Adversarial attacks pose a major threat to machine learning and the systems that rely on it. In cybersecurity domain, adversarial cyber-attack examples capable of evading detection are especially concerning. Nonetheless, an example generated for domain with tabular data must be realistic within domain. This work establishes fundamental constraint levels required achieve realism introduces Adapt...