Cyber-threat intelligence: architecture and methods

Summary
The report will describe the architecture of the cyber-threat intelligence gathering tool, the methods/algorithms explored and developed, as well as research results obtained from the experimental setups