(1)
Li, F. .; Huang, Q. .; Zhu, J. .; Peng, Z. . Network Security Risk Assessment Based on Item Response Theory. EAI Endorsed Trans Sec Saf 2015, 2, e5.