Fig. 6From: A rule-based model for electricity theft prevention in advanced metering infrastructureModel dependency \(\alpha\) and \(\beta\) on the security riskBack to article page