\babel@toc {nil}{}\relax \contentsline {section}{\numberline {1}Introduction}{2}{}% \contentsline {subsection}{\numberline {1.1}Attack Graphs}{2}{}% \contentsline {subsection}{\numberline {1.2}Compliance Graphs}{2}{}% \contentsline {subsection}{\numberline {1.3}Difficulties of Compliance Graph Analysis}{3}{}% \contentsline {section}{\numberline {2}Related Works}{3}{}% \contentsline {section}{\numberline {3}Experimental Networks}{4}{}% \contentsline {section}{\numberline {4}Centralities and their Applications to Compliance Graphs}{4}{}% \contentsline {subsection}{\numberline {4.1}Introduction}{4}{}% \contentsline {subsection}{\numberline {4.2}Degree}{5}{}% \contentsline {subsection}{\numberline {4.3}Betweenness}{5}{}% \contentsline {subsection}{\numberline {4.4}Katz}{6}{}% \contentsline {subsection}{\numberline {4.5}K-Path Edge}{6}{}% \contentsline {subsection}{\numberline {4.6}Adapted Page Rank}{7}{}% \contentsline {section}{\numberline {5}Transitive Closure}{8}{}% \contentsline {subsection}{\numberline {5.1}Introduction and Application}{8}{}% \contentsline {section}{\numberline {6}Dominant Tree}{9}{}% \contentsline {subsection}{\numberline {6.1}Introduction and Application}{9}{}% \contentsline {section}{\numberline {7}Results and Result Analysis}{12}{}% \contentsline {section}{\numberline {8}Conclusions and Future Work}{12}{}% \contentsline {section}{Bibliography}{13}{}%