The Use of Runtime Verification for Identifying and Responding to Cybersecurity Threats Posed to State Actors During Cyberwarfare | IEEE Conference Publication | IEEE Xplore