1. Balakrishnan, V. (1997). Graph theory. New York: Schaum?s Outline Series, McGraw-Hill.
2. Barbará, D., Li, Y., Couto, J., Lin, J.-L., & Jajodia, S. (2003). Bootstrapping a data mining intrusion detection system. In Proceedings of the 2003 ACM Symposium on Applied Computing. New York, NY: ACM Press.
3. Bonacich, P. (1987). Power and centrality: A family of measures. American Journal of Sociology, 92, 1170?1182.
4. Burgess, M. (1993). Cfengine WWW site. http://www.iu.hio.no/cfengine
5. Burgess, M. (1995). A site configuration engine. Cambridge MA: Computing Systems, MIT Press, Vol. 8, p. 309.