101 lines
4.0 KiB
Plaintext
101 lines
4.0 KiB
Plaintext
\begin{thebibliography}{10}
|
||
|
||
\bibitem{phillips_graph-based_1998}
|
||
C.~Phillips and L.~P. Swiler, ``A graph-based system for network-vulnerability
|
||
analysis,'' {\em Proceedings New Security Paradigms Workshop}, vol.~Part
|
||
F1292, pp.~71--79, 1998.
|
||
\newblock doi: 10.1145/310889.310919.
|
||
|
||
\bibitem{schneier_modeling_1999}
|
||
B.~Schneier, ``Modeling {Security} {Threats},'' {\em Dr. Dobb's Journal}, 1999.
|
||
\newblock vol. 24, no.12.
|
||
|
||
\bibitem{j_hale_compliance_nodate}
|
||
{J. Hale}, P.~Hawrylak, and M.~Papa, ``Compliance {Method} for a
|
||
{Cyber}-{Physical} {System}.''
|
||
\newblock U.S. Patent Number 9,471,789, Oct. 18, 2016.
|
||
|
||
\bibitem{baloyi_guidelines_2019}
|
||
N.~Baloyi and P.~Kotzé, ``Guidelines for {Data} {Privacy} {Compliance}: {A}
|
||
{Focus} on {Cyberphysical} {Systems} and {Internet} of {Things},'' in {\em
|
||
{SAICSIT} '19: {Proceedings} of the {South} {African} {Institute} of
|
||
{Computer} {Scientists} and {Information} {Technologists} 2019}, (Skukuza
|
||
South Africa), Association for Computing Machinery, 2019.
|
||
|
||
\bibitem{allman_complying_2006}
|
||
E.~Allman, ``Complying with {Compliance}: {Blowing} it off is not an option.,''
|
||
{\em ACM Queue}, vol.~4, no.~7, 2006.
|
||
|
||
\bibitem{newman2010networks}
|
||
M.~Newman, {\em Networks: An Introduction}.
|
||
\newblock Oxford University Press, 2010.
|
||
|
||
\bibitem{Mieghem2018DirectedGA}
|
||
P.~V. Mieghem, ``Directed graphs and mysterious complex eigenvalues,'' 2018.
|
||
|
||
\bibitem{ming_diss}
|
||
M.~Li, {\em {A} {System} for {Attack} {Graph} {Generation} and {Analysis}}.
|
||
\newblock PhD thesis, The {University} of {Tulsa}, 2021.
|
||
|
||
\bibitem{Guo2017HermitianAM}
|
||
K.~Guo and B.~Mohar, ``Hermitian adjacency matrix of digraphs and mixed
|
||
graphs,'' {\em Journal of Graph Theory}, vol.~85, 2017.
|
||
|
||
\bibitem{Brualdi2010SpectraOD}
|
||
R.~A. Brualdi, ``Spectra of digraphs,'' {\em Linear Algebra and its
|
||
Applications}, vol.~432, pp.~2181--2213, 2010.
|
||
|
||
\bibitem{noauthor_health_1996}
|
||
``Health {Insurance} {Portability} and {Accountability} {Act} of 1996.''
|
||
\newblock Pub. L. No. 104-191. 1996 [Online]. Available:
|
||
https://www.govinfo.gov/content/pkg/PLAW-104publ191/html/PLAW-104publ191.htm.
|
||
|
||
\bibitem{PCI}
|
||
P.~S.~S. Council, ``Payment {Card} {Industry} {(PCI)} {Data} {Security}
|
||
{Standard},'' May 2018.
|
||
\newblock {Available:
|
||
https://www.pcisecuritystandards.org/documents/PCI$\_$DSS$\_$v3-2-1.pdf}.
|
||
|
||
\bibitem{PMID:30064421}
|
||
M.~Ashtiani, A.~Salehzadeh-Yazdi, Z.~Razaghi-Moghadam, H.~Hennig,
|
||
O.~Wolkenhauer, M.~Mirzaie, and M.~Jafari, ``A systematic survey of
|
||
centrality measures for protein-protein interaction networks,'' {\em BMC
|
||
systems biology}, vol.~12, p.~80, July 2018.
|
||
|
||
\bibitem{Katz}
|
||
L.~Katz, ``{A new status index derived from sociometric analysis},'' {\em
|
||
Psychometrika}, vol.~18, pp.~39--43, March 1953.
|
||
|
||
\bibitem{K_Path_Edge}
|
||
P.~D. Meo, E.~Ferrara, G.~Fiumara, and A.~Ricciardello, ``A novel measure of
|
||
edge centrality in social networks,'' {\em Knowledge-Based Systems}, vol.~30,
|
||
pp.~136--150, jun 2012.
|
||
|
||
\bibitem{PageRank}
|
||
S.~Brin and L.~Page, ``The anatomy of a large-scale hypertextual web search
|
||
engine,'' {\em Computer Networks and ISDN Systems}, vol.~30, no.~1,
|
||
pp.~107--117, 1998.
|
||
\newblock Proceedings of the Seventh International World Wide Web Conference.
|
||
|
||
\bibitem{Adapted_PageRank}
|
||
T.~Agryzkov, J.~L. Oliver, L.~Tortosa, and J.-F. Vicent, ``An algorithm for
|
||
ranking the nodes of an urban network based on the concept of pagerank
|
||
vector,'' {\em Appl. Math. Comput.}, vol.~219, pp.~2186--2193, 2012.
|
||
|
||
\bibitem{li_combining_2019}
|
||
M.~Li, P.~Hawrylak, and J.~Hale, ``Combining {OpenCL} and {MPI} to support
|
||
heterogeneous computing on a cluster,'' {\em ACM International Conference
|
||
Proceeding Series}, 2019.
|
||
|
||
\bibitem{zeng_cyber_2017}
|
||
K.~Zeng, ``Cyber {Attack} {Analysis} {Based} on {Markov} {Process} {Model},''
|
||
2017.
|
||
|
||
\bibitem{dominance}
|
||
R.~T. Prosser, ``Applications of boolean matrices to the analysis of flow
|
||
diagrams,'' in {\em Papers Presented at the December 1-3, 1959, Eastern Joint
|
||
IRE-AIEE-ACM Computer Conference}, IRE-AIEE-ACM '59 (Eastern), (New York, NY,
|
||
USA), p.~133–138, Association for Computing Machinery, 1959.
|
||
|
||
\end{thebibliography}
|