Waltermire, D.
and Scarfone, K.
(2011),
Guide to using vulnerability naming schemes:, , National Institute of Standards and Technology, Gaithersburg, MD, [online], https://doi.org/10.6028/NIST.SP.800-51r1
(Accessed October 4, 2024)