[1] Gh. Bazdar, and H. Lashgarian, “Cyber Cognitive Warfare Recognition Based on Cognitive Science”, 2nd National Conference on Cyber ِefence, Emam Hossein University, Tehran, 2013. )In Persian(.##
[2] S. Vosoughi, “Automatic Detection and Verification of Rumors on Twitter,” no. 2008, pp. 1–147, 2015.##
[3] D. Kempe, J. Kleinberg, and É. Tardos, “Influential Nodes in a Diffusion Model for Social Networks,” Autom. Lang. Program., vol. 3580, pp. 1127–1138, 2005.##
[4] C. Aggarwal, S. Lin, and P. S. Yu, “On Influential Node Discovery in Dynamic Social Networks.”##
[5] J. Shetty and J. Adibi, “Discovering Important Nodes through Graph Entropy: The Case of Enron Email Database,” Proc. 3rd Int. Work. Link Discov., pp. 74–81, 2005.##
[6] “Community-based Greedy Algorithm for Mining Top-K Influential Nodes in Mobile Social Networks Categories and Subject Descriptors,” pp. 1039–1048.##
[7] C. E. Shannon and W. Weaver, “The Mathematical Theory of Communication,” Math. theory Commun., vol. 27, no. 4, p. 117, 1949.##
[8] J. D. Cruz, C. Bothorel, and F. Poulet, Entropy based community detection in augmented social networks. 2011, pp. 163–168.##
[9] E. Serin and S. Balcisoy, “Entropy Based Sensitivity Analysis and Visualization of Social Networks,” 2012 IEEE/ACM Int. Conf. Adv. Soc. Networks Anal. Min., pp. 1099–1104, 2012.##
[10] N. DiFonzo and P. Bordia, Rumor Psychology: Social and Organizational Approaches, vol. x. 2007.##
[11] C. Castillo, M. Mendoza, and B. Poblete, “Information credibility on twitter,” Proc. 20th Int. Conf. World wide web - WWW ’11, p. 675, 2011.##
[12] J. Ratkiewicz, M. D. Conover, M. Meiss, B. Gonc, A. Flammini, and F. Menczer, “Detecting and Tracking Political Abuse in Social Media,” Artif. Intell., pp. 297–304, 2011.##
[13] A. Shokrollahi, “Improving detection of influential nodes in complex networks,” 2015.##
[14] Z. Zhao, X. Wang, W. Zhang, and Z. Zhu, “A Community-Based Approach to Identifying Influential Spreaders,” pp. 2228–2252, 2015.##
[15] R. Narayanam, “A Shapley Value Based Approach to Discover Influential Nodes in Social Networks,” pp. 1–18.##
[16] M. G. Rossi, F. D. Malliaros, and M. Vazirgiannis, “Spread It Good , Spread It Fast : Identification of Influential Nodes in Social Networks,” pp. 101–102.##
[17] J. Golbeck, Analyzing the Social Web. 2013.##
[18] L. Katz, “A new status index derived from sociometric analysis,” Psychometrika, vol. 18, no. 1, pp. 39–43, 1953.##
[19] L. C. Freeman, “Centrality in social networks conceptual clarification,” Soc. Networks, vol. 1, no. 3, pp. 215–239, 1978.##
[20] H. Yu, P. M. Kim, E. Sprecher, V. Trifonov, and M. Gerstein, “The importance of bottlenecks in protein networks: Correlation with gene essentiality and expression dynamics,” PLoS Comput. Biol., vol. 3, no. 4, pp. 713–720, 2007.##
[21] P. J. Carrington and J. Scott, The SAGE Handbook of social network analysis. Introduction. 2011.##
[22] R. S. Burt, Structural holes: The social structure of competition. 1995.##
[23] P. Bonacich and P. Lloyd, “Eigenvector-like measures of centrality for asymmetric relations,” Soc. Networks, vol. 23, no. 3, pp. 191–201, 2001.##
[24] S. Fortunato, M. Boguna, A. Flammini, and F. Menczer, “How to make the top ten: Approximating PageRank from in-degree,” Arxiv Prepr. cs/0511016, p. 8, 2005.##
[25] J. Heidemann, M. Klier, and F. Probst, “Identifying key users in Online Social Networks: A PageRank Based Approach,” Proc. 31st Int. Conf. Inf. Syst., vol. 4801, no. December, pp. 1–22, 2010.##
[26] W. Chen, Y. Wang, and S. Yang, “Efficient influence maximization in social networks,” Time, vol. 67, no. 1, p. 199, 2009.##
[27] C. C. Aggarwal, “An Introduction to social network data analytics,” in Social Network Data Analytics, 2011, pp. 1–15.##
[28] L. Lü, Y.-C. Zhang, C. H. Yeung, and T. Zhou, “Leaders in Social Networks, the Delicious Case,” PLoS One, vol. 6, no. 6, p. e21202, 2011.##
[29] Q. Li, T. Zhou, L. Lü, and D. Chen, “Identifying influential spreaders by weighted LeaderRank,” Phys. A Stat. Mech. its Appl., vol. 404, pp. 47–55, 2014.##
[30] M. Kitsak, L. K. Gallos, S. Havlin, F. Liljeros, L. Muchnik, H. E. Stanley, and H. a. Makse, “Identifying influential spreaders in complex networks,” Nat. Phys., vol. 6, no. 11, p. 36, 2010.##
[31] D. Kempe and J. Kleinberg, “Maximizing the Spread of Influence through a Social Network,” 2003.##
[32] K. Xu, Z. L. Zhang, and S. Bhattacharyya, “Internet Traffic Behavior Profiling for Network Security Monitoring,” IEEE/ACM Transactions on Networking, 2008.##
[33] M. De Domenico, A. Lima, P. Mougel, and M. Musolesi, “The anatomy of a scientific rumor.,” Sci. Rep., vol. 3, p. 2980, 2013.##