Applying traditional military principles to cyber warfare | IEEE Conference Publication | IEEE Xplore