Fig. 8From: Bayesian network model to distinguish between intentional attacks and accidental technical failures: a case study of floodgatesConstructed BN Model – First Illustrative ScenarioBack to article page