Automatic Mapping of Unstructured Cyber Threat Intelligence: An Experimental Study