Abstract: In the ever-evolving cyber era, cyberattack threats are increasingly diverse and elusive. Precise and complete information related to cyber attacks can be utilised to create a reliable ...