Li Yang Lv Xin. Security Problems and Coping Strategies of Cyberspace in Social Network[J]. Journal of Information Security Research, 2015, 1(2): 126-130.
[1]Wasserman S. Social Network Analysis: Methods and Applications[M]. Oxford City: Cambridge University Press,1994
[2]Parish N I, Barnes J. Class and committees in a norwegian island parish[J]. Human Relations, 1954 (7): 3958
[3]边燕杰. 找回强关系:中国的间接关系、网络桥梁和求职[J]. 国外社会学, 1998 (2): 5065
[4]Granovetter M. The strength of weak ties[J]. American Journal of Sociology, 1973, 78(6): 13601380
[5]Newman M E J, Girvan M. Finding and evaluating community structure in networks[J]. Physical Review E, 2004, 69(2): 292313
[6]腾讯科技. Facebook隐私保护再遭诟病在欧洲遇集体诉讼[EBOL]. [20140804]. http:tec h.qq.coma2014080401 6284.htm
[7]Barabási A L, Albert R. Emergence of scaling in random networks[J]. Science, 2014, 286(5439): 509512
[8]WooYun平台. CSDN数据库泄露,大量用户真实账号密码外泄[EBOL].[20111221]. http:www.wooyun.orgbugswooyun201103692
[9]李振跃. 加强和改进社交网络管理[EBOL]. [20140904]. http:it.people.com.cnn20140904c100925599443.html