N Komninos, E Philippou… - … Surveys & Tutorials, 2014 - ieeexplore.ieee.org
The electricity industry is now at the verge of a new era-an era that promises, through the evolution of the existing electrical grids to smart grids, more efficient and effective power …
The scope, scale, and intensity of real, as well as potential attacks, on the Smart Grid have been increasing and thus gaining more attention. An important component of Smart Grid …
The fast-paced development of power systems necessitates smart grids to facilitate real-time control and monitoring with bidirectional communication and electricity flows. Future smart …
R Jiang, R Lu, Y Wang, J Luo, C Shen… - Tsinghua Science and …, 2014 - ieeexplore.ieee.org
With the proliferation of smart grid research, the Advanced Metering Infrastructure (AMI) has become the first ubiquitous and fixed computing platform. However, due to the unique …
Z Yan, H Wen - IEEE Transactions on Instrumentation and …, 2021 - ieeexplore.ieee.org
Electricity theft has been a growing concern for the smart grid. It can be defined as follows: illegal customers use energy from electric utilities without a contract or manipulate their …
This paper is a review of literature with an analysis on a selection of scientific studies for detection of non-technical losses. Non-technical losses occurring in the electric grid at level …
The increased penetration of distributed energy resources (DER) will significantly increase the number of devices that are owned and controlled by consumers and third‐parties. These …
M Zanetti, E Jamhour, M Pellenz… - … on Smart grid, 2017 - ieeexplore.ieee.org
We propose a fraud detection systems (FDS) for advanced metering infrastructure based on anomaly detection on the energy consumption reports from smart meters. Fraud inspection …
X Liu, P Zhu, Y Zhang, K Chen - IEEE Transactions on Smart …, 2015 - ieeexplore.ieee.org
Smart meters are inherent components in advanced metering infrastructure (AMI) in the smart power grid. They are serving as the crucial interfaces through which the cyber …