def get_intrusion_window(adversary_path):
    adversary_path='C:/Users/substationc/Desktop/DataFusion/DataFusionApp/DataFusionApp/PythonScripts/'+adversary_path
    fusion = DataFusion()
    fusion.load_json(adversary_path)
    fusion.extract_cyber_data()
    fusion.extract_physical_data()
    data_to_process = fusion.merge()
    attack_start = data_to_process.iloc[0]['Time']
    start = int(time.mktime(attack_start.timetuple()))
    attack_end = data_to_process.iloc[-1]['Time']
    end = int(time.mktime(attack_end.timetuple()))
    return start,end
# _os = outstations.replace('OS','')
# poll_interval = case.split('_')[2]
# _pi = poll_interval.replace('poll','')
# stage = sys.argv[2]

_usecase = 'UC3'
_os = '5'
_pi = '30'
stage = '3'

#### based on the stage pack the value of that stage and return####
jsonpath, pickle_path, snort_path, start_time, end_time = get_file_path(
    _usecase, int(_os), int(_pi))

fusion = DataFusion()
fusion.load_json(jsonpath)
fusion.extract_cyber_data()
data_as_list = []
to_monitor = {}
if 'UC1' in _usecase:
    to_monitor = {'399': [5], '456': [18], '1195': [24], '1200': [27]}
elif 'UC2' in _usecase:
    to_monitor = {
        '390': [20],
        '601': [34],
        '631': [23],
        '968': [27],
        '968': [29]
    }
elif 'UC3' in _usecase:
    to_monitor = {