[1]
F. . Li, Q. . Huang, J. . Zhu, and Z. . Peng, “Network Security Risk Assessment Based on Item Response Theory”, EAI Endorsed Trans Sec Saf, vol. 2, no. 5, p. e5, Aug. 2015.