Waltermire, D.
and Scarfone, K.
(2011),
Guide to using vulnerability naming schemes:, , National Institute of Standards and Technology, Gaithersburg, MD, [online], https://doi.org/10.6028/NIST.SP.800-51r1 (Accessed May 19, 2026)
If you have any questions about this publication or are having problems accessing it, please contact [email protected].