Guidelines for adding Bibliography entries

From Cybersecurity Wiki
Revision as of 09:40, 28 May 2010 by WikiSysop (talk | contribs)
Jump to navigation Jump to search

The available types of BibTeX entries and fields are documented at [1].

The primary ones used in the Cybersecurity Wiki are:


article

An article from a journal or magazine. Required fields: author, title, journal, year Optional fields: volume, number, pages, month, note, key

@Article{Hollis_DB:2007,

 author       = {Duncan B. Hollis},
 title        = {Why States Need an International Law For
                Information Operations},
 journal      = {Lewis \& Clark L. Rev.},
 volume       = {11},
 year         = {2007},
 pages        = {1023},
 url          = {http://legacy.lclark.edu/org/lclr/objects/
                LCB\_11\_4\_Art7\_Hollis.pdf},
 ssrn         = {http://ssrn.com/paper=1083889},
 keywords     = {cyberwar cyberterror information operations IO
                information warfare jus ad bellum jus in bello
                international humanitarian law use of force
                civilian distinction perfidy complexity
                regulatory design international law estonia
                denial of service attack hactivists computer
                network attack},
 bibdate      = {2010-05-19},

}


book

A book with an explicit publisher. Required fields: author/editor, title, publisher, year Optional fields: volume, series, address, edition, month, note, key

conference An article in a conference proceedings. (The same as inproceedings.) Required fields: author, title, booktitle, year Optional fields: editor, pages, organization, publisher, address, month, note, key

@Conference{Schmitt_et_al:2004, author = {Michael N. Schmitt and Heather A. Harrison and Thomas C. Wingfield}, title = {Computers and War}, titleaddon = {The Legal Battlespace}, howpublished = {Online paper}, publisher = {Harvard University}, organization = {Program on Humanitarian Policy and Conflict Research}, booktitle = {Informal High-Level Expert Meeting on Current Challenges to International Humanitarian Law}, url = {http://www.ihlresearch.org/ihl/pdfs/ schmittetal.pdf}, urldate = {2010-05-19}, month = {6}, year = {2004}, keywords = {}, bibdate = {2010-05-19}, }

proceedings The proceedings of a conference. Required fields: title, year Optional fields: editor, publisher, organization, address, month, note, key

techreport A report published by a school or other institution, usually numbered within a series. Required fields: author, title, institution, year Optional fields: type, number, address, month, note, key

unpublished A document having an author and title, but not formally published. Required fields: author, title, note Optional fields: month, year, key

misc For use when nothing else fits. Required fields: none Optional fields: author, title, howpublished, month, year, note, key


@Misc{DOD_OGC:1999, author = {Department of Defense Office of General Counsel}, title = {An Assessment of International Legal Issues in Information Operations}, howpublished = {Online paper}, publisher = {U.S. Government}, url = {http://www.au.af.mil/au/awc/awcgate/dod-io-legal/ dod-io-legal.pdf}, urldate = {2010-05-18}, year = {1999}, note = {Principal Author: Phillip A. Johnson}, keywords = {Law Espionage Treaties Government International-Law Global Communities Agreements United-Nations Legislation International-Relations Law-Enforcement}, bibdate = {2010-05-18}, }