Fig. 5From: Bayesian network model to distinguish between intentional attacks and accidental technical failures: a case study of floodgatesFocus Group Workshop – Example QuestionsBack to article page