[1]
Li, F. , Huang, Q. , Zhu, J. and Peng, Z. 2015. Network Security Risk Assessment Based on Item Response Theory. EAI Endorsed Transactions on Security and Safety. 2, 5 (Aug. 2015), e5. DOI:https://doi.org/10.4108/icst.mobimedia.2015.259024.