76 lines
3.6 KiB
TeX
76 lines
3.6 KiB
TeX
\relax
|
|
\providecommand\hyper@newdestlabel[2]{}
|
|
\citation{Graphviz}
|
|
\@writefile{toc}{\contentsline {chapter}{\numberline {CHAPTER 3: }{\bf \uppercase {UTILITY EXTENSIONS TO THE RAGE ATTACK GRAPH GENERATOR}}}{8}{chapter.3}\protected@file@percent }
|
|
\@writefile{toc}{\contentsline {section}{\numberline {3.1}\bf Path Walking}{8}{section.3.1}\protected@file@percent }
|
|
\newlabel{sec:PW}{{3.1}{8}{\bf Path Walking}{section.3.1}{}}
|
|
\@writefile{lof}{\contentsline {figure}{\numberline {3.1}{\ignorespaces Path Walking to State 14\relax }}{9}{figure.caption.1}\protected@file@percent }
|
|
\providecommand*\caption@xref[2]{\@setref\relax\@undefined{#1}}
|
|
\newlabel{fig:PW}{{3.1}{9}{Path Walking to State 14\relax }{figure.caption.1}{}}
|
|
\@writefile{toc}{\contentsline {section}{\numberline {3.2}\bf Color Coding}{9}{section.3.2}\protected@file@percent }
|
|
\@writefile{lof}{\contentsline {figure}{\numberline {3.2}{\ignorespaces Color Coding a Small Network Based on Violations\relax }}{10}{figure.caption.2}\protected@file@percent }
|
|
\newlabel{fig:CC}{{3.2}{10}{Color Coding a Small Network Based on Violations\relax }{figure.caption.2}{}}
|
|
\citation{nichols_2018}
|
|
\citation{cook_rage_2018}
|
|
\citation{cook_rage_2018}
|
|
\@writefile{toc}{\contentsline {section}{\numberline {3.3}\bf Compound Operators}{11}{section.3.3}\protected@file@percent }
|
|
\newlabel{sec:compops}{{3.3}{11}{\bf Compound Operators}{section.3.3}{}}
|
|
\citation{CVE-2019-10747}
|
|
\@writefile{toc}{\contentsline {section}{\numberline {3.4}\bf Relational Operators}{12}{section.3.4}\protected@file@percent }
|
|
\newlabel{sec:relops}{{3.4}{12}{\bf Relational Operators}{section.3.4}{}}
|
|
\citation{nichols_2018}
|
|
\citation{cook_rage_2018}
|
|
\citation{cook_rage_2018}
|
|
\@writefile{toc}{\contentsline {section}{\numberline {3.5}\bf Intermediate Database Storage}{13}{section.3.5}\protected@file@percent }
|
|
\newlabel{sec:db-stor}{{3.5}{13}{\bf Intermediate Database Storage}{section.3.5}{}}
|
|
\@writefile{toc}{\contentsline {subsection}{\numberline {3.5.1}\it Introduction to Intermediate Database Storage}{13}{subsection.3.5.1}\protected@file@percent }
|
|
\citation{cook_rage_2018}
|
|
\citation{li_concurrency_2019}
|
|
\citation{li_combining_2019}
|
|
\citation{zhang_boosting_2017}
|
|
\citation{ainsworth_graph_2016}
|
|
\citation{berry_graph_2007}
|
|
\citation{cook_rage_2018}
|
|
\citation{zhang_boosting_2017}
|
|
\@writefile{toc}{\contentsline {subsection}{\numberline {3.5.2}\it Memory Constraint Difficulties}{14}{subsection.3.5.2}\protected@file@percent }
|
|
\@writefile{toc}{\contentsline {subsection}{\numberline {3.5.3}\it Maximizing Performance with Intermediate Database Storage}{15}{subsection.3.5.3}\protected@file@percent }
|
|
\@writefile{toc}{\contentsline {subsection}{\numberline {3.5.4}\it Portability}{17}{subsection.3.5.4}\protected@file@percent }
|
|
\@setckpt{Chapter3}{
|
|
\setcounter{page}{18}
|
|
\setcounter{equation}{0}
|
|
\setcounter{enumi}{4}
|
|
\setcounter{enumii}{0}
|
|
\setcounter{enumiii}{0}
|
|
\setcounter{enumiv}{0}
|
|
\setcounter{footnote}{0}
|
|
\setcounter{mpfootnote}{0}
|
|
\setcounter{part}{0}
|
|
\setcounter{chapter}{3}
|
|
\setcounter{section}{5}
|
|
\setcounter{subsection}{4}
|
|
\setcounter{subsubsection}{0}
|
|
\setcounter{paragraph}{0}
|
|
\setcounter{subparagraph}{0}
|
|
\setcounter{figure}{2}
|
|
\setcounter{table}{0}
|
|
\setcounter{caption@flags}{2}
|
|
\setcounter{continuedfloat}{0}
|
|
\setcounter{subfigure}{0}
|
|
\setcounter{subtable}{0}
|
|
\setcounter{float@type}{8}
|
|
\setcounter{algorithm}{0}
|
|
\setcounter{ALG@line}{0}
|
|
\setcounter{ALG@rem}{0}
|
|
\setcounter{ALG@nested}{0}
|
|
\setcounter{ALG@Lnr}{2}
|
|
\setcounter{ALG@blocknr}{10}
|
|
\setcounter{ALG@storecount}{0}
|
|
\setcounter{ALG@tmpcounter}{0}
|
|
\setcounter{Item}{4}
|
|
\setcounter{Hfootnote}{0}
|
|
\setcounter{bookmark@seq@number}{27}
|
|
\setcounter{lofdepth}{1}
|
|
\setcounter{lotdepth}{1}
|
|
\setcounter{section@level}{2}
|
|
}
|