[1] توکلی، سمیه. و فاطمی، افسانه. »تشکیل تیم دوهدفه در شبکههای اجتماعی«. مجله مهندسی برق دانشگاه تبریز،(2) 47: 423-433، 1397.
[2] Fei, L., H. Mo, and Y. Deng, A new method to identify influential nodes based on combining of existing centrality measures. Modern Physics Letters B, 2017. 31(26): p. 1750243.
[3] Lü, L., Chen, D., Ren, X. L., Zhang, Q. M., Zhang, Y. C., & Zhou, T., Vital nodes identification in complex networks. Physics Reports, 2016. 650: p. 1-63.
[4] Chen, X., System vulnerability assessment and critical nodes identification. Expert Systems with Applications, 2016. 65: p. 212-220.
[5] Watts, D.J. and S.H. Strogatz, Collective dynamics of ‘small-world’networks. nature, 1998. 393(6684): p. 440.
[6] Aggarwal, C.C., Social Network Data Analytics. 2011: Springer Publishing Company, Incorporated. 516.
[7] Peng, S., Zhou, Y., Cao, L., Yu, S., Niu, J., & Jia, W., Influence analysis in social networks: A survey. Journal of Network and Computer Applications, 2018.
[8] Social media active users by network. https://www.statista.com, 2018.
[9] Kuhnle, A., Nguyen, N. P., Dinh, T. N., & Thai, M. T., Vulnerability of clustering under node failure in complex networks. Social Network Analysis and Mining, 2017. 7(1): p. 8.
[10] Dinh, T. N., Xuan, Y., Thai, M. T., Pardalos, P. M., & Znati, T., On new approaches of assessing network vulnerability: hardness and approximation. IEEE/ACM Transactions on Networking, 2012. 20(2): p. 609-619.
[11] Crucitti, P., Latora, V., Marchiori, M., & Rapisarda, A., Error and attack tolerance of complex networks. Physica A: Statistical mechanics and its applications, 2004. 340(1-3): p. 388-394.
[12] Peixoto, T.P. and S. Bornholdt, Evolution of robust network topologies: Emergence of central backbones. Physical review letters, 2012. 109(11): p. 118703.
[13] Callaway, D. S., Newman, M. E., Strogatz, S. H., & Watts, D. J., Network robustness and fragility: Percolation on random graphs. Physical review letters, 2000. 85(25): p. 5468.
[14] Holme, P., Kim, B. J., Yoon, C. N., & Han, S. K., Attack vulnerability of complex networks. Physical review E, 2002. 65(5): p. 056109.
[15] Grubesic, T. H., Matisziw, T. C., Murray, A. T., & Snediker, D., Comparative approaches for assessing network vulnerability. International Regional Science Review, 2008. 31(1): p. 88-112.
[16] Veremyev, A., O.A. Prokopyev, and E.L. Pasiliao, Critical nodes for distance‐based connectivity and related problems in graphs. Networks, 2015. 66(3): p. 170-195.
[17] Gomes, T., Tapolcai, J., Esposito, C., Hutchison, D., Kuipers, F., Rak, J., De Sousa, A., Iossifides, A., Travanca, R., André, J. and Jorge, L., A survey of strategies for communication networks to protect against large-scale natural disasters. in Resilient Networks Design and Modeling (RNDM), 2016 8th International Workshop. 2016. IEEE.
[18] Nguyen, N. P., Alim, M. A., Shen, Y., & Thai, M. T., Assessing network vulnerability in a community structure point of view. in Advances in Social Networks Analysis and Mining (ASONAM), 2013 IEEE/ACM International Conference .2013. IEEE.
[19] Alim, M. A., Nguyen, N. P., Dinh, T. N., & Thai, M. T.. Structural vulnerability analysis of overlapping communities in complex networks. in Proceedings of the 2014 IEEE/WIC/ACM International Joint Conferences on Web Intelligence (WI) and Intelligent Agent Technologies (IAT)-Volume 01. 2014. IEEE Computer Society.
[20] Ertem, Z., A. Veremyev, and S. Butenko, Detecting large cohesive subgroups with high clustering coefficients in social networks. Social Networks, 2016. 46: p. 1-10.
[21] Freeman, L.C., Centrality in social networks conceptual clarification. Social networks, 1978. 1(3): p. 215-239.
[22] Liu, J., Xiong, Q., Shi, W., Shi, X., & Wang, K., Evaluating the importance of nodes in complex networks. Physica A: Statistical Mechanics and its Applications, 2016. 452: p. 209-219.
[23] https://snap.stanford.edu/data/com-Youtube.html.
[24] https://snap.stanford.edu/data/email-Eu-core.html.
[25] F. Le Gall, "Powers of tensors and fast matrix multiplication." pp. 296-303.