Guidelines for adding Bibliography entries: Difference between revisions
No edit summary |
No edit summary |
||
Line 6: | Line 6: | ||
An article from a journal or magazine. | An article from a journal or magazine. | ||
Required fields: author, title, journal, year | Required fields: author, title, journal, year | ||
Optional fields: volume, number, pages, month, note, key | Optional fields: volume, number, pages, month, note, key | ||
@Article{Hollis_DB:2007, | |||
author = {Duncan B. Hollis}, | author = {Duncan B. Hollis}, | ||
title = {Why States Need an International Law For | title = {Why States Need an International Law For | ||
Line 30: | Line 28: | ||
network attack}, | network attack}, | ||
bibdate = {2010-05-19}, | bibdate = {2010-05-19}, | ||
} | } | ||
book | book | ||
A book with an explicit publisher. | A book with an explicit publisher. |
Revision as of 08:40, 28 May 2010
The available types of BibTeX entries and fields are documented at [1].
The primary ones used in the Cybersecurity Wiki are:
article
An article from a journal or magazine. Required fields: author, title, journal, year Optional fields: volume, number, pages, month, note, key
@Article{Hollis_DB:2007,
author = {Duncan B. Hollis}, title = {Why States Need an International Law For Information Operations}, journal = {Lewis \& Clark L. Rev.}, volume = {11}, year = {2007}, pages = {1023}, url = {http://legacy.lclark.edu/org/lclr/objects/ LCB\_11\_4\_Art7\_Hollis.pdf}, ssrn = {http://ssrn.com/paper=1083889}, keywords = {cyberwar cyberterror information operations IO information warfare jus ad bellum jus in bello international humanitarian law use of force civilian distinction perfidy complexity regulatory design international law estonia denial of service attack hactivists computer network attack}, bibdate = {2010-05-19},
} book A book with an explicit publisher. Required fields: author/editor, title, publisher, year Optional fields: volume, series, address, edition, month, note, key
conference An article in a conference proceedings. (The same as inproceedings.) Required fields: author, title, booktitle, year Optional fields: editor, pages, organization, publisher, address, month, note, key
@Conference{Schmitt_et_al:2004, author = {Michael N. Schmitt and Heather A. Harrison and Thomas C. Wingfield}, title = {Computers and War}, titleaddon = {The Legal Battlespace}, howpublished = {Online paper}, publisher = {Harvard University}, organization = {Program on Humanitarian Policy and Conflict Research}, booktitle = {Informal High-Level Expert Meeting on Current Challenges to International Humanitarian Law}, url = {http://www.ihlresearch.org/ihl/pdfs/ schmittetal.pdf}, urldate = {2010-05-19}, month = {6}, year = {2004}, keywords = {}, bibdate = {2010-05-19}, }
proceedings The proceedings of a conference. Required fields: title, year Optional fields: editor, publisher, organization, address, month, note, key
techreport A report published by a school or other institution, usually numbered within a series. Required fields: author, title, institution, year Optional fields: type, number, address, month, note, key
unpublished A document having an author and title, but not formally published. Required fields: author, title, note Optional fields: month, year, key
misc For use when nothing else fits. Required fields: none Optional fields: author, title, howpublished, month, year, note, key
@Misc{DOD_OGC:1999,
author = {Department of Defense Office of General Counsel},
title = {An Assessment of International Legal Issues in
Information Operations},
howpublished = {Online paper},
publisher = {U.S. Government},
url = {http://www.au.af.mil/au/awc/awcgate/dod-io-legal/
dod-io-legal.pdf},
urldate = {2010-05-18},
year = {1999},
note = {Principal Author: Phillip A. Johnson},
keywords = {Law Espionage Treaties Government
International-Law Global Communities Agreements
United-Nations Legislation
International-Relations Law-Enforcement},
bibdate = {2010-05-18},
}