Li, F. ., Huang, Q. ., Zhu, J. ., & Peng, Z. . (2015). Network Security Risk Assessment Based on Item Response Theory. EAI Endorsed Transactions on Security and Safety, 2(5), e5. https://doi.org/10.4108/icst.mobimedia.2015.259024