From: A rule-based model for electricity theft prevention in advanced metering infrastructure
Scenarios | Defined rules for the security risk model | ||||
---|---|---|---|---|---|
 | If | Then | |||
α | \(\beta\) | \(\gamma\) | \(\delta\) | Security risk | |
1 | Low | Low | Low | Low | Normal |
2 | Low | Low | Low | High | Low |
3 | Low | Low | High | Low | Low |
4 | Low | Low | High | High | High |
5 | Low | High | Low | Low | Low |
6 | Low | High | Low | High | High |
7 | Low | High | High | Low | Medium |
8 | Low | High | High | High | High |
9 | High | Low | Low | Low | Low |
10 | High | Low | Low | High | High |
11 | High | Low | High | Low | Medium |
12 | High | Low | High | High | High |
13 | High | High | Low | Low | Medium |
14 | High | High | Low | High | High |
15 | High | High | High | Low | High |
16 | High | High | High | High | Very High |