[1] Holme P, Kim B J, Yoon C N, et al. Attack vulnerability of complex networks [J]. Physical Review E Statistical Nonlinear & Soft Matter Physics, 2002, 65(5):056109.
[2] 刘建国,任卓明,郭强,等. 复杂网络中节点重要性排序的研究进展[J]. 物理学报,2013,62(17):178901.
[3] Barabási A L, Bonabeau E. Scalefree networks[J]. Scientific American, 2003, 288(5):60-69.
[4] Ma Q, Ma J. Identifying and ranking influential spreaders in complex networks with consideration of spreading probability[J]. Physica A: Statistical Mechanics and its Applications, 2017, 465:312-330.
[5] Liu Y, Tang M, Do Y, et al. Accurate ranking of influential spreaders in networks based on dynamically asymmetric link weights[J]. Physical Review E, 2017, 96(2):022323.
[6] Albert R, Jeong H, Barabasi A L. The diameter of the world wide web [J]. Nature, 1999, 401(6):130-131.
[7] Freeman L C. A set of measures of centrality based on betweenness[J]. Sociometry, 1977, 40(1):35-41.
[8] Borgatti S P, Everett M G. A Graphtheoretic perspective on centrality [J]. Social Networks, 2006, 28(4):466-484.
[9] Kitsak M, Gallosl K, Havlin S, et al. Identification of influential spreaders in complex networks [J]. Nature Physics, 2010, 6(11):888-893.
[10] Burt R S. Structureal Holes and Good Ideas [J]. American Journal of Sociology, 2004, 110(2):349-399.
[1]吴丹,赵江.基于复杂网络视角的网络图书广告鲁棒性分析[J].浙江理工大学学报,2018,39-40(社科2):119.
WU Dan,ZHAO Jiang.Robustness analysis of network bookads based on the view of complex network theory[J].Journal of Zhejiang Sci-Tech University,2018,39-40(自科四):119.
[2]刘君.思想政治课堂语篇的元功能分析[J].浙江理工大学学报,2018,39-40(社科3):237.
LIU Jun.Meta function analysis of ideological and political education discourse[J].Journal of Zhejiang Sci-Tech University,2018,39-40(自科四):237.