IIoT Deep Malware Threat Hunting: From Adversarial Example Detection to Adversarial Scenario Detection