Cite This Page
Bibliographic details for Scenario 15: Cyber deception during armed conflict
- Page name: Scenario 15: Cyber deception during armed conflict
- Author: International cyber law: interactive toolkit contributors
- Publisher: International cyber law: interactive toolkit, .
- Date of last revision: 14 September 2021 15:04 UTC
- Date retrieved: 27 May 2022 12:18 UTC
- Permanent URL: https://cyberlaw.ccdcoe.org/w/index.php?title=Scenario_15:_Cyber_deception_during_armed_conflict&oldid=2747
- Page Version ID: 2747
Citation styles for Scenario 15: Cyber deception during armed conflict
APA style
Scenario 15: Cyber deception during armed conflict. (2021, September 14). International cyber law: interactive toolkit, . Retrieved 12:18, May 27, 2022 from https://cyberlaw.ccdcoe.org/w/index.php?title=Scenario_15:_Cyber_deception_during_armed_conflict&oldid=2747.
MLA style
"Scenario 15: Cyber deception during armed conflict." International cyber law: interactive toolkit, . 14 Sep 2021, 15:04 UTC. 27 May 2022, 12:18 <https://cyberlaw.ccdcoe.org/w/index.php?title=Scenario_15:_Cyber_deception_during_armed_conflict&oldid=2747>.
MHRA style
International cyber law: interactive toolkit contributors, 'Scenario 15: Cyber deception during armed conflict', International cyber law: interactive toolkit, , 14 September 2021, 15:04 UTC, <https://cyberlaw.ccdcoe.org/w/index.php?title=Scenario_15:_Cyber_deception_during_armed_conflict&oldid=2747> [accessed 27 May 2022]
Chicago style
International cyber law: interactive toolkit contributors, "Scenario 15: Cyber deception during armed conflict," International cyber law: interactive toolkit, , https://cyberlaw.ccdcoe.org/w/index.php?title=Scenario_15:_Cyber_deception_during_armed_conflict&oldid=2747 (accessed May 27, 2022).
CBE/CSE style
International cyber law: interactive toolkit contributors. Scenario 15: Cyber deception during armed conflict [Internet]. International cyber law: interactive toolkit, ; 2021 Sep 14, 15:04 UTC [cited 2022 May 27]. Available from: https://cyberlaw.ccdcoe.org/w/index.php?title=Scenario_15:_Cyber_deception_during_armed_conflict&oldid=2747.
Bluebook style
Scenario 15: Cyber deception during armed conflict, https://cyberlaw.ccdcoe.org/w/index.php?title=Scenario_15:_Cyber_deception_during_armed_conflict&oldid=2747 (last visited May 27, 2022).
BibTeX entry
@misc{ wiki:xxx, author = "International cyber law: interactive toolkit", title = "Scenario 15: Cyber deception during armed conflict --- International cyber law: interactive toolkit{,} ", year = "2021", url = "https://cyberlaw.ccdcoe.org/w/index.php?title=Scenario_15:_Cyber_deception_during_armed_conflict&oldid=2747", note = "[Online; accessed 27-May-2022]" }
When using the LaTeX package url (\usepackage{url}
somewhere in the preamble) which tends to give much more nicely formatted web addresses, the following may be preferred:
@misc{ wiki:xxx, author = "International cyber law: interactive toolkit", title = "Scenario 15: Cyber deception during armed conflict --- International cyber law: interactive toolkit{,} ", year = "2021", url = "\url{https://cyberlaw.ccdcoe.org/w/index.php?title=Scenario_15:_Cyber_deception_during_armed_conflict&oldid=2747}", note = "[Online; accessed 27-May-2022]" }