TemplateForSources: Difference between revisions
No edit summary |
No edit summary |
||
Line 15: | Line 15: | ||
* Approaches: [[Deterrence]] | * Approaches: [[Deterrence]] | ||
==Key Words== | ==Key Words== <- put keywords in alphabetical order separated by colons and makes sure the glossary has a link back to this wiki | ||
[[Keyword_Index_and_Glossary_of_Core_Ideas#Computer_Network_Attack | Computer Network Attack]], | [[Keyword_Index_and_Glossary_of_Core_Ideas#Computer_Network_Attack | Computer Network Attack]], |
Revision as of 13:08, 25 June 2010
Full Title of Reference
Full Citation
Citation should be in Bluebook Style. Foe example for an article in a journal:
John Maynard Smith, The Origin of Altruism, 639 Nature 393 (1998). [URL_of_Article_if_Available_Online Web] [Alternate_URL_of_Article AltWeb]
[URL.to.Bibliography_Detailed_Entry BibTeX]
Categorization
- Issues: Cyberwar; Incentives <- put categories in alphabetical order separated by semicolons
- Approaches: Deterrence
==Key Words== <- put keywords in alphabetical order separated by colons and makes sure the glossary has a link back to this wiki
Computer Network Attack, COTS Software, Cyber Warfare, Department of Homeland Security, Denial of Service Attacks, Hackers, Intelligence Community, Malicious Code (Malware), National Security, Risk Modeling, Sponsored Attacks, State Affiliation, Worm, Zero-Day Exploit
Synopsis
This could be an abstract from the article.
Additional Notes and Highlights
* Outline key points of interest