Publisher
Springer Science and Business Media LLC
Reference47 articles.
1. Berthier R, Sanders WH (2013) Monitoring advanced metering infrastructures with amilyzer. In: Cyber-security of SCADA & industrial control systems
2. Biscarri F, Monedero I, León C, Guerrero J, Biscarri J, Millán R (2009) A mining framework to detect non-technical losses in power utilities. In: Proceedings of the 11th international conference on enterprise information systems - artificial intelligence and decision support systems (ICEIS’09), pp 97–102
3. Cavdarl IH (2004) A solution to remote detection of illegal electricity usage via power line communications. IEEE Trans Power Deliv 19:1663–1667
4. Costa BC, Alberto BLA, Portela AM, Maduro W, Eler EO (2013) Fraud detection in electric power distribution networks using an ann-based knowledge-discover process. Int Artif Intell Appl (IJAIA) 4(6):11–23
5. Depuru S, Wang L, Devabhaktuni V (2011) Support vector machine based data classification for detection of electricity theft. In: Proceedings of IEEE/PES power systems conference and exposition (PSCE), pp 1–8
Cited by
19 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献