\begin{thebibliography}{10} \bibitem{phillips_graph-based_1998} C.~Phillips and L.~P. Swiler, ``A graph-based system for network-vulnerability analysis,'' {\em Proceedings New Security Paradigms Workshop}, vol.~Part F1292, pp.~71--79, 1998. \newblock doi: 10.1145/310889.310919. \bibitem{schneier_modeling_1999} B.~Schneier, ``Modeling {Security} {Threats},'' {\em Dr. Dobb's Journal}, 1999. \newblock vol. 24, no.12. \bibitem{j_hale_compliance_nodate} {J. Hale}, P.~Hawrylak, and M.~Papa, ``Compliance {Method} for a {Cyber}-{Physical} {System}.'' \newblock U.S. Patent Number 9,471,789, Oct. 18, 2016. \bibitem{baloyi_guidelines_2019} N.~Baloyi and P.~Kotzé, ``Guidelines for {Data} {Privacy} {Compliance}: {A} {Focus} on {Cyberphysical} {Systems} and {Internet} of {Things},'' in {\em {SAICSIT} '19: {Proceedings} of the {South} {African} {Institute} of {Computer} {Scientists} and {Information} {Technologists} 2019}, (Skukuza South Africa), Association for Computing Machinery, 2019. \bibitem{allman_complying_2006} E.~Allman, ``Complying with {Compliance}: {Blowing} it off is not an option.,'' {\em ACM Queue}, vol.~4, no.~7, 2006. \bibitem{newman2010networks} M.~Newman, {\em Networks: An Introduction}. \newblock Oxford University Press, 2010. \bibitem{Mieghem2018DirectedGA} P.~V. Mieghem, ``Directed graphs and mysterious complex eigenvalues,'' 2018. \bibitem{ming_diss} M.~Li, {\em {A} {System} for {Attack} {Graph} {Generation} and {Analysis}}. \newblock PhD thesis, The {University} of {Tulsa}, 2021. \bibitem{Guo2017HermitianAM} K.~Guo and B.~Mohar, ``Hermitian adjacency matrix of digraphs and mixed graphs,'' {\em Journal of Graph Theory}, vol.~85, 2017. \bibitem{Brualdi2010SpectraOD} R.~A. Brualdi, ``Spectra of digraphs,'' {\em Linear Algebra and its Applications}, vol.~432, pp.~2181--2213, 2010. \bibitem{noauthor_health_1996} ``Health {Insurance} {Portability} and {Accountability} {Act} of 1996.'' \newblock Pub. L. No. 104-191. 1996 [Online]. Available: https://www.govinfo.gov/content/pkg/PLAW-104publ191/html/PLAW-104publ191.htm. \bibitem{PCI} P.~S.~S. Council, ``Payment {Card} {Industry} {(PCI)} {Data} {Security} {Standard},'' May 2018. \newblock {Available: https://www.pcisecuritystandards.org/documents/PCI$\_$DSS$\_$v3-2-1.pdf}. \bibitem{PMID:30064421} M.~Ashtiani, A.~Salehzadeh-Yazdi, Z.~Razaghi-Moghadam, H.~Hennig, O.~Wolkenhauer, M.~Mirzaie, and M.~Jafari, ``A systematic survey of centrality measures for protein-protein interaction networks,'' {\em BMC systems biology}, vol.~12, p.~80, July 2018. \bibitem{Katz} L.~Katz, ``{A new status index derived from sociometric analysis},'' {\em Psychometrika}, vol.~18, pp.~39--43, March 1953. \bibitem{K_Path_Edge} P.~D. Meo, E.~Ferrara, G.~Fiumara, and A.~Ricciardello, ``A novel measure of edge centrality in social networks,'' {\em Knowledge-Based Systems}, vol.~30, pp.~136--150, jun 2012. \bibitem{PageRank} S.~Brin and L.~Page, ``The anatomy of a large-scale hypertextual web search engine,'' {\em Computer Networks and ISDN Systems}, vol.~30, no.~1, pp.~107--117, 1998. \newblock Proceedings of the Seventh International World Wide Web Conference. \bibitem{Adapted_PageRank} T.~Agryzkov, J.~L. Oliver, L.~Tortosa, and J.-F. Vicent, ``An algorithm for ranking the nodes of an urban network based on the concept of pagerank vector,'' {\em Appl. Math. Comput.}, vol.~219, pp.~2186--2193, 2012. \bibitem{li_combining_2019} M.~Li, P.~Hawrylak, and J.~Hale, ``Combining {OpenCL} and {MPI} to support heterogeneous computing on a cluster,'' {\em ACM International Conference Proceeding Series}, 2019. \bibitem{zeng_cyber_2017} K.~Zeng, ``Cyber {Attack} {Analysis} {Based} on {Markov} {Process} {Model},'' 2017. \bibitem{dominance} R.~T. Prosser, ``Applications of boolean matrices to the analysis of flow diagrams,'' in {\em Papers Presented at the December 1-3, 1959, Eastern Joint IRE-AIEE-ACM Computer Conference}, IRE-AIEE-ACM '59 (Eastern), (New York, NY, USA), p.~133–138, Association for Computing Machinery, 1959. \end{thebibliography}