefile{toc}{\contentsline {subsection}{\numberline {6.4.3}\it Analysis}{15}{}\protected@file@percent }
\@setckpt{Chapter6}{ \@setckpt{Chapter6}{
\setcounter{page}{19} \setcounter{page}{16}
\setcounter{equation}{0} \setcounter{equation}{0}
\setcounter{enumi}{0} \setcounter{enumi}{0}
\setcounter{enumii}{0} \setcounter{enumii}{0}
\setcounter{enumiii}{0} \setcounter{enumiii}{0}
\setcounter{enumiv}{0} \setcounter{enumiv}{0}
\setcounter{footnote}{1} \setcounter{footnote}{0}
\setcounter{mpfootnote}{0} \setcounter{mpfootnote}{0}
\setcounter{part}{0} \setcounter{part}{0}
\setcounter{chapter}{6} \setcounter{chapter}{6}
\setcounter{section}{2} \setcounter{section}{4}
\setcounter{subsection}{0} \setcounter{subsection}{3}
\setcounter{subsubsection}{0} \setcounter{subsubsection}{0}
\setcounter{paragraph}{0} \setcounter{paragraph}{0}
\setcounter{subparagraph}{0} \setcounter{subparagraph}{0}
\setcounter{figure}{1} \setcounter{figure}{0}
\setcounter{table}{2} \setcounter{table}{0}
\setcounter{lofdepth}{1} \setcounter{lofdepth}{1}
\setcounter{lotdepth}{1} \setcounter{lotdepth}{1}
} }

View File

@ -1,22 +1,21 @@
\TUchapter{PERFORMANCE ANALYSIS} \TUchapter{PERFORMANCE ANALYSIS}
\TUsection{First Heading} \TUsection{Small Networks}
\par This is the beginning of the second chapter and the first section of the second chapter. The rest of the text in this section is meaningless filler.\footnote{The filler used on this page is of a family called \emph{Lorem Ipsum}. It was generated by http://www.lipsum.com/feed/html on August 18, 2014 at 8:08 pm Central Time. The site explains the history of \emph{Lorem Ipsum} filler, the reason for using it, and a procedure for generating it.} \TUsubsection{Test Information}
\TUsubsection{Results}
\TUsubsection{Analysis}
Lorem ipsum dolor sit amet, consectetur adipiscing elit. Integer luctus feugiat odio et fermentum. Etiam ut vulputate tellus. Aenean sed libero nec nibh gravida consequat eu vel diam. Nullam at accumsan purus. Nullam sit amet nulla et orci dapibus mollis. Etiam placerat, lacus eget venenatis bibendum, metus odio commodo nisi, sed scelerisque nulla odio vel nibh. Mauris vitae elementum turpis. \TUsection{Large Networks}
\TUsubsection{Test Information}
\TUsubsection{Results}
\TUsubsection{Analysis}
Proin eu lectus non odio vestibulum fermentum nec et leo. Integer ut leo velit. Curabitur nec est eget felis accumsan interdum. Duis fermentum turpis id mauris blandit convallis. Morbi risus arcu, ornare eget lectus in, accumsan rutrum mi. Nulla facilisi. Donec iaculis nisl vitae erat luctus, vitae consequat mi condimentum. Duis imperdiet enim sapien, vitae suscipit neque ullamcorper sit amet. Aliquam placerat lorem risus, at tempor lectus placerat egestas. Vestibulum rhoncus, eros ut posuere cursus, mauris nisl egestas tortor, ac dignissim est libero pretium arcu. Fusce mollis lacus est, id vulputate leo ultrices sit amet. Quisque condimentum justo risus, posuere volutpat velit congue tempor. Integer quis nunc at nibh posuere congue ut et diam. Vestibulum ante ipsum primis in faucibus orci luctus et ultrices posuere cubilia Curae; Maecenas id feugiat est, sit amet viverra tortor. \TUsection{Large Exploit Lists}
\TUsubsection{Test Information}
\TUsubsection{Results}
\TUsubsection{Analysis}
\TUsection{Second Heading} Second section of the second chapter. \TUsection{Distributed Hash Tables}
\begin{figure}[htp] \TUsubsection{Test Information}
\vspace{.2truein} \centerline{Normally a figure would go here.} \TUsubsection{Results}
\caption{Title of the Second Figure} \TUsubsection{Analysis}
\end{figure}
\begin{table}[htp]
\vspace{.2truein} \centerline{Normally a figure would go here.}
\caption{Title of the Second Table}
\end{table}
\begin{table}[htp]
\vspace{.2truein} \centerline{Normally a figure would go here.}
\caption{Title of the Third Table}
\end{table}\\

View File

@ -1,28 +1,24 @@
\relax \relax
\@writefile{toc}{\contentsline {chapter}{\numberline {CHAPTER 7: }{\bf \uppercase {CONCLUSIONS AND FUTURE WORKS}}}{19}{}\protected@file@percent } \@writefile{toc}{\contentsline {chapter}{\numberline {CHAPTER 7: }{\bf \uppercase {CONCLUSIONS AND FUTURE WORKS}}}{16}{}\protected@file@percent }
\@writefile{toc}{\contentsline {section}{\numberline {7.1}\bf First Heading}{19}{}\protected@file@percent } \@writefile{toc}{\contentsline {section}{\numberline {7.1}\bf Future Work}{16}{}\protected@file@percent }
\@writefile{toc}{\contentsline {section}{\numberline {7.2}\bf Second Heading}{20}{}\protected@file@percent }
\@writefile{lof}{\contentsline {figure}{\numberline {7.1}{\ignorespaces Title of the Second Figure}}{20}{}\protected@file@percent }
\@writefile{lot}{\contentsline {table}{\numberline {7.1}{\ignorespaces Title of the Second Table}}{20}{}\protected@file@percent }
\@writefile{lot}{\contentsline {table}{\numberline {7.2}{\ignorespaces Title of the Third Table}}{20}{}\protected@file@percent }
\@setckpt{Chapter7}{ \@setckpt{Chapter7}{
\setcounter{page}{21} \setcounter{page}{17}
\setcounter{equation}{0} \setcounter{equation}{0}
\setcounter{enumi}{0} \setcounter{enumi}{0}
\setcounter{enumii}{0} \setcounter{enumii}{0}
\setcounter{enumiii}{0} \setcounter{enumiii}{0}
\setcounter{enumiv}{0} \setcounter{enumiv}{0}
\setcounter{footnote}{1} \setcounter{footnote}{0}
\setcounter{mpfootnote}{0} \setcounter{mpfootnote}{0}
\setcounter{part}{0} \setcounter{part}{0}
\setcounter{chapter}{7} \setcounter{chapter}{7}
\setcounter{section}{2} \setcounter{section}{1}
\setcounter{subsection}{0} \setcounter{subsection}{0}
\setcounter{subsubsection}{0} \setcounter{subsubsection}{0}
\setcounter{paragraph}{0} \setcounter{paragraph}{0}
\setcounter{subparagraph}{0} \setcounter{subparagraph}{0}
\setcounter{figure}{1} \setcounter{figure}{0}
\setcounter{table}{2} \setcounter{table}{0}
\setcounter{lofdepth}{1} \setcounter{lofdepth}{1}
\setcounter{lotdepth}{1} \setcounter{lotdepth}{1}
} }

View File

@ -1,22 +1,9 @@
\TUchapter{CONCLUSIONS AND FUTURE WORKS} \TUchapter{CONCLUSIONS AND FUTURE WORKS}
\TUsection{First Heading} \TUsection{Future Work}
\par This is the beginning of the second chapter and the first section of the second chapter. The rest of the text in this section is meaningless filler.\footnote{The filler used on this page is of a family called \emph{Lorem Ipsum}. It was generated by http://www.lipsum.com/feed/html on August 18, 2014 at 8:08 pm Central Time. The site explains the history of \emph{Lorem Ipsum} filler, the reason for using it, and a procedure for generating it.} %Blending OpenMP and MPI
%Subgraphing Work
Lorem ipsum dolor sit amet, consectetur adipiscing elit. Integer luctus feugiat odio et fermentum. Etiam ut vulputate tellus. Aenean sed libero nec nibh gravida consequat eu vel diam. Nullam at accumsan purus. Nullam sit amet nulla et orci dapibus mollis. Etiam placerat, lacus eget venenatis bibendum, metus odio commodo nisi, sed scelerisque nulla odio vel nibh. Mauris vitae elementum turpis. %DHT alts
%depth limit parameter tuning
Proin eu lectus non odio vestibulum fermentum nec et leo. Integer ut leo velit. Curabitur nec est eget felis accumsan interdum. Duis fermentum turpis id mauris blandit convallis. Morbi risus arcu, ornare eget lectus in, accumsan rutrum mi. Nulla facilisi. Donec iaculis nisl vitae erat luctus, vitae consequat mi condimentum. Duis imperdiet enim sapien, vitae suscipit neque ullamcorper sit amet. Aliquam placerat lorem risus, at tempor lectus placerat egestas. Vestibulum rhoncus, eros ut posuere cursus, mauris nisl egestas tortor, ac dignissim est libero pretium arcu. Fusce mollis lacus est, id vulputate leo ultrices sit amet. Quisque condimentum justo risus, posuere volutpat velit congue tempor. Integer quis nunc at nibh posuere congue ut et diam. Vestibulum ante ipsum primis in faucibus orci luctus et ultrices posuere cubilia Curae; Maecenas id feugiat est, sit amet viverra tortor. %Tuning MPI Params
%Testing various MPI implementations (OpenMPI vs MPICH vs MVAPICH)
\TUsection{Second Heading} Second section of the second chapter.
\begin{figure}[htp]
\vspace{.2truein} \centerline{Normally a figure would go here.}
\caption{Title of the Second Figure}
\end{figure}
\begin{table}[htp]
\vspace{.2truein} \centerline{Normally a figure would go here.}
\caption{Title of the Second Table}
\end{table}
\begin{table}[htp]
\vspace{.2truein} \centerline{Normally a figure would go here.}
\caption{Title of the Third Table}
\end{table}\\

View File

@ -6,13 +6,13 @@
\@writefile{toc}{{\hfill \ }} \@writefile{toc}{{\hfill \ }}
\@writefile{toc}{\contentsline {section}{\hspace {-\parindent }ACKNOWLEDGEMENTS}{v}{}\protected@file@percent } \@writefile{toc}{\contentsline {section}{\hspace {-\parindent }ACKNOWLEDGEMENTS}{v}{}\protected@file@percent }
\@writefile{toc}{{\hfill \ }} \@writefile{toc}{{\hfill \ }}
\@writefile{toc}{\contentsline {section}{\hspace {-\parindent }TABLE OF CONTENTS}{vii}{}\protected@file@percent } \@writefile{toc}{\contentsline {section}{\hspace {-\parindent }TABLE OF CONTENTS}{viii}{}\protected@file@percent }
\@writefile{toc}{{\hfill \ }} \@writefile{toc}{{\hfill \ }}
\@writefile{lot}{{\vspace {\baselineskip }}} \@writefile{lot}{{\vspace {\baselineskip }}}
\@writefile{toc}{\contentsline {section}{\hspace {-\parindent }LIST OF TABLES}{viii}{}\protected@file@percent } \@writefile{toc}{\contentsline {section}{\hspace {-\parindent }LIST OF TABLES}{ix}{}\protected@file@percent }
\@writefile{toc}{{\hfill \ }} \@writefile{toc}{{\hfill \ }}
\@writefile{lof}{{\vspace {\baselineskip }}} \@writefile{lof}{{\vspace {\baselineskip }}}
\@writefile{toc}{\contentsline {section}{\hspace {-\parindent }LIST OF FIGURES}{ix}{}\protected@file@percent } \@writefile{toc}{\contentsline {section}{\hspace {-\parindent }LIST OF FIGURES}{x}{}\protected@file@percent }
\@input{Chapter1.aux} \@input{Chapter1.aux}
\@input{Chapter2.aux} \@input{Chapter2.aux}
\@input{Chapter3.aux} \@input{Chapter3.aux}
@ -29,9 +29,9 @@
\bibcite{zhang_boosting_2017}{6} \bibcite{zhang_boosting_2017}{6}
\bibstyle{plain} \bibstyle{plain}
\@writefile{toc}{{\hfill \ }} \@writefile{toc}{{\hfill \ }}
\@writefile{toc}{\contentsline {section}{\hspace {-\parindent }NOMENCLATURE}{21}{}\protected@file@percent } \@writefile{toc}{\contentsline {section}{\hspace {-\parindent }NOMENCLATURE}{17}{}\protected@file@percent }
\@writefile{toc}{\addvspace {10pt}} \@writefile{toc}{\addvspace {10pt}}
\@writefile{toc}{\contentsline {section}{\hspace {-\parindent }BIBLIOGRAPHY}{21}{}\protected@file@percent } \@writefile{toc}{\contentsline {section}{\hspace {-\parindent }BIBLIOGRAPHY}{17}{}\protected@file@percent }
\@writefile{toc}{{\hfill \ }} \@writefile{toc}{{\hfill \ }}
\@input{Appendices.aux} \@input{Appendices.aux}
\gdef \@abspage@last{33} \gdef \@abspage@last{29}

View File

@ -1,11 +1,3 @@
{\vspace {\baselineskip }} {\vspace {\baselineskip }}
\contentsline {figure}{\numberline {1.1}{\ignorespaces Title of the First Figure.}}{1}{}% \contentsline {figure}{\numberline {3.1}{\ignorespaces Path Walking to State 14}}{4}{}%
\contentsline {figure}{\numberline {2.1}{\ignorespaces Title of the Second Figure}}{4}{}% \contentsline {figure}{\numberline {3.2}{\ignorespaces Color Coding a Small Network Based on Violations}}{6}{}%
\contentsline {figure}{\numberline {3.1}{\ignorespaces Path Walking to State 14}}{6}{}%
\contentsline {figure}{\numberline {3.2}{\ignorespaces Color Coding a Small Network Based on Violations}}{8}{}%
\contentsline {figure}{\numberline {4.1}{\ignorespaces Title of the Second Figure}}{14}{}%
\contentsline {figure}{\numberline {5.1}{\ignorespaces Title of the Second Figure}}{16}{}%
\contentsline {figure}{\numberline {6.1}{\ignorespaces Title of the Second Figure}}{18}{}%
\contentsline {figure}{\numberline {7.1}{\ignorespaces Title of the Second Figure}}{20}{}%
\contentsline {figure}{\numberline {B.1}{\ignorespaces Title of the First Figure in this Appendix.}}{24}{}%
\contentsline {figure}{\numberline {B.2}{\ignorespaces Title of the Second Figure in this Appendix.}}{24}{}%

View File

@ -1,4 +1,4 @@
This is pdfTeX, Version 3.141592653-2.6-1.40.23 (TeX Live 2021/Arch Linux) (preloaded format=pdflatex 2022.2.14) 25 FEB 2022 15:10 This is pdfTeX, Version 3.141592653-2.6-1.40.23 (TeX Live 2021/Arch Linux) (preloaded format=pdflatex 2022.2.14) 25 FEB 2022 16:46
entering extended mode entering extended mode
restricted \write18 enabled. restricted \write18 enabled.
%&-line parsing enabled. %&-line parsing enabled.
@ -176,22 +176,22 @@ Overfull \hbox (1.75291pt too wide) in paragraph at lines 22--22
[6 [6
]) ] [7])
\tf@toc=\write3 \tf@toc=\write3
\openout3 = `Schrick-Noah_MS-Thesis.toc'. \openout3 = `Schrick-Noah_MS-Thesis.toc'.
[7] (./Schrick-Noah_MS-Thesis.lot) [8] (./Schrick-Noah_MS-Thesis.lot)
\tf@lot=\write4 \tf@lot=\write4
\openout4 = `Schrick-Noah_MS-Thesis.lot'. \openout4 = `Schrick-Noah_MS-Thesis.lot'.
[8 [9
] (./Schrick-Noah_MS-Thesis.lof) ] (./Schrick-Noah_MS-Thesis.lof)
\tf@lof=\write5 \tf@lof=\write5
\openout5 = `Schrick-Noah_MS-Thesis.lof'. \openout5 = `Schrick-Noah_MS-Thesis.lof'.
[9 [10
] ]
\openout2 = `Chapter1.aux'. \openout2 = `Chapter1.aux'.
@ -202,152 +202,93 @@ CHAPTER 1.
] [2] ]
\openout2 = `Chapter2.aux'. \openout2 = `Chapter2.aux'.
(./Chapter2.tex (./Chapter2.tex
CHAPTER 2. CHAPTER 2.
LaTeX Font Info: External font `cmex10' loaded for size ) [2
(Font) <7> on input line 4.
LaTeX Font Info: External font `cmex10' loaded for size
(Font) <5> on input line 4.
Underfull \hbox (badness 2662) in paragraph at lines 4--4
[][]\OT1/cmr/m/n/10 The filler used on this page is of a fam-ily called \OT1/cm
r/m/it/10 Lorem Ip-sum\OT1/cmr/m/n/10 . It was gen-er-ated by
[]
)
Underfull \hbox (badness 10000) in paragraph at lines 10--205
[]
]
\openout2 = `Chapter3.aux'.
(./Chapter3.tex
CHAPTER 3.
<./Chapter3_img/PW.png, id=44, 958.58125pt x 525.965pt>
File: ./Chapter3_img/PW.png Graphic file (type png)
<use ./Chapter3_img/PW.png>
Package pdftex.def Info: ./Chapter3_img/PW.png used on input line 17.
(pdftex.def) Requested size: 469.75499pt x 257.74918pt.
[3 [3
] [4] ] [4 <./Chapter3_img/PW.png>]
\openout2 = `Chapter3.aux'. <./Chapter3_img/CC.png, id=54, 658.46pt x 527.9725pt>
(./Chapter3.tex
CHAPTER 3.
<./Chapter3_img/PW.png, id=52, 958.58125pt x 525.965pt>
File: ./Chapter3_img/PW.png Graphic file (type png)
<use ./Chapter3_img/PW.png>
Package pdftex.def Info: ./Chapter3_img/PW.png used on input line 17.
(pdftex.def) Requested size: 469.75499pt x 257.74918pt.
[5
] [6 <./Chapter3_img/PW.png>]
<./Chapter3_img/CC.png, id=61, 658.46pt x 527.9725pt>
File: ./Chapter3_img/CC.png Graphic file (type png) File: ./Chapter3_img/CC.png Graphic file (type png)
<use ./Chapter3_img/CC.png> <use ./Chapter3_img/CC.png>
Package pdftex.def Info: ./Chapter3_img/CC.png used on input line 55. Package pdftex.def Info: ./Chapter3_img/CC.png used on input line 55.
(pdftex.def) Requested size: 469.75499pt x 376.66768pt. (pdftex.def) Requested size: 469.75499pt x 376.66768pt.
[7] [8 <./Chapter3_img/CC.png>] [9] [10] [5] [6 <./Chapter3_img/CC.png>] [7] [8]
[11]) [12] [9]) [10]
\openout2 = `Chapter4.aux'. \openout2 = `Chapter4.aux'.
(./Chapter4.tex (./Chapter4.tex
CHAPTER 4. CHAPTER 4.
) [11
Underfull \hbox (badness 2662) in paragraph at lines 4--4
[][]\OT1/cmr/m/n/10 The filler used on this page is of a fam-ily called \OT1/cm
r/m/it/10 Lorem Ip-sum\OT1/cmr/m/n/10 . It was gen-er-ated by
[]
)
Underfull \hbox (badness 10000) in paragraph at lines 10--207
[]
[13
] [14] ]
\openout2 = `Chapter5.aux'. \openout2 = `Chapter5.aux'.
(./Chapter5.tex (./Chapter5.tex
CHAPTER 5. CHAPTER 5.
[12
Underfull \hbox (badness 2662) in paragraph at lines 4--4
[][]\OT1/cmr/m/n/10 The filler used on this page is of a fam-ily called \OT1/cm
r/m/it/10 Lorem Ip-sum\OT1/cmr/m/n/10 . It was gen-er-ated by
[]
)
Underfull \hbox (badness 10000) in paragraph at lines 10--208
[]
[15
] [16] ]) [13]
\openout2 = `Chapter6.aux'. \openout2 = `Chapter6.aux'.
(./Chapter6.tex (./Chapter6.tex
CHAPTER 6. CHAPTER 6.
[14
Underfull \hbox (badness 2662) in paragraph at lines 4--4
[][]\OT1/cmr/m/n/10 The filler used on this page is of a fam-ily called \OT1/cm
r/m/it/10 Lorem Ip-sum\OT1/cmr/m/n/10 . It was gen-er-ated by
[]
)
Underfull \hbox (badness 10000) in paragraph at lines 10--209
[]
[17
] [18] ]) [15]
\openout2 = `Chapter7.aux'. \openout2 = `Chapter7.aux'.
(./Chapter7.tex (./Chapter7.tex
CHAPTER 7. CHAPTER 7.
) [16
Underfull \hbox (badness 2662) in paragraph at lines 4--4
[][]\OT1/cmr/m/n/10 The filler used on this page is of a fam-ily called \OT1/cm
r/m/it/10 Lorem Ip-sum\OT1/cmr/m/n/10 . It was gen-er-ated by
[]
)
Underfull \hbox (badness 10000) in paragraph at lines 10--210
[]
[19
] [20] (./Schrick-Noah_MS-Thesis.bbl) ] (./Schrick-Noah_MS-Thesis.bbl)
\c@appendixno=\count269 \c@appendixno=\count269
[21 [17
] ]
\openout2 = `Appendices.aux'. \openout2 = `Appendices.aux'.
(./Appendices.tex [22 (./Appendices.tex [18
]) [23] ]) [19]
[24] (./Schrick-Noah_MS-Thesis.aux (./Chapter1.aux) (./Chapter2.aux) (./Schrick-Noah_MS-Thesis.aux (./Chapter1.aux) (./Chapter2.aux) (./Chapter3.aux
(./Chapter3.aux) (./Chapter4.aux) (./Chapter5.aux) (./Chapter6.aux) ) (./Chapter4.aux) (./Chapter5.aux) (./Chapter6.aux) (./Chapter7.aux)
(./Chapter7.aux) (./Appendices.aux)) ) (./Appendices.aux)) )
(\end occurred inside a group at level 6) (\end occurred inside a group at level 6)
### semi simple group (level 6) entered at line 198 (\begingroup) ### semi simple group (level 6) entered at line 198 (\begingroup)
@ -358,27 +299,23 @@ Underfull \hbox (badness 10000) in paragraph at lines 10--210
### semi simple group (level 1) entered at line 52 (\begingroup) ### semi simple group (level 1) entered at line 52 (\begingroup)
### bottom level ### bottom level
Here is how much of TeX's memory you used: Here is how much of TeX's memory you used:
2125 strings out of 478353 2121 strings out of 478353
37243 string characters out of 5854635 37194 string characters out of 5854635
339865 words of memory out of 5000000 344865 words of memory out of 5000000
20197 multiletter control sequences out of 15000+600000 20194 multiletter control sequences out of 15000+600000
407503 words of font info for 40 fonts, out of 8000000 for 9000 407157 words of font info for 39 fonts, out of 8000000 for 9000
1141 hyphenation exceptions out of 8191 1141 hyphenation exceptions out of 8191
55i,8n,62p,960b,1269s stack positions out of 5000i,500n,10000p,200000b,80000s 55i,7n,62p,310b,1268s stack positions out of 5000i,500n,10000p,200000b,80000s
{/usr/share/texmf-dist/fonts/enc/dvips/cm-super/cm-super-ts1.en {/usr/share/texmf-dist/fonts/enc/dvips/cm-super/cm-super-ts1.en
c}</usr/share/texmf-dist/fonts/type1/public/amsfonts/cm/cmbx12.pfb></usr/share/ c}</usr/share/texmf-dist/fonts/type1/public/amsfonts/cm/cmbx12.pfb></usr/share/
texmf-dist/fonts/type1/public/amsfonts/cm/cmmi12.pfb></usr/share/texmf-dist/fon texmf-dist/fonts/type1/public/amsfonts/cm/cmmi12.pfb></usr/share/texmf-dist/fon
ts/type1/public/amsfonts/cm/cmr10.pfb></usr/share/texmf-dist/fonts/type1/public ts/type1/public/amsfonts/cm/cmr12.pfb></usr/share/texmf-dist/fonts/type1/public
/amsfonts/cm/cmr12.pfb></usr/share/texmf-dist/fonts/type1/public/amsfonts/cm/cm /amsfonts/cm/cmsy10.pfb></usr/share/texmf-dist/fonts/type1/public/amsfonts/cm/c
r7.pfb></usr/share/texmf-dist/fonts/type1/public/amsfonts/cm/cmr8.pfb></usr/sha mti12.pfb></usr/share/texmf-dist/fonts/type1/public/cm-super/sfrm1200.pfb>
re/texmf-dist/fonts/type1/public/amsfonts/cm/cmsy10.pfb></usr/share/texmf-dist/ Output written on Schrick-Noah_MS-Thesis.pdf (29 pages, 200518 bytes).
fonts/type1/public/amsfonts/cm/cmti10.pfb></usr/share/texmf-dist/fonts/type1/pu
blic/amsfonts/cm/cmti12.pfb></usr/share/texmf-dist/fonts/type1/public/cm-super/
sfrm1200.pfb>
Output written on Schrick-Noah_MS-Thesis.pdf (33 pages, 251664 bytes).
PDF statistics: PDF statistics:
164 PDF objects out of 1000 (max. 8388607) 130 PDF objects out of 1000 (max. 8388607)
105 compressed objects within 2 object streams 84 compressed objects within 1 object stream
0 named destinations out of 1000 (max. 500000) 0 named destinations out of 1000 (max. 500000)
11 words of extra memory for PDF output out of 10000 (max. 10000000) 11 words of extra memory for PDF output out of 10000 (max. 10000000)

View File

@ -1,15 +1 @@
{\vspace {\baselineskip }} {\vspace {\baselineskip }}
\contentsline {table}{\numberline {1.1}{\ignorespaces Title of the First Table.}}{2}{}%
\contentsline {table}{\numberline {2.1}{\ignorespaces Title of the Second Table}}{4}{}%
\contentsline {table}{\numberline {2.2}{\ignorespaces Title of the Third Table}}{4}{}%
\contentsline {table}{\numberline {4.1}{\ignorespaces Title of the Second Table}}{14}{}%
\contentsline {table}{\numberline {4.2}{\ignorespaces Title of the Third Table}}{14}{}%
\contentsline {table}{\numberline {5.1}{\ignorespaces Title of the Second Table}}{16}{}%
\contentsline {table}{\numberline {5.2}{\ignorespaces Title of the Third Table}}{16}{}%
\contentsline {table}{\numberline {6.1}{\ignorespaces Title of the Second Table}}{18}{}%
\contentsline {table}{\numberline {6.2}{\ignorespaces Title of the Third Table}}{18}{}%
\contentsline {table}{\numberline {7.1}{\ignorespaces Title of the Second Table}}{20}{}%
\contentsline {table}{\numberline {7.2}{\ignorespaces Title of the Third Table}}{20}{}%
\contentsline {table}{\numberline {A.1}{\ignorespaces Title of the Only Table in this Appendix.}}{22}{}%
\contentsline {table}{\numberline {B.1}{\ignorespaces Title of the First Table in this Appendix.}}{23}{}%
\contentsline {table}{\numberline {B.2}{\ignorespaces Title of the Second Table in this Appendix.}}{24}{}%

Binary file not shown.

View File

@ -5,48 +5,86 @@
{\hfill \ } {\hfill \ }
\contentsline {section}{\hspace {-\parindent }ACKNOWLEDGEMENTS}{v}{}% \contentsline {section}{\hspace {-\parindent }ACKNOWLEDGEMENTS}{v}{}%
{\hfill \ } {\hfill \ }
\contentsline {section}{\hspace {-\parindent }TABLE OF CONTENTS}{vii}{}% \contentsline {section}{\hspace {-\parindent }TABLE OF CONTENTS}{viii}{}%
{\hfill \ } {\hfill \ }
\contentsline {section}{\hspace {-\parindent }LIST OF TABLES}{viii}{}% \contentsline {section}{\hspace {-\parindent }LIST OF TABLES}{ix}{}%
{\hfill \ } {\hfill \ }
\contentsline {section}{\hspace {-\parindent }LIST OF FIGURES}{ix}{}% \contentsline {section}{\hspace {-\parindent }LIST OF FIGURES}{x}{}%
\contentsline {chapter}{\numberline {CHAPTER 1: }{\bf \uppercase {INTRODUCTION}}}{1}{}% \contentsline {chapter}{\numberline {CHAPTER 1: }{\bf \uppercase {INTRODUCTION}}}{1}{}%
\contentsline {section}{\numberline {1.1}\bf First Heading: The Introduction}{1}{}% \contentsline {section}{\numberline {1.1}\bf Introduction to Attack Graphs}{1}{}%
\contentsline {section}{\numberline {1.2}\bf Second Heading}{1}{}% \contentsline {section}{\numberline {1.2}\bf Application to Cybersecurity and Compliance}{1}{}%
\contentsline {subsection}{\numberline {1.2.1}\it First Subheading}{1}{}% \contentsline {section}{\numberline {1.3}\bf Objectives and Contributions}{1}{}%
\contentsline {subsection}{\numberline {1.2.2}\it Second Subheading}{1}{}% \contentsline {chapter}{\numberline {CHAPTER 2: }{\bf \uppercase {RELATED WORKS}}}{2}{}%
\contentsline {subsubsection}{First Sub-subsection Header}{1}{}% \contentsline {section}{\numberline {2.1}\bf Introduction to Graph Generation}{2}{}%
\contentsline {chapter}{\numberline {CHAPTER 2: }{\bf \uppercase {RELATED WORKS}}}{3}{}% \contentsline {section}{\numberline {2.2}\bf Improvements to Attack Graph Generation}{2}{}%
\contentsline {section}{\numberline {2.1}\bf First Heading}{3}{}% \contentsline {section}{\numberline {2.3}\bf Attack Dependency Graphs}{2}{}%
\contentsline {section}{\numberline {2.2}\bf Second Heading}{4}{}% \contentsline {section}{\numberline {2.4}\bf Compliance Graphs}{2}{}%
\contentsline {chapter}{\numberline {CHAPTER 3: }{\bf \uppercase {UTILITY EXTENSIONS TO THE RAGE ATTACK GRAPH GENERATOR}}}{5}{}% \contentsline {chapter}{\numberline {CHAPTER 3: }{\bf \uppercase {UTILITY EXTENSIONS TO THE RAGE ATTACK GRAPH GENERATOR}}}{3}{}%
\contentsline {section}{\numberline {3.1}\bf Path Walking}{5}{}% \contentsline {section}{\numberline {3.1}\bf Path Walking}{3}{}%
\contentsline {section}{\numberline {3.2}\bf Compound Operators}{6}{}% \contentsline {section}{\numberline {3.2}\bf Compound Operators}{4}{}%
\contentsline {section}{\numberline {3.3}\bf Color Coding}{7}{}% \contentsline {section}{\numberline {3.3}\bf Color Coding}{5}{}%
\contentsline {section}{\numberline {3.4}\bf Intermediate Database Storage}{9}{}% \contentsline {section}{\numberline {3.4}\bf Intermediate Database Storage}{7}{}%
\contentsline {subsection}{\numberline {3.4.1}\it Memory Constraint Difficulties}{9}{}% \contentsline {subsection}{\numberline {3.4.1}\it Memory Constraint Difficulties}{7}{}%
\contentsline {subsection}{\numberline {3.4.2}\it Maximizing Performance with Intermediate Database Storage}{10}{}% \contentsline {subsection}{\numberline {3.4.2}\it Maximizing Performance with Intermediate Database Storage}{8}{}%
\contentsline {subsection}{\numberline {3.4.3}\it Portability}{11}{}% \contentsline {subsection}{\numberline {3.4.3}\it Portability}{9}{}%
\contentsline {section}{\numberline {3.5}\bf Relational Operators}{12}{}% \contentsline {section}{\numberline {3.5}\bf Relational Operators}{10}{}%
\contentsline {chapter}{\numberline {CHAPTER 4: }{\bf \uppercase {SYNCHRONOUS FIRING}}}{13}{}% \contentsline {chapter}{\numberline {CHAPTER 4: }{\bf \uppercase {SYNCHRONOUS FIRING}}}{11}{}%
\contentsline {section}{\numberline {4.1}\bf First Heading}{13}{}% \contentsline {section}{\numberline {4.1}\bf Introduction}{11}{}%
\contentsline {section}{\numberline {4.2}\bf Second Heading}{14}{}% \contentsline {subsection}{\numberline {4.1.1}\it Synchronous Firing in Literature}{11}{}%
\contentsline {chapter}{\numberline {CHAPTER 5: }{\bf \uppercase {IMPLEMENTATION OF MESSAGE PASSING INTERFACE}}}{15}{}% \contentsline {section}{\numberline {4.2}\bf Necessary Components}{11}{}%
\contentsline {section}{\numberline {5.1}\bf Tasking Approach}{15}{}% \contentsline {section}{\numberline {4.3}\bf Example Networks and Results}{11}{}%
\contentsline {section}{\numberline {5.2}\bf Subgraphing Approach}{16}{}% \contentsline {subsection}{\numberline {4.3.1}\it Example Networks}{11}{}%
\contentsline {chapter}{\numberline {CHAPTER 6: }{\bf \uppercase {PERFORMANCE ANALYSIS}}}{17}{}% \contentsline {subsection}{\numberline {4.3.2}\it Results}{11}{}%
\contentsline {section}{\numberline {6.1}\bf First Heading}{17}{}% \contentsline {chapter}{\numberline {CHAPTER 5: }{\bf \uppercase {IMPLEMENTATION OF MESSAGE PASSING INTERFACE}}}{12}{}%
\contentsline {section}{\numberline {6.2}\bf Second Heading}{18}{}% \contentsline {section}{\numberline {5.1}\bf Introduction to MPI Utilization for Attack Graph Generation}{12}{}%
\contentsline {chapter}{\numberline {CHAPTER 7: }{\bf \uppercase {CONCLUSIONS AND FUTURE WORKS}}}{19}{}% \contentsline {section}{\numberline {5.2}\bf Necessary Components}{12}{}%
\contentsline {section}{\numberline {7.1}\bf First Heading}{19}{}% \contentsline {subsection}{\numberline {5.2.1}\it Serialization}{12}{}%
\contentsline {section}{\numberline {7.2}\bf Second Heading}{20}{}% \contentsline {subsection}{\numberline {5.2.2}\it Data Consistency}{12}{}%
\contentsline {section}{\numberline {5.3}\bf Tasking Approach}{12}{}%
\contentsline {subsection}{\numberline {5.3.1}\it Introduction to the Tasking Approach}{12}{}%
\contentsline {subsection}{\numberline {5.3.2}\it Algorithm Design}{12}{}%
\contentsline {subsubsection}{Communication Structure}{12}{}%
\contentsline {subsubsection}{Task Zero}{12}{}%
\contentsline {subsubsection}{Task One}{12}{}%
\contentsline {subsubsection}{Task Two}{12}{}%
\contentsline {subsubsection}{Task Three}{12}{}%
\contentsline {subsubsection}{Task Four}{12}{}%
\contentsline {subsubsection}{Task Five}{13}{}%
\contentsline {subsection}{\numberline {5.3.3}\it Performance Expectations}{13}{}%
\contentsline {section}{\numberline {5.4}\bf Subgraphing Approach}{13}{}%
\contentsline {subsection}{\numberline {5.4.1}\it Introduction to the Subgraphing Approach}{13}{}%
\contentsline {subsection}{\numberline {5.4.2}\it Algorithm Design}{13}{}%
\contentsline {subsubsection}{Communication Structure}{13}{}%
\contentsline {subsubsection}{Worker Nodes}{13}{}%
\contentsline {subsubsection}{Root Node}{13}{}%
\contentsline {subsubsection}{Database Node}{13}{}%
\contentsline {subsection}{\numberline {5.4.3}\it Performance Expectations}{13}{}%
\contentsline {chapter}{\numberline {CHAPTER 6: }{\bf \uppercase {PERFORMANCE ANALYSIS}}}{14}{}%
\contentsline {section}{\numberline {6.1}\bf Small Networks}{14}{}%
\contentsline {subsection}{\numberline {6.1.1}\it Test Information}{14}{}%
\contentsline {subsection}{\numberline {6.1.2}\it Results}{14}{}%
\contentsline {subsection}{\numberline {6.1.3}\it Analysis}{14}{}%
\contentsline {section}{\numberline {6.2}\bf Large Networks}{14}{}%
\contentsline {subsection}{\numberline {6.2.1}\it Test Information}{14}{}%
\contentsline {subsection}{\numberline {6.2.2}\it Results}{14}{}%
\contentsline {subsection}{\numberline {6.2.3}\it Analysis}{14}{}%
\contentsline {section}{\numberline {6.3}\bf Large Exploit Lists}{14}{}%
\contentsline {subsection}{\numberline {6.3.1}\it Test Information}{14}{}%
\contentsline {subsection}{\numberline {6.3.2}\it Results}{14}{}%
\contentsline {subsection}{\numberline {6.3.3}\it Analysis}{14}{}%
\contentsline {section}{\numberline {6.4}\bf Distributed Hash Tables}{14}{}%
\contentsline {subsection}{\numberline {6.4.1}\it Test Information}{15}{}%
\contentsline {subsection}{\numberline {6.4.2}\it Results}{15}{}%
\contentsline {subsection}{\numberline {6.4.3}\it Analysis}{15}{}%
\contentsline {chapter}{\numberline {CHAPTER 7: }{\bf \uppercase {CONCLUSIONS AND FUTURE WORKS}}}{16}{}%
\contentsline {section}{\numberline {7.1}\bf Future Work}{16}{}%
{\hfill \ } {\hfill \ }
\contentsline {section}{\hspace {-\parindent }NOMENCLATURE}{21}{}% \contentsline {section}{\hspace {-\parindent }NOMENCLATURE}{17}{}%
\addvspace {10pt} \addvspace {10pt}
\contentsline {section}{\hspace {-\parindent }BIBLIOGRAPHY}{21}{}% \contentsline {section}{\hspace {-\parindent }BIBLIOGRAPHY}{17}{}%
{\hfill \ } {\hfill \ }
\contentsline {section}{\hspace {-\parindent }APPENDIX A:\ \ {\bf \uppercase {THE FIRST APPENDIX}} }{22}{}% \contentsline {section}{\hspace {-\parindent }APPENDIX A:\ \ {\bf \uppercase {THE FIRST APPENDIX}} }{18}{}%
\contentsline {section}{\hspace {-\parindent }APPENDIX B:\ \ {\bf \uppercase {THE SECOND APPENDIX}} }{23}{}% \contentsline {section}{\hspace {-\parindent }APPENDIX B:\ \ {\bf \uppercase {THE SECOND APPENDIX}} }{19}{}%
\contentsline {section}{\numberline {B.1}\bf A Heading in an Appendix}{23}{}% \contentsline {section}{\numberline {B.1}\bf A Heading in an Appendix}{19}{}%
\contentsline {subsection}{\numberline {B.1.1}\it A Subheading in an Appendix}{23}{}% \contentsline {subsection}{\numberline {B.1.1}\it A Subheading in an Appendix}{19}{}%
\contentsline {subsubsection}{A Sub-subsection in an Appendix}{23}{}% \contentsline {subsubsection}{A Sub-subsection in an Appendix}{19}{}%