Identifying cyber strategies vis-a-vis cyber power | IEEE Conference Publication | IEEE Xplore