Skip to main content

Table 1 Defined rules for \(\alpha\), \(\beta\), and \(\gamma\) scenarios, and the security risks

From: A rule-based model for electricity theft prevention in advanced metering infrastructure

Scenarios

Defined rules for the security risk model

 

If

Then

α

\(\beta\)

\(\gamma\)

Security risk

1

Low

Low

Low

Normal

2

Low

Low

High

Low

3

Low

High

Low

Low

4

Low

High

High

Medium

5

High

Low

Low

Low

6

High

Low

High

Medium

7

High

High

Low

Medium

8

High

High

High

High