Towards an Influence Model for Cybersecurity and Information Warfare | IEEE Conference Publication | IEEE Xplore