Planning cyberspace operations: Exercise crossed swords case studyArik, Marko; Venables, Adrian; Ottis, RainJournal of information warfare2022 / p. 67–78 https://www.jinfowar.com/sites/default/files/Planning%20Cyberspace%20Operations_0.pdf Utilising journey mapping and crime scripting to combat cybercrime and cyber warfare attacksSõmer, Tiia; Hallaq, Bil; Watson, TimJournal of information warfare2016 / p. 39-49 https://www.jinfowar.com/journal-issue/volume-15-issue-4