presented at event Cyber Command/Stanford Workshop on Strategic Use of Offensive Operations in Cyberspace Conference