This “evasion” attack is just one of various adversarial strategies explained in a fresh NIST publication intended to support define the categories of attacks we would count on coupled with ways to mitigate them. (hbox P ^ 2 )CySeMoL differs from MulVAL, k-Zero Working day Security, along with the TVA https://charlierxhej.tinyblogging.com/details-fiction-and-network-threat-70362558