Extractor: Extracting Attack Behavior from Threat Reports | IEEE Conference Publication | IEEE Xplore