\begin{thebibliography}{10} \bibitem{ainsworth_graph_2016} Sam Ainsworth and Timothy~M. Jones. \newblock Graph prefetching using data structure knowledge. \newblock {\em Proceedings of the International Conference on Supercomputing}, 01-03-June, 2016. \bibitem{allman_complying_2006} Eric Allman. \newblock Complying with {Compliance}: {Blowing} it off is not an option. \newblock {\em ACM Queue}, 4(7), 2006. \bibitem{baloyi_guidelines_2019} Ntsako Baloyi and Paula Kotzé. \newblock Guidelines for {Data} {Privacy} {Compliance}: {A} {Focus} on {Cyberphysical} {Systems} and {Internet} of {Things}. \newblock In {\em {SAICSIT} '19: {Proceedings} of the {South} {African} {Institute} of {Computer} {Scientists} and {Information} {Technologists} 2019}, Skukuza South Africa, 2019. Association for Computing Machinery. \bibitem{berry_graph_2007} Jonathan Berry and Bruce Hendrickson. \newblock Graph {Analysis} with {High} {Performance} {Computing}. \newblock {\em Computing in Science and Engineering}, 2007. \bibitem{cook_rage_2018} Kyle Cook. \newblock {\em {RAGE}: {The} {Rage} {Attack} {Graph} {Engine}}. \newblock PhD thesis, 2018. \bibitem{CVE-2019-10747} {set-value is vulnerable to Prototype Pollution in versions lower than 3.0.1. The function mixin-deep could be tricked into adding or modifying properties of Object.prototype using any of the constructor, prototype and $\_$proto$\_$ payloads.} \newblock National Vulnerability Database, August 2019. \bibitem{j_hale_compliance_nodate} {J. Hale}, P.~Hawrylak, and M.~Papa. \newblock Compliance {Method} for a {Cyber}-{Physical} {System}. \bibitem{li_combining_2019} Ming Li, Peter Hawrylak, and John Hale. \newblock Combining {OpenCL} and {MPI} to support heterogeneous computing on a cluster. \newblock {\em ACM International Conference Proceeding Series}, 2019. \bibitem{li_concurrency_2019} Ming Li, Peter Hawrylak, and John Hale. \newblock Concurrency {Strategies} for {Attack} {Graph} {Generation}. \newblock {\em Proceedings - 2019 2nd International Conference on Data Intelligence and Security, ICDIS 2019}, pages 174--179, 2019. \bibitem{ou_scalable_2006} Xinming Ou, Wayne~F Boyer, and Miles~A Mcqueen. \newblock A {Scalable} {Approach} to {Attack} {Graph} {Generation}. \newblock pages 336--345, 2006. \bibitem{phillips_graph-based_1998} Cynthia Phillips and Laura~Painton Swiler. \newblock A graph-based system for network-vulnerability analysis. \newblock {\em Proceedings New Security Paradigms Workshop}, Part F1292:71--79, 1998. \bibitem{schneier_modeling_1999} Bruce Schneier. \newblock Modeling {Security} {Threats}, 1999. \newblock Publication Title: Dr. Dobb's Journal. \bibitem{sheyner_automated_2002} O.~Sheyner, J.~Haines, S.~Jha, R.. Lippmann, and J.~Wing. \newblock Automated {Generation} and {Analysis} of {Attack} {Graphs}. \newblock {\em Proceeding of 2002 IEEE Symposium on Security and Privacy}, pages 254--265, 2002. \bibitem{zhang_boosting_2017} Jialiang Zhang, Soroosh Khoram, and Jing Li. \newblock Boosting the performance of {FPGA}-based graph processor using hybrid memory cube: {A} case for breadth first search. \newblock {\em FPGA 2017 - Proceedings of the 2017 ACM/SIGDA International Symposium on Field-Programmable Gate Arrays}, pages 207--216, 2017. \end{thebibliography}