2Wasserman S, Faust K. Social Network Analysis: Methods and Applications[M]. Cambridge: Cambridge University Press, 1994.
3Faloutsos M, Faloutsos P, Faloutsos C. On power-law relationships of the internet topology[J]. Comput. Commun. Rev., 1999,29: 251-262.
4Lawrence S, Giles C L. Searching the world wide web[J]. Science, 1998, 280: 98.
5Fratta L, Montanari U G. A recurisive method based on case analysis for computing network terminal reliability[J]. IEEE Trans. On Communication, 1978, 26 (8): 1166-1177.
6Albert R, Jeong H, Barabasi A L. Error and attack tolerance of complex networks[J]. Nature, 2000,406: 378-382.
7Albert R, Barabasi A L. Statistical mechanics of complex networks[J]. Rev. Mod. Phys., 2002, 74: 47-97.
8Frank H, Frisch I. Analysis and design of survivable network[J]. IEEE Trans. on Communication Technology, 1970, COM-18(5) : 567-662.
9Wilkov R S, Analysis and design of reliable computer networks[J]. IEEE Trans. on Communication, 1972, 20(3) : 660-678.
10Boesch F T, Thomas R E. On graphs of in-vulnerable communication nets[J]. IEEE Trans. on Circuit Theory, 1970, CT-17(2) :183-192.