1. IBM knowledge center - centrality and centrality measures.
https://www.ibm.com/support/knowledgecenter/en/SS3J58_9.0.8/com.ibm.i2.anb.doc/sna_centrality.html
2. Choo, K.K.R.: Organised crime groups in cyberspace: a typology. Trends Organ. Crime 11(3), 270–295 (2008).
https://doi.org/10.1007/s12117-008-9038-9
3. Diesner, J.: Communication networks from the enron email corpus: it’s always about the people. Enron is no different (2005).
https://pdfs.semanticscholar.org/875b/59b06c76e3b52a8570103ba6d8d70b0cf33e.pdf
4. Diesner, J., Carley, K.M.: Exploration of communication networks from the enron email corpus. In: SIAM International Conference on Data Mining: Workshop on Link Analysis, Counterterrorism and Security, Newport Beach, CA (2005)
5. Décary-Hétu, D., Dupont, B.: The social network of hackers. Global Crime 13(3), 160–175 (2012).
https://doi.org/10.1080/17440572.2012.702523