Introduction
In the age of global communication networks, autonomously acting technologies and widely available AI-enhanced cyber tools, stealthy and covert cyber operations with unpredictable propagation have become an issue of significant global concern. Being well aware of the increasing military efficiency of cyber offensive activities and, undoubtedly, with a noble goal to protect their citizens, countries apply these techniques to gain strategic information, ...