메뉴 건너뛰기




Volumn 31, Issue 7, 2013, Pages 1319-1330

A multi-sensor energy theft detection framework for advanced metering infrastructures

Author keywords

advanced metering infrastructures; intrusion alert correlation; intrusion and energy theft detection; multi sensor inference and information fusion; Power grid critical infrastructures

Indexed keywords

EFFICIENT MANAGEMENTS; ELEMENTARY ANALYSIS; INTRUSION ALERT CORRELATION; INTRUSION DETECTION SYSTEMS; MULTI SENSOR; MULTIPLE SENSORS; POWER GRIDS; THEFT DETECTIONS;

EID: 84880210183     PISSN: 07338716     EISSN: None     Source Type: Journal    
DOI: 10.1109/JSAC.2013.130714     Document Type: Article
Times cited : (238)

References (33)
  • 3
    • 85081775758 scopus 로고    scopus 로고
    • 2008, aMI Industry Glossary. Available at http://www.aclaratech.com.
    • (2008) AMI Industry Glossary
  • 6
    • 84872154793 scopus 로고    scopus 로고
    • Non-repudiation in neighborhood area networks for smart grid
    • Z. Xiao, Y. Xiao, and D. H.-C. Du, "Non-repudiation in neighborhood area networks for smart grid," IEEE Commun. Mag., vol. 51, no. 1, pp. 18-26, 2013.
    • (2013) IEEE Commun. Mag , vol.51 , Issue.1 , pp. 18-26
    • Xiao, Z.1    Xiao, Y.2    Du, D.H.-C.3
  • 7
    • 85081780767 scopus 로고    scopus 로고
    • Patent Application US 2012/0 062 210 A1, 03
    • M. VEILLETTE, "Process for detecting energy theft," Patent Application US 2012/0 062 210 A1, 03 15, 2012. [Online]. Available: http://www.patentlens.net/patentlens/patent/US 2012 0062210 A1/en/
    • (2012) Process for Detecting Energy Theft , vol.15
    • Veillette, M.1
  • 12
    • 63049100877 scopus 로고    scopus 로고
    • Detection of abnormalities and electricity theft using genetic support vector machines
    • J. Nagi, K. Yap, S. Tiong, S. Ahmed, and A. Mohammad, "Detection of abnormalities and electricity theft using genetic support vector machines," in IEEE TENCON Region 10 Conference, 2008, pp. 1-6.
    • (2008) IEEE TENCON Region 10 Conference , pp. 1-6
    • Nagi, J.1    Yap, K.2    Tiong, S.3    Ahmed, S.4    Mohammad, A.5
  • 13
    • 82855182204 scopus 로고    scopus 로고
    • A hybrid neural network model and encoding technique for enhanced classification of energy consumption data
    • S. Depuru, L. Wang, V. Devabhaktuni, and P. Nelapati, "A hybrid neural network model and encoding technique for enhanced classification of energy consumption data," in IEEE Power and Energy Society General Meeting, 2011, pp. 1-8.
    • (2011) IEEE Power and Energy Society General Meeting , pp. 1-8
    • Depuru, S.1    Wang, L.2    Devabhaktuni, V.3    Nelapati, P.4
  • 16
    • 0026970695 scopus 로고
    • Nonintrusive appliance load monitoring
    • DOI 10.1109/5.192069
    • G. Hart, "Nonintrusive appliance load monitoring," Proc. IEEE, vol. 80, no. 12, pp. 1870-1891, 1992. (Pubitemid 23612231)
    • (1992) Proceedings of the IEEE , vol.80 , Issue.12 , pp. 1870-1891
    • Hart George, W.1
  • 19
    • 84869447036 scopus 로고    scopus 로고
    • Applying kernel based subspace classification to a non-intrusive monitoring for household electric appliances
    • H. Murata and T. Onoda, "Applying kernel based subspace classification to a non-intrusive monitoring for household electric appliances," in Proc. 11th International Conference on Artificial Neural Networks, 2001.
    • (2001) Proc. 11th International Conference on Artificial Neural Networks
    • Murata, H.1    Onoda, T.2
  • 20
    • 70350381132 scopus 로고    scopus 로고
    • Cumulative attestation kernels for embedded systems
    • M. LeMay and C. Gunter, "Cumulative attestation kernels for embedded systems," Computer Security-ESORICS 2009, pp. 655-670, 2009.
    • (2009) Computer Security-ESORICS , vol.2009 , pp. 655-670
    • Lemay, M.1    Gunter, C.2
  • 23
    • 85081783922 scopus 로고    scopus 로고
    • 16-electricity-thefts N.htm
    • Electricity thefts surge in bad times. Available at http://www.usatoday. com/money/industries/energy/2009-03-16-electricity-thefts N.htm.
    • Electricity Thefts Surge in Bad Times
  • 26
    • 77249154055 scopus 로고    scopus 로고
    • Inferring personal information from demand-response systems
    • M. A. Lisovich, D. K. Mulligan, and S. B. Wicker, "Inferring personal information from demand-response systems," IEEE Security and Privacy, vol. 8, no. 1, pp. 11-20, 2010.
    • (2010) IEEE Security and Privacy , vol.8 , Issue.1 , pp. 11-20
    • Lisovich, M.A.1    Mulligan, D.K.2    Wicker, S.B.3
  • 28
    • 0024610919 scopus 로고
    • A tutorial on hidden Markov models and selected applications in speech recognition
    • L. Rabiner, "A tutorial on hidden Markov models and selected applications in speech recognition," Proc. IEEE, vol. 77, no. 2, pp. 257-286, 1989.
    • (1989) Proc IEEE , vol.77 , Issue.2 , pp. 257-286
    • Rabiner, L.1
  • 32
    • 85081782230 scopus 로고    scopus 로고
    • Keynote address: Developing a testbed for the smart grid
    • T. Yardley, "Keynote address: Developing a testbed for the smart grid," in IEEE Conference on Local Computer Networks, 2010, pp. 1-1.
    • (2010) IEEE Conference on Local Computer Networks , pp. 1-1
    • Yardley, T.1
  • 33
    • 84866025274 scopus 로고    scopus 로고
    • A novel privacy-enhanced ami system using searchable and homomorphic encryption techniques
    • Springer Berlin / Heidelberg
    • C. Lee, H. Yang, B. Lee, and D. Won, "A novel privacy-enhanced ami system using searchable and homomorphic encryption techniques," in Convergence and Hybrid Information Technology. Springer Berlin / Heidelberg, 2012, vol. 7425, pp. 608-617.
    • (2012) Convergence and Hybrid Information Technology , vol.7425 , pp. 608-617
    • Lee, C.1    Yang, H.2    Lee, B.3    Won, D.4


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.