Skip to main content

Table 2 CPT Excerpt – Problem Variable

From: Bayesian network model to distinguish between intentional attacks and accidental technical failures: a case study of floodgates

C1

C2

C3

C4

C5

C6

C7

C8

Y

Attack

Failure

True

True

True

True

True

True

True

True

0.02

0.98

True

True

True

True

True

True

True

False

0.09

0.91

True

True

True

True

True

True

False

True

0.06

0.94

True

True

True

True

True

True

False

False

0.24

0.76

True

True

True

True

True

False

True

True

0.09

0.91

True

True

True

True

True

False

True

False

0.38

0.62

True

True

True

True

True

False

False

True

0.24

0.76

True

True

True

True

True

False

False

False

0.97

0.03

True

True

True

True

False

True

True

True

0.02

0.98

True

True

True

True

False

True

True

False

0.09

0.91

  1. In this table, C1: Easy physical accessibility, C2: No sensor data integrity verification, C3: Easy network accessibility, C4: Presence of software in sensor, C5: No sensor firmware update, C6: Maintenance issue, C7: No use of EMI shielding technique, C8: Location of sensor susceptible to external factor and Y: Major cause for sensor sends incorrect water level measurements