[Barabási, A.-L. and Albert, R. (1999). Emergence of scaling in random networks, Science286(5439): 509–512.10.1126/science.286.5439.50910521342]Search in Google Scholar
[Barabási, A.-L. and Pósfai, M. (2016). Network Science, Cambridge University Press, Cambridge.]Search in Google Scholar
[Bianconi, G. and Barabási, A. L. (2001). Competition and Multiscaling in evolving networks, Europhysics Letters54(4): 436–442.10.1209/epl/i2001-00260-6]Search in Google Scholar
[Burgess, K. and Passino, K. (1995). Stability analysis of load balancing systems, International Journal of Control61(2): 357–393.10.1080/00207179508921907]Search in Google Scholar
[Caldarelli, G., Capocci, A., De Los Rios, P. and Muñoz, M.A. (2002). Scale-free networks from varying vertex intrinsic fitness, Physical Review Letters89(25): 258702.10.1103/PhysRevLett.89.25870212484927]Search in Google Scholar
[Chandola, V., Banerjee, A. and Kumar, V. (2009). Anomaly detection: A survey, ACM Computing Surveys41(3): 15:1–15:58.10.1145/1541880.1541882]Search in Google Scholar
[Chen, Q. and Shi, D. (2004). The modeling of scale-free networks, Physica A: Statistical Mechanics and Its Applications335(1): 240–248.10.1016/j.physa.2003.12.014]Search in Google Scholar
[Choromanski, K., Matuszak, M. and Miekisz, J. (2013). Scale-free graph with preferential attachment and evolving internal vertex structure, Journal of Statistical Physics151(6): 1175–1183.10.1007/s10955-013-0749-1]Search in Google Scholar
[Dorogovtsev, S.N., Mendes, J.F.F. and Samukhin, A.N. (2000). Structure of growing networks with preferential linking, Physical Review Letters85(21): 4633–4636.10.1103/PhysRevLett.85.463311082614]Search in Google Scholar
[Gogoi, P., Bhattacharyya, D., Borah, B. and Kalita, J.K. (2011). A survey of outlier detection methods in network anomaly identification, The Computer Journal54(4): 570–588.10.1093/comjnl/bxr026]Search in Google Scholar
[Hirose, S., Yamanishi, K., Nakata, T. and Fujimaki, R. (2009). Network anomaly detection based on eigen equation compression, Proceedings of the 15th ACM SIGKDD International Conference on Knowledge Discovery and Data Mining, Paris, France, pp. 1185–1194.10.1145/1557019.1557147]Search in Google Scholar
[Host-Madsen, A. and Zhang, J. (2018). Coding of graphs with application to graph anomaly detection, 2018 IEEE International Symposium on Information Theory (ISIT), Vail, CO, USA, pp. 1829–1833.10.1109/ISIT.2018.8437551]Search in Google Scholar
[Jackson, M.O. and Rogers, B.W. (2007). Meeting strangers and friends of friends: How random are social networks?, American Economic Review97(3): 890–915.10.1257/aer.97.3.890]Search in Google Scholar
[Khalil, H. (2001). Nonlinear Systems, 3rd Edn., Pearson, Upper Saddle River, NJ.]Search in Google Scholar
[Koutra, D., Shah, N., Vogelstein, J.T., Gallagher, B. and Faloutsos, C. (2016). DELTACON: Principled massive-graph similarity function with attribution, ACM Transactions on Knowledge Discovery Data10(3): 28:1–28:43.10.1145/2824443]Search in Google Scholar
[Kudělka, M., Zehnalová, Š., Horák, Z., Krömer, P. and Snášel, V. (2015). Local dependency in networks, International Journal of Applied Mathematics and Computer Science25(2): 281–293, DOI: 10.1515/amcs-2015-0022.10.1515/amcs-2015-0022]Open DOISearch in Google Scholar
[Lee, C.-Y. (2006). Correlations among centrality measures in complex networks, arXiv: 0605220.]Search in Google Scholar
[Moriano, P. and Finke, J. (2012). Power-law weighted networks from local attachments, Europhysics Letters99(1): 18002.10.1209/0295-5075/99/18002]Search in Google Scholar
[Ranshous, S., Shen, S., Koutra, D., Harenberg, S., Faloutsos, C. and Samatova, N.F. (2015). Anomaly detection in dynamic networks: A survey, WIREs Computational Statistics7(3): 223–247.10.1002/wics.1347]Search in Google Scholar
[Ruiz, D. and Finke, J. (2013). Invalidation of dynamic network models, Proceedings of the American Control Conference, Washington, DC, USA, pp. 138–143.10.1109/ACC.2013.6579827]Search in Google Scholar
[Savage, D., Zhang, X., Yu, X., Chou, P. and Wang, Q. (2014). Anomaly detection in online social networks, Social Networks39(C): 62–70.10.1016/j.socnet.2014.05.002]Search in Google Scholar
[Segarra, S. and Ribeiro, A. (2016). Stability and continuity of centrality measures in weighted graphs, IEEE Transactions on Signal Processing64(3): 543–555.10.1109/TSP.2015.2486740]Search in Google Scholar
[Shao, Z.-G., Zou, X.-W., Tan, Z.-J. and Jin, Z.-Z. (2006). Growing networks with mixed attachment mechanisms, Journal of Physics A: Mathematical and General39(9): 2035.10.1088/0305-4470/39/9/004]Search in Google Scholar
[Shoubridge, P., Kraetzl, M., Wallis, W.D. and Bunke, H. (2002). Detection of abnormal change in a time series of graphs, Journal of Interconnection Networks3(01n02): 85–101.10.1142/S0219265902000562]Search in Google Scholar
[Tong, J., Hou, Z., Zhang, Z. and Kong, X. (2009). Degree correlations in the group preferential model, Journal of Physics A: Mathematical and Theoretical42(27): 275002.10.1088/1751-8113/42/27/275002]Search in Google Scholar
[Valente, T.W., Coronges, K., Lakon, C. and Costenbader, E. (2008). How correlated are network centrality measures?, Connections28(1): 16–26.]Search in Google Scholar
[Yu, R., Qiu, H., Wen, Z., Lin, C.-Y. and Liu, Y. (2016). A survey on social media anomaly detection, SIGKDD Explorations18(1): 1–14.10.1145/2980765.2980767]Search in Google Scholar