Skip to main content

Table 2 Updated rules for the scenarios of all the monitored parameters

From: A rule-based model for electricity theft prevention in advanced metering infrastructure

Scenarios Defined rules for the security risk model
  If Then
α \(\beta\) \(\gamma\) \(\delta\) Security risk
1 Low Low Low Low Normal
2 Low Low Low High Low
3 Low Low High Low Low
4 Low Low High High High
5 Low High Low Low Low
6 Low High Low High High
7 Low High High Low Medium
8 Low High High High High
9 High Low Low Low Low
10 High Low Low High High
11 High Low High Low Medium
12 High Low High High High
13 High High Low Low Medium
14 High High Low High High
15 High High High Low High
16 High High High High Very High