A methodology for cyber operations targeting and control of collateral damage in the context of lawful armed conflict | IEEE Conference Publication | IEEE Xplore