From: A rule-based model for electricity theft prevention in advanced metering infrastructure
Scenarios | Defined rules for the security risk model | |||
---|---|---|---|---|
 | If | Then | ||
α | \(\beta\) | \(\gamma\) | Security risk | |
1 | Low | Low | Low | Normal |
2 | Low | Low | High | Low |
3 | Low | High | Low | Low |
4 | Low | High | High | Medium |
5 | High | Low | Low | Low |
6 | High | Low | High | Medium |
7 | High | High | Low | Medium |
8 | High | High | High | High |