Fig. 1. Example of problematic PDF file whenextracting text
Fig. 2. Topic Modeling based on Security Intelligence Report
Fig. 3. Result of putting test document in TopicModeling
Table 1. When a PDF document is simply extracted as text
Table 2. This is an example of extracting the same PDF document by the method developed in this task
Table 3. Topic by bag-of- words
Table 4. Security Intelligence Report Topic Automatic Extraction Model Satisfaction Evaluation Question
Table 5. Security Intelligence Report Topic Automatic Extraction Model satisfaction