Fig. 8From: A rule-based model for electricity theft prevention in advanced metering infrastructureModel dependency \(\gamma\) and \(\beta\) on the security riskBack to article page