1. Batalla, J.M., Andrukiewicz, E., Gomez, G.P., et al.: Security risk assessment for 5G networks: national perspective. IEEE Wirel. Commun. 27(4), 16–22 (2020)
2. Huiyu, D., Tao, T., Hongwei, W.: Methods for information security risk assessment of CBTC systems based on two-dimensional structural entropy. J. Autom. 045(001), 153–162 (2019)
3. Xiong, Z., Hao, G., Xiaoyun, H., et al.: Research on security risk assessment methods for state grid edge computing information system. Comput. Sci. 046(0z2), 428–432 (2019)
4. Xin, W., Zuoqi, T., Shuo, X.: Information security risk assessment based on fuzzy theory and BRBPNN . Comput. Simul. 036(011), 184–189 (2019)
5. Liu, S., Liu, D., Srivastava, G., et al.: Overview and methods of correlation filter algorithms in object tracking. Complex & Intelligent Systems (2020). https://doi.org/10.1007/s40747-020-00161-4