Skip to main content

Table 2 Updated rules for the scenarios of all the monitored parameters

From: A rule-based model for electricity theft prevention in advanced metering infrastructure

Scenarios

Defined rules for the security risk model

 

If

Then

α

\(\beta\)

\(\gamma\)

\(\delta\)

Security risk

1

Low

Low

Low

Low

Normal

2

Low

Low

Low

High

Low

3

Low

Low

High

Low

Low

4

Low

Low

High

High

High

5

Low

High

Low

Low

Low

6

Low

High

Low

High

High

7

Low

High

High

Low

Medium

8

Low

High

High

High

High

9

High

Low

Low

Low

Low

10

High

Low

Low

High

High

11

High

Low

High

Low

Medium

12

High

Low

High

High

High

13

High

High

Low

Low

Medium

14

High

High

Low

High

High

15

High

High

High

Low

High

16

High

High

High

High

Very High