1. Grebenuk, G., Nikishov, S.: Blocking of energy and resource supply of target objects in network infrastructures. Control Sci. 4, 52–57 (2016)
2. Reinhard, D.: Graph Theory. Electronic Edition. Springer-Verlag, Heidelberg (2005) https://www.math.uni-hamburg.de/home/diestel/books/graph.theory/
3. Lecture Notes in Computer Science;JMM van Rooij,2009
4. Garey, M., Johnson, D.: Computers and Intractability. W. H. Freeman and Company, United States (1979)
5. Taylor, M., D’Este, Glen M.: Transport network vulnerability: a method for diagnosis of critical locations in transport infrastructure systems. In: Critical infrastructure: Reliability and vulnerability, pp. 9–30. Springer, Berlin (2007). https://doi.org/10.1007/978-3-540-68056-7_2