\begin{thebibliography}{10} \bibitem{phillips_graph-based_1998} C.~Phillips and L.~P. Swiler, ``A graph-based system for network-vulnerability analysis,'' {\em Proceedings New Security Paradigms Workshop}, vol.~Part F1292, pp.~71--79, 1998. \newblock doi: 10.1145/310889.310919. \bibitem{schneier_modeling_1999} B.~Schneier, ``Modeling {Security} {Threats},'' {\em Dr. Dobb's Journal}, 1999. \newblock vol. 24, no.12. \bibitem{ou_scalable_2006} X.~Ou, W.~F. Boyer, and M.~A. Mcqueen, ``A {Scalable} {Approach} to {Attack} {Graph} {Generation},'' {\em CCS '06: Proceedings of the 13th ACM conference on Computer and communications security}, pp.~336--345, 2006. \bibitem{CPSIOT} A.~T. Al~Ghazo, M.~Ibrahim, H.~Ren, and R.~Kumar, ``A2g2v: Automated attack graph generator and visualizer,'' in {\em Proceedings of the 1st ACM MobiHoc Workshop on Mobile IoT Sensing, Security, and Privacy}, Mobile IoT SSP'18, (New York, NY, USA), Association for Computing Machinery, 2018. \bibitem{ming_jo} M.~Li, P.~Hawrylak, and J.~Hale, ``Strategies for practical hybrid attack graph generation and analysis,'' {\em Digital Threats}, oct 2021. \newblock Just Accepted. \bibitem{10.1145/3105760} L.~Mu\~{n}oz Gonz\'{a}lez, D.~Sgandurra, A.~Paudice, and E.~C. Lupu, ``Efficient attack graph analysis through approximate inference,'' {\em ACM Trans. Priv. Secur.}, vol.~20, jul 2017. \bibitem{8290918} H.~Wang, Z.~Chen, J.~Zhao, X.~Di, and D.~Liu, ``A vulnerability assessment method in industrial internet of things based on attack graph and maximum flow,'' {\em IEEE Access}, vol.~6, pp.~8599--8609, 2018. \bibitem{centrality_based} T.~Gonda, T.~Pascal, R.~Puzis, G.~Shani, and B.~Shapira, ``Analysis of attack graph representations for ranking vulnerability fixes,'' 09 2018. \bibitem{j_hale_compliance_nodate} {J. Hale}, P.~Hawrylak, and M.~Papa, ``Compliance {Method} for a {Cyber}-{Physical} {System}.'' \newblock U.S. Patent Number 9,471,789, Oct. 18, 2016. \bibitem{baloyi_guidelines_2019} N.~Baloyi and P.~Kotzé, ``Guidelines for {Data} {Privacy} {Compliance}: {A} {Focus} on {Cyberphysical} {Systems} and {Internet} of {Things},'' in {\em {SAICSIT} '19: {Proceedings} of the {South} {African} {Institute} of {Computer} {Scientists} and {Information} {Technologists} 2019}, (Skukuza South Africa), Association for Computing Machinery, 2019. \bibitem{allman_complying_2006} E.~Allman, ``Complying with {Compliance}: {Blowing} it off is not an option.,'' {\em ACM Queue}, vol.~4, no.~7, 2006. \bibitem{sheyner_automated_2002} O.~Sheyner, J.~Haines, S.~Jha, R.~Lippmann, and J.~Wing, ``Automated {Generation} and {Analysis} of {Attack} {Graphs},'' {\em Proceeding of 2002 IEEE Symposium on Security and Privacy}, pp.~254--265, 2002. \bibitem{zhang_boosting_2017} J.~Zhang, S.~Khoram, and J.~Li, ``Boosting the performance of {FPGA}-based graph processor using hybrid memory cube: {A} case for breadth first search,'' {\em FPGA 2017 - Proceedings of the 2017 ACM/SIGDA International Symposium on Field-Programmable Gate Arrays}, pp.~207--216, 2017. \bibitem{Monotonicity} P.~Ammann, D.~Wijesekera, and S.~Kaushik, ``Scalable, graph-based network vulnerability analysis,'' in {\em Proceedings of the 9th ACM Conference on Computer and Communications Security}, CCS '02, (New York, NY, USA), p.~217–224, Association for Computing Machinery, 2002. \bibitem{TVA} S.~Jajodia and S.~Noel, {\em Topological Vulnerability Analysis}, vol.~46, pp.~139--154. \newblock 09 2010. \bibitem{louthan_hybrid_2011} G.~Louthan, {\em Hybrid {Attack} {Graphs} for {Modeling} {Cyber}-{Physical} {Systems}}. \newblock PhD thesis, The {University} of {Tulsa}, 2011. \bibitem{cook_rage_2018} K.~Cook, {\em {RAGE}: {The} {Rage} {Attack} {Graph} {Engine}}. \newblock PhD thesis, The {University} of {Tulsa}, 2018. \bibitem{nichols_2018} W.~M. Nichols, {\em {Hybrid} {Attack} {Graphs} for {Use} with a {Simulation} of a {Cyber-Physical} {System}}. \newblock PhD thesis, The {University} of {Tulsa}, 2018. \bibitem{DMCA} ``H.r.2281 - {Digital {Millennium} {Copyright} {Act}}.'' \newblock Pub. L. No. 105-304. 1998 [Online]. Available: https://www.govinfo.gov/content/pkg/PLAW-105publ304/html/PLAW-105publ304.htm. \bibitem{Piracy} Y.~Kim, J.~Moon, S.~J. Cho, M.~Park, and S.~Han, ``Efficient identification of windows executable programs to prevent software piracy,'' in {\em 2014 Eighth International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing}, pp.~236--240, 2014. \bibitem{AndroidPiracy} N.~Kumari and M.~Chen, ``Malware and piracy detection in android applications,'' in {\em 2022 IEEE 5th International Conference on Multimedia Information Processing and Retrieval (MIPR)}, pp.~306--311, 2022. \end{thebibliography}