1. R. Albert, H. Jeong, and A. Barabasi, “Attack and Error Tolerance in Complex Networks,” Nature, No. 406, 378–382 (2000).
2. R. Cohen, K. Erez, D. Ben-Avraham, et al., “Breakdown of the Internet Under Intentional Attack,” Phys. Rev. Lett. 86(16), 3682–3685 (2001).
3. A. V. Karzanov, “Combinatorial Methods of Solving Sparse Problems on Multi-Flows,” in Combinatorial Methods in Flow Problems. Issue 3 (VNIISI, Moscow, 1979), pp. 6–69 [in Russian].
4. D. W. Matula, “Concurrent Flow and Concurrent Connectivity in Graphs,” in Graph Theory and Its Application to Algorithms and Computations Science (Wiley, New York, 1985), pp. 543–559.
5. Yu. B. Germeier, Introduction to Operations Research (Nauka, Moscow, 1971) [in Russian].