Abstract: Security professionals, researchers, and analysts identify attacks and produce cyber-threat intelligence feeds by analyzing network and system data. This process is time-consuming and ...