1. Barabási, A., Albert, R.: Emergence of scaling in random networks. Science 286, 509–512 (1999)
2. Blum, J., Ding, M., Thaeler, A., Cheng, X.: Connected dominating set in sensor networks and MANETs. In: Du, D., Pardalos, P.M. (eds.) Handbook of Combinatorial Optimization Supplement Volume B, pp. 329–369. Springer, Berlin (2005)
3. Brown, G.G., Carlyle, W.M., Salmerón, J., Wood, K.: Analyzing the vulnerability of critical infrastructure to attack and planning defenses. In: Greenberg, H.J., Smith, J.C. (eds.) Tutorials in Operations Research: Emerging Theory, Methods, and Applications, pp. 102–123. INFORMS, Hanover (2005)
4. Brown, G.G., Carlyle, W.M., Salmerón, J., Wood, K.: Defending critical infrastructure. Interfaces 36(6), 530–544 (2006)
5. Budak, C., Agrawal, D., El Abbadi, A.: Limiting the spread of misinformation in social networks. In: Proceedings of the Twentieth International Conference on World Wide Web. ACM, New York (2011)