Fig. 10From: Bayesian network model to distinguish between intentional attacks and accidental technical failures: a case study of floodgatesBoxplots for Different Variables in the Constructed BN ModelBack to article page