37 lines
2.7 KiB
TeX
37 lines
2.7 KiB
TeX
\relax
|
|
\providecommand\babel@aux[2]{}
|
|
\@nameuse{bbl@beforestart}
|
|
\citation{phillips_graph-based_1998}
|
|
\citation{schneier_modeling_1999}
|
|
\babel@aux{nil}{}
|
|
\citation{j_hale_compliance_nodate}
|
|
\citation{baloyi_guidelines_2019}
|
|
\citation{allman_complying_2006}
|
|
\@writefile{toc}{\contentsline {section}{\numberline {1}Introduction}{2}{}\protected@file@percent }
|
|
\@writefile{toc}{\contentsline {subsection}{\numberline {1.1}Attack Graphs}{2}{}\protected@file@percent }
|
|
\@writefile{toc}{\contentsline {subsection}{\numberline {1.2}Compliance Graphs}{2}{}\protected@file@percent }
|
|
\bibdata{Bibliography}
|
|
\bibcite{phillips_graph-based_1998}{1}
|
|
\@writefile{toc}{\contentsline {subsection}{\numberline {1.3}Difficulties of Compliance Graph Analysis}{4}{}\protected@file@percent }
|
|
\@writefile{toc}{\contentsline {section}{\numberline {2}Related Works}{4}{}\protected@file@percent }
|
|
\@writefile{toc}{\contentsline {section}{\numberline {3}Experimental Networks}{4}{}\protected@file@percent }
|
|
\@writefile{toc}{\contentsline {section}{\numberline {4}Centralities}{4}{}\protected@file@percent }
|
|
\@writefile{toc}{\contentsline {subsection}{\numberline {4.1}Introduction}{4}{}\protected@file@percent }
|
|
\@writefile{toc}{\contentsline {subsection}{\numberline {4.2}Degree}{4}{}\protected@file@percent }
|
|
\@writefile{toc}{\contentsline {subsection}{\numberline {4.3}Betweenness}{4}{}\protected@file@percent }
|
|
\@writefile{toc}{\contentsline {subsection}{\numberline {4.4}Katz}{4}{}\protected@file@percent }
|
|
\@writefile{toc}{\contentsline {subsection}{\numberline {4.5}K-Path Edge}{4}{}\protected@file@percent }
|
|
\@writefile{toc}{\contentsline {subsection}{\numberline {4.6}Adapted Page Rank}{4}{}\protected@file@percent }
|
|
\@writefile{toc}{\contentsline {section}{\numberline {5}Transitive Closure}{4}{}\protected@file@percent }
|
|
\@writefile{toc}{\contentsline {subsection}{\numberline {5.1}Introduction}{4}{}\protected@file@percent }
|
|
\@writefile{toc}{\contentsline {subsection}{\numberline {5.2}Application}{4}{}\protected@file@percent }
|
|
\@writefile{toc}{\contentsline {section}{\numberline {6}Dominant Tree}{4}{}\protected@file@percent }
|
|
\@writefile{toc}{\contentsline {subsection}{\numberline {6.1}Introduction}{4}{}\protected@file@percent }
|
|
\@writefile{toc}{\contentsline {subsection}{\numberline {6.2}Application}{4}{}\protected@file@percent }
|
|
\@writefile{toc}{\contentsline {section}{\numberline {7}Results and Result Analysis}{4}{}\protected@file@percent }
|
|
\@writefile{toc}{\contentsline {section}{\numberline {8}Conclusions and Future Work}{4}{}\protected@file@percent }
|
|
\@writefile{toc}{\contentsline {section}{Bibliography}{4}{}\protected@file@percent }
|
|
\bibcite{schneier_modeling_1999}{2}
|
|
\bibstyle{ieeetr}
|
|
\gdef \@abspage@last{5}
|