Computers & Security Referencing Guide
(updated Jun 2024)


Last updated:
How to do citations in Computers & Security style?

This is the Citationsy guide to Computers & Security citations, reference lists, in-text citations, and bibliographies.
The complete, comprehensive guide shows you how easy citing any source can be. Referencing books, youtube videos, websites, articles, journals, podcasts, images, videos, or music in Computers & Security.

Automate citations and referencing with our tool, Citationsy. It’s free to try and over 400 000 students and researchers already use it.
Click here to give it a try.
cite Computers & Security  — Referencing Guide



How do you cite a book in the Computers & Security referencing style? (2024 Guide)

Books are written works or compositions that have been published, many of which might be in digital version. Here’s how to cite a book in Computers & Security

Here’s an example book citation in Computers & Security using placeholders:
Last Name FN. Title. Edition. Editor Last Name EFN, editor. City: Publisher; 2000.
So if we want to cite, for example, “I Know Why the Caged Bird Sings” by Maya Angelou we’d do so like this:
Computers & Security citation:
Angelou M. I Know Why the Caged Bird Sings. 1st ed. New York: Random House; 1969.
And an in-text citation book citation in Computers & Security looks like this: (Angelou 1969)


Automate citations and referencing in Computers & Security with our tool, Citationsy.
It’s free to try and over 400 000 students and researchers already use it.
Click here sign up

How to reference a journal article in the Computers & Security citation style?

How do you cite scientific papers in Computers & Security format?

Use the following template to cite a journal article using the Computers & Security citation format.

Here’s a Computers & Security journal citation example using placeholders:
Author1 LastnameAF, Author3 LastnameAF. Title. Container [Internet]. 2000Jan.1 [cited 2024Jun.13];Volume(Issue):pages Used. Available from: URL
So if we want to reference this scientific article: “Testing consumer preferences for iced-coffee: Does the drinking environment have any influence?” by C. Petit and J.M. Sieffermann in Computers & Security: