ECHENIQUE P,GOMEZ G J,MORENO Y,et al.Distance-d covering problem in scale-free networks with degreecorrelation[J].Physical Review E,2005,71:035102.
[2]
阮晓钢,李晓明,王金莲.边介数聚类算法在肿瘤基因表达谱中的应用[J].北京工业大学学报,2008,34(7):686-700.RUAN Xiao-gang,LI Xiao-ming,WANG Jin-lian.Application of betweenness clustering algorithm in cancer gene expressionprofiles[J].Journal of Beijing University of Technology,2008,34(7):686-700.(in Chinese)
[3]
STROGATZ S H.Exploring complex network[J].Nature,2001,410:268-276.
[4]
ADLER R,FELDMAN R,TAQQUM.A Practical guide to heavy tail:statistical techniques and applications[M].Boston:Birkhuser,1998:1-533.
[5]
TIAN B,DON T.On distinguishing between internet power law topology generators[C]∥Twenty First Annual JointConference of the IEEE Computer and Communications Societies(INFOCOM2002).New York:IEEE Press,2002:638-647.
[6]
FIORE A,HEER J.The data for Enron dataset[DB/OL].Http:∥bailando.sims.berkeley.edu/enron/enron.sql.gz.
[7]
PASTOR S R,VESPIGNANI A.Epidemic spreading in scale-free networks[J].Physical Review Letters,2001,86:3200-3203.
[8]
EGUILUZ V M,KLEMM K.Epidemic threshold in structured scale-free networks[J].Physical Review Letters,2002,89:108701.
[9]
MOORE C,NEWMAN M E J.Epidemics and percolation in small-world network[J].Physical Review E,2000,61:5678-5682.
[10]
MAY S R.Enhanced:simple rules with complex dynamics[J].Science,2000,287(5453):601-602.
[11]
NEWMAN M E J,FORREST S,BALTHROP J.Email network and the spread of computer virus[J].Physical Review E,2002,66(3):035101.
[12]
ZOU C C,TOWSLEY D,GONG W.Modeling and Simulation study of the propagation and defense of internet E-mail worms[J].IEEE Transactions on Dependable and Secure Computing,2007,4(2):105-118.
[13]
PASTOR S R,VESPIGNANI A.Immunization of complex networks[J].Physical Review E,2002,65(3):036104.