On correlating network traffic for cyber threat intelligence: A Bloom filter approach | IEEE Conference Publication | IEEE Xplore