Skip to main content

Table 1 Defined rules for \(\alpha\), \(\beta\), and \(\gamma\) scenarios, and the security risks

From: A rule-based model for electricity theft prevention in advanced metering infrastructure

Scenarios Defined rules for the security risk model
  If Then
α \(\beta\) \(\gamma\) Security risk
1 Low Low Low Normal
2 Low Low High Low
3 Low High Low Low
4 Low High High Medium
5 High Low Low Low
6 High Low High Medium
7 High High Low Medium
8 High High High High