Fig. 9From: A rule-based model for electricity theft prevention in advanced metering infrastructureModel dependency of \(\delta\) and \(\alpha\) security riskBack to article page