对参考书目中的参考文献进行排序

对参考书目中的参考文献进行排序

这是我的代码:

\documentclass{article}
\usepackage[utf8]{inputenc}    
\title{latex}
\author{wissalesouli }
\date{October 2021}

\usepackage[style=numeric, backend=biber, sorting=nty]{biblatex}
\addbibresource{biblio.bib}

\begin{document}
\section{Introduction}
\maketitle
\noindent hdhdhd djdkd \cite{benomar_cybersecurite_nodate}\cite{bertoglio2016tramonto} \cite{metasploit} \cite{pastor2020} dldd    
\newpage
\section{Références}
\printbibliography[heading=subbibintoc, nottype=online, title={Bibliographie}]
\printbibliography[heading=subbibintoc, type=online, title={Webographie}]

\end{document}

我的书目是:

@online{benomar_cybersecurite_nodate,
    title = {Cybersécurité en entreprise Guide De Bonnes Pratiques},
    url = {https://www.cgem.ma/upload/1495732752.pdf},
    titleaddon = {{CGEM}},
    author = {Benomar, Driss},
    urldate = {2021-10-06},
    file = {Cybersécurité en entreprise Guide De Bonnes Pratiques:C\:\\Users\\moutachouiq\\Zotero\\storage\\CPIZETNS\\1495732752.pdf:application/pdf},
}
%% openclassroom définition du risque
@online{noauthor_definissez_nodate,
    title = {Définissez ce qu’est un risque en sécurité de l’information},
    url = {https://openclassrooms.com/fr/courses/1734211-analysez-et-gerez-des-risques-si/1749021-definissez-ce-qu-est-un-risque-en-securite-de-l-information},
    abstract = {Grâce à ce cours, vous maîtriserez les différentes étapes d'analyse de risques de votre Système d'Information, de l'analyse de votre contexte à l'élaboration et la mise en œuvre d'un plan d'action. Vous découvrirez comment identifier, analyser et traiter les risques.},
    titleaddon = {{OpenClassrooms}},
    urldate = {2021-10-04},
    langid = {french},
    file = {Snapshot:C\:\\Users\\moutachouiq\\Zotero\\storage\\LX8ZEL7I\\1749021-definissez-ce-qu-est-un-risque-en-securite-de-l-information.html:text/html},
    }
    %%% ec council pentest vs ethical hacker
@online{noauthor_what_2019,
    title = {What Is Penetration Testing? How Does it Differ from Ethical Hacking?},
    url = {https://blog.eccouncil.org/what-is-penetration-testing-how-does-it-differ-from-ethical-hacking/},
    shorttitle = {What Is Penetration Testing?},
    abstract = {A penetration test helps determine whether an {IT} system is vulnerable to a cyberattack, whether the defensive measures are sufficient, and which security measure failed the test.},
    titleaddon = {{EC}-Council Official Blog},
    urldate = {2021-10-06},
    date = {2019-03-28},
    langid = {french},
    note = {Section: Speed Reading},
    file = {Snapshot:C\:\\Users\\moutachouiq\\Zotero\\storage\\P2VNP2E4\\what-is-penetration-testing-how-does-it-differ-from-ethical-hacking.html:text/html},
}
@online{ec_council_penetration_nodate,
    title = {Penetration Testing},
    url = {https://www.eccouncil.org/what-is-penetration-testing/},
    abstract = {Penetration testing proactively analyses design flaws, technical weaknesses \& other vulnerabilities. Know what is Pen testing, pen testing tools \& pen tester responsibilities here.},
    titleaddon = {{EC}-Council},
    author = {ec council},
    urldate = {2021-10-06},
    langid = {french},
    file = {Snapshot:C\:\\Users\\moutachouiq\\Zotero\\storage\\CYEZLBS8\\what-is-penetration-testing.html:text/html},
}
@online{nickersonal_penetration_nodate,
    title = {The Penetration Testing Execution Standard},
    url = {http://www.pentest-standard.org/index.php/Main_Page},
    author = {Nickerson.al},
    urldate = {2021-07-09},
    file = {The Penetration Testing Execution Standard:C\:\\Users\\moutachouiq\\Zotero\\storage\\4MDR97I9\\Main_Page.html:text/html},
}
@online{owasp_guide,
    title = {{WSTG} - v4.2 {\textbar} {OWASP}},
    url = {https://owasp.org/www-project-web-security-testing-guide/v42/4-Web_Application_Security_Testing/02-Configuration_and_Deployment_Management_Testing/01-Test_Network_Infrastructure_Configuration},
    abstract = {{WSTG} - v4.2 on the main website for The {OWASP} Foundation. {OWASP} is a nonprofit foundation that works to improve the security of software.},
    urldate = {2021-10-08},
    langid = {english},
    file = {Snapshot:C\:\\Users\\moutachouiq\\Zotero\\storage\\DG8KUGBD\\01-Test_Network_Infrastructure_Configuration.html:text/html},
}
@article{bertoglio2016tramonto,
  title={Tramonto: Uma estrat{\'e}gia de recomenda{\c{c}}{\~a}o para testes de penetra{\c{c}}{\~a}o},
  author={Bertoglio, Daniel Dalalana and Zorzo, Avelino Francisco},
  journal={Anais do SBSeg 2016, 2016, Brasil.},
  year={2016}
}
%%%%%%%%%%%%%   Bibliograph    y%%%%%%%%%
@article{pastor2020,
  title={The not yet exploited goldmine of OSINT: Opportunities, open challenges and future trends},
  author={Pastor-Galindo, Javier and Nespoli, Pantaleone and M{\'a}rmol, F{\'e}lix G{\'o}mez and P{\'e}rez, Gregorio Mart{\'\i}nez},
  journal={IEEE Access},
  volume={8},
  pages={10282--10304},
  year={2020},
  publisher={IEEE}
}

@online{metasploit,
    title = {Metasploit Framework - an overview {\textbar} {ScienceDirect} Topics},
    url = {https://www.sciencedirect.com/topics/computer-science/metasploit-framework},
    urldate = {2021-10-08},
    file = {Metasploit Framework - an overview | ScienceDirect Topics:C\:\\Users\\moutachouiq\\Zotero\\storage\\J6UPNPWP\\metasploit-framework.html:text/html},
}

当我编译它时我得到了这个

在此处输入图片描述

而我需要它显示为 1、2、3、4,即使我的参考文献分为两部分:网络目录和参考书目;

答案1

您的代码产生

Package biblatex Warning: Split bibliography detected.
(biblatex)                Many simple split bibliography setups with
(biblatex)                non-overlapping bibliographies benefit from
(biblatex)                setting 'defernumbers=true'.
(biblatex)                See the documentation for details.
(biblatex)                This warning can be suppressed with
(biblatex)                '\BiblatexSplitbibDefernumbersWarningOff'.

如果你改为

\usepackage[style=numeric, backend=biber, defernumbers,sorting=nty]{biblatex}

(正如 Ulrike 在您展示示例之前在评论中所建议的那样)

重新运行 pdflatex、biber、pdflatex,然后输出为

在此处输入图片描述

相关内容