45 lines
1.7 KiB
Plaintext
45 lines
1.7 KiB
Plaintext
\begin{thebibliography}{1}
|
|
|
|
\bibitem{phillips_graph-based_1998}
|
|
C.~Phillips and L.~P. Swiler, ``A graph-based system for network-vulnerability
|
|
analysis,'' {\em Proceedings New Security Paradigms Workshop}, vol.~Part
|
|
F1292, pp.~71--79, 1998.
|
|
\newblock doi: 10.1145/310889.310919.
|
|
|
|
\bibitem{schneier_modeling_1999}
|
|
B.~Schneier, ``Modeling {Security} {Threats},'' {\em Dr. Dobb's Journal}, 1999.
|
|
\newblock vol. 24, no.12.
|
|
|
|
\bibitem{j_hale_compliance_nodate}
|
|
{J. Hale}, P.~Hawrylak, and M.~Papa, ``Compliance {Method} for a
|
|
{Cyber}-{Physical} {System}.''
|
|
\newblock U.S. Patent Number 9,471,789, Oct. 18, 2016.
|
|
|
|
\bibitem{baloyi_guidelines_2019}
|
|
N.~Baloyi and P.~Kotzé, ``Guidelines for {Data} {Privacy} {Compliance}: {A}
|
|
{Focus} on {Cyberphysical} {Systems} and {Internet} of {Things},'' in {\em
|
|
{SAICSIT} '19: {Proceedings} of the {South} {African} {Institute} of
|
|
{Computer} {Scientists} and {Information} {Technologists} 2019}, (Skukuza
|
|
South Africa), Association for Computing Machinery, 2019.
|
|
|
|
\bibitem{allman_complying_2006}
|
|
E.~Allman, ``Complying with {Compliance}: {Blowing} it off is not an option.,''
|
|
{\em ACM Queue}, vol.~4, no.~7, 2006.
|
|
|
|
\bibitem{Mieghem2018DirectedGA}
|
|
P.~V. Mieghem, ``Directed graphs and mysterious complex eigenvalues,'' 2018.
|
|
|
|
\bibitem{ming_diss}
|
|
M.~Li, {\em {A} {System} for {Attack} {Graph} {Generation} and {Analysis}}.
|
|
\newblock PhD thesis, The {University} of {Tulsa}, 2021.
|
|
|
|
\bibitem{Guo2017HermitianAM}
|
|
K.~Guo and B.~Mohar, ``Hermitian adjacency matrix of digraphs and mixed
|
|
graphs,'' {\em Journal of Graph Theory}, vol.~85, 2017.
|
|
|
|
\bibitem{Brualdi2010SpectraOD}
|
|
R.~A. Brualdi, ``Spectra of digraphs,'' {\em Linear Algebra and its
|
|
Applications}, vol.~432, pp.~2181--2213, 2010.
|
|
|
|
\end{thebibliography}
|