Network-Theory_Compliance-G.../Report/Schrick-Noah_CS-7863_Final-Report.aux

37 lines
2.7 KiB
TeX

\relax
\providecommand\babel@aux[2]{}
\@nameuse{bbl@beforestart}
\citation{phillips_graph-based_1998}
\citation{schneier_modeling_1999}
\babel@aux{nil}{}
\citation{j_hale_compliance_nodate}
\citation{baloyi_guidelines_2019}
\citation{allman_complying_2006}
\@writefile{toc}{\contentsline {section}{\numberline {1}Introduction}{2}{}\protected@file@percent }
\@writefile{toc}{\contentsline {subsection}{\numberline {1.1}Attack Graphs}{2}{}\protected@file@percent }
\@writefile{toc}{\contentsline {subsection}{\numberline {1.2}Compliance Graphs}{2}{}\protected@file@percent }
\bibdata{Bibliography}
\bibcite{phillips_graph-based_1998}{1}
\@writefile{toc}{\contentsline {subsection}{\numberline {1.3}Difficulties of Compliance Graph Analysis}{4}{}\protected@file@percent }
\@writefile{toc}{\contentsline {section}{\numberline {2}Related Works}{4}{}\protected@file@percent }
\@writefile{toc}{\contentsline {section}{\numberline {3}Experimental Networks}{4}{}\protected@file@percent }
\@writefile{toc}{\contentsline {section}{\numberline {4}Centralities}{4}{}\protected@file@percent }
\@writefile{toc}{\contentsline {subsection}{\numberline {4.1}Introduction}{4}{}\protected@file@percent }
\@writefile{toc}{\contentsline {subsection}{\numberline {4.2}Degree}{4}{}\protected@file@percent }
\@writefile{toc}{\contentsline {subsection}{\numberline {4.3}Betweenness}{4}{}\protected@file@percent }
\@writefile{toc}{\contentsline {subsection}{\numberline {4.4}Katz}{4}{}\protected@file@percent }
\@writefile{toc}{\contentsline {subsection}{\numberline {4.5}K-Path Edge}{4}{}\protected@file@percent }
\@writefile{toc}{\contentsline {subsection}{\numberline {4.6}Adapted Page Rank}{4}{}\protected@file@percent }
\@writefile{toc}{\contentsline {section}{\numberline {5}Transitive Closure}{4}{}\protected@file@percent }
\@writefile{toc}{\contentsline {subsection}{\numberline {5.1}Introduction}{4}{}\protected@file@percent }
\@writefile{toc}{\contentsline {subsection}{\numberline {5.2}Application}{4}{}\protected@file@percent }
\@writefile{toc}{\contentsline {section}{\numberline {6}Dominant Tree}{4}{}\protected@file@percent }
\@writefile{toc}{\contentsline {subsection}{\numberline {6.1}Introduction}{4}{}\protected@file@percent }
\@writefile{toc}{\contentsline {subsection}{\numberline {6.2}Application}{4}{}\protected@file@percent }
\@writefile{toc}{\contentsline {section}{\numberline {7}Results and Result Analysis}{4}{}\protected@file@percent }
\@writefile{toc}{\contentsline {section}{\numberline {8}Conclusions and Future Work}{4}{}\protected@file@percent }
\@writefile{toc}{\contentsline {section}{Bibliography}{4}{}\protected@file@percent }
\bibcite{schneier_modeling_1999}{2}
\bibstyle{ieeetr}
\gdef \@abspage@last{5}