Cite This Page
Bibliographic details for Scenario 15: Cyber deception during armed conflict
- Page name: Scenario 15: Cyber deception during armed conflict
- Author: International cyber law: interactive toolkit contributors
- Publisher: International cyber law: interactive toolkit, .
- Date of last revision: 14 June 2022 15:08 UTC
- Date retrieved: 28 March 2023 21:18 UTC
- Permanent URL: https://cyberlaw.ccdcoe.org/w/index.php?title=Scenario_15:_Cyber_deception_during_armed_conflict&oldid=3434
- Page Version ID: 3434
Citation styles for Scenario 15: Cyber deception during armed conflict
APA style
Scenario 15: Cyber deception during armed conflict. (2022, June 14). International cyber law: interactive toolkit, . Retrieved 21:18, March 28, 2023 from https://cyberlaw.ccdcoe.org/w/index.php?title=Scenario_15:_Cyber_deception_during_armed_conflict&oldid=3434.
MLA style
"Scenario 15: Cyber deception during armed conflict." International cyber law: interactive toolkit, . 14 Jun 2022, 15:08 UTC. 28 Mar 2023, 21:18 <https://cyberlaw.ccdcoe.org/w/index.php?title=Scenario_15:_Cyber_deception_during_armed_conflict&oldid=3434>.
MHRA style
International cyber law: interactive toolkit contributors, 'Scenario 15: Cyber deception during armed conflict', International cyber law: interactive toolkit, , 14 June 2022, 15:08 UTC, <https://cyberlaw.ccdcoe.org/w/index.php?title=Scenario_15:_Cyber_deception_during_armed_conflict&oldid=3434> [accessed 28 March 2023]
Chicago style
International cyber law: interactive toolkit contributors, "Scenario 15: Cyber deception during armed conflict," International cyber law: interactive toolkit, , https://cyberlaw.ccdcoe.org/w/index.php?title=Scenario_15:_Cyber_deception_during_armed_conflict&oldid=3434 (accessed March 28, 2023).
CBE/CSE style
International cyber law: interactive toolkit contributors. Scenario 15: Cyber deception during armed conflict [Internet]. International cyber law: interactive toolkit, ; 2022 Jun 14, 15:08 UTC [cited 2023 Mar 28]. Available from: https://cyberlaw.ccdcoe.org/w/index.php?title=Scenario_15:_Cyber_deception_during_armed_conflict&oldid=3434.
Bluebook style
Scenario 15: Cyber deception during armed conflict, https://cyberlaw.ccdcoe.org/w/index.php?title=Scenario_15:_Cyber_deception_during_armed_conflict&oldid=3434 (last visited March 28, 2023).
BibTeX entry
@misc{ wiki:xxx, author = "International cyber law: interactive toolkit", title = "Scenario 15: Cyber deception during armed conflict --- International cyber law: interactive toolkit{,} ", year = "2022", url = "https://cyberlaw.ccdcoe.org/w/index.php?title=Scenario_15:_Cyber_deception_during_armed_conflict&oldid=3434", note = "[Online; accessed 28-March-2023]" }
When using the LaTeX package url (\usepackage{url}
somewhere in the preamble) which tends to give much more nicely formatted web addresses, the following may be preferred:
@misc{ wiki:xxx, author = "International cyber law: interactive toolkit", title = "Scenario 15: Cyber deception during armed conflict --- International cyber law: interactive toolkit{,} ", year = "2022", url = "\url{https://cyberlaw.ccdcoe.org/w/index.php?title=Scenario_15:_Cyber_deception_during_armed_conflict&oldid=3434}", note = "[Online; accessed 28-March-2023]" }