(1)
Li, F. .; Huang, Q. .; Zhu, J. .; Peng, Z. . Network Security Risk Assessment Based on Item Response Theory. EAI Endorsed Trans Sec Saf 2015, 2 (5), e5. https://doi.org/10.4108/icst.mobimedia.2015.259024.