Fig. 11From: A rule-based model for electricity theft prevention in advanced metering infrastructureModel dependency of \(\delta\) and \(\beta\) on the security riskBack to article page