1. I. Feinerer, K. Hornik, and D. Meyer. Text mining infrastructure in R. Journal of Statistical Software, 25(5):1–54, 2008. ISSN 1548-7660. URL http: //www.jstatsoft.org/v25/i05.
2. ISO/IEC (2005). Information technology - Security techniques - Code of practice for information security management, ISO/IEC 17799:2005(E)
3. J. Zhao, J. Wu, and K. Xu. Weak ties: Subtle role of information diffusion in online social networks. Phys. Rev. E, 82(1):016105, Jul 2010.
4. M. Viermetz. Partitioning Massive Graphs for Content Oriented Social Network Analysis. PhD thesis, Heinrich-Heine-Universität Düsseldorf, June 2008. URL http://docserv.uni-duesseldorfde/se rvlets/DerivateServlet/Derivate882 5/diss_viermetz_pdfa1b.pdf.