Fig. 3From: A rule-based model for electricity theft prevention in advanced metering infrastructureInput–output layout of the developed modelBack to article page