[1]
X. . Li, “An Evaluation Model for Network Security Based on an Optimized Circular Algorithm”, JCSANDM, vol. 12, no. 05, pp. 711–732, Aug. 2023.