Computing with Threat Intelligence Data