Fig. 1From: Bayesian network model to distinguish between intentional attacks and accidental technical failures: a case study of floodgatesTypical ICS Architecture and LayersBack to article page