Fig. 10From: A rule-based model for electricity theft prevention in advanced metering infrastructureModel dependency of \(\delta\) and \(\gamma\) on the security riskBack to article page