%PDF-1.4
%
1 0 obj
<>
endobj
2 0 obj
<>
endobj
3 0 obj
<>stream
IEEE
IEEE Transactions on Information Forensics and Security;2021;16; ;10.1109/TIFS.2020.3003570
Cyber threat intelligence
CTI
inconsistency
GapFinder: Finding Inconsistency of Security Information From Unstructured Text
endstream
endobj
4 0 obj
<>stream
x+ |
endstream
endobj
5 0 obj
<>stream
xn0D+fT<*!m++`; z\43i+m}MV`
SeoPͻ飚ÙyQь&D\bNKTMZ *cVgV$Xvq|>?4O!Ң,{?k!$A
`).TjiO/
B
endstream
endobj
6 0 obj
<>stream
x+ |
endstream
endobj
7 0 obj
<>stream
xj0D+fRH?
9&*d+d9Qu]IniJ͙EGA)QB!w 2G7ӶYÍ&VMƉhoiU:xD6ZݰǩzrShy<H
]۶,SI3*rY/NsB{
endstream
endobj
8 0 obj
<>stream
x+ |
endstream
endobj
9 0 obj
<>stream
xn0D+fUD<٥4Hl-743ip_u6kl zJP&nE5+;fMĞ*FܣUF Z]}մ"فelQ͗9|y
e-Nbk!$Q
?Rܨҁq5Bx
endstream
endobj
10 0 obj
<>stream
x+ |
endstream
endobj
11 0 obj
<>stream
xn0D+fT<*!m++`; zL53i+m}M5DO)r'!CN6Ż飚ÙyQь&D\bNKTMZ *cVgV$Xvq|>?4O!Ң,{?k!$A
`).TjiO/nBu
endstream
endobj
12 0 obj
<>stream
x+ |
endstream
endobj
13 0 obj
<>stream
xn0gBT*!q*!1Ѹ8`Ӫ},.II۫A)
l_>1Zm\HdcB)SԺ:mM
4
u'v#>M١^nK*rCEeUi\1d [- 5OFRGoBv
endstream
endobj
14 0 obj
<>stream
x+ |
endstream
endobj
15 0 obj
<>stream
xn0gBT*!q*!1Ѹ8`Ӫ},.II۫-vxߨ.ۗnu;{kzV,$3٘8r3{P_.DN[ csv2ÉȪOSvےB\PyYELJх 7B
endstream
endobj
16 0 obj
<>stream
x+ |
endstream
endobj
17 0 obj
<>stream
xn0D+fZ<*"4ZvT9'lQB)w2e+D/n̯1xdBDHbZ:et5uۉ|#>N٢^K[)d@ZTEVp'M2'>Ψ`zy ^5::rBz
endstream
endobj
18 0 obj
<>stream
x+ |
endstream
endobj
19 0 obj
<>stream
xn0gBi !6CDc$Vq(MmU5,NEIo+vx_I