2021
DOI: 10.1016/j.epsr.2021.107415
|View full text |Cite
|
Sign up to set email alerts
|

A review of non-technical loss attack models and detection methods in the smart grid

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1

Citation Types

0
22
0

Year Published

2022
2022
2024
2024

Publication Types

Select...
8

Relationship

0
8

Authors

Journals

citations
Cited by 25 publications
(22 citation statements)
references
References 46 publications
0
22
0
Order By: Relevance
“…All malicious samples generated by the equations from previous works [11,21,23] and additional equations were used in [27] to create a more diverse case of energy theft. A multiclass classification problem was framed and several ML algorithms were used to solve it.…”
Section: Related Workmentioning
confidence: 99%
See 1 more Smart Citation
“…All malicious samples generated by the equations from previous works [11,21,23] and additional equations were used in [27] to create a more diverse case of energy theft. A multiclass classification problem was framed and several ML algorithms were used to solve it.…”
Section: Related Workmentioning
confidence: 99%
“…Based on this, equations are needed to model the consumption behavior of fraudulent users. In this work, the same eleven equations used in [27] are used, with some modifications to generate more practical cases of energy theft, as they cover a large number of possibilities for these types of NTL. Let x j,m , j = 1, 2, .…”
Section: Energy Theft Attack Modelsmentioning
confidence: 99%
“…Specifically, two categories, non-technical loss (NTL) and loss from technical issues (TL), are the major electricity losses. TL happened due to power lines affected by joules and the transformer loss through the transportation of electrical power [7]. It is complex to calculate the TL because finding the point of loss is difficult.…”
Section: Introductionmentioning
confidence: 99%
“…Partial solutions are eliminated, followed by a new solution with the same number of cuckoos. A straightforward power-law equation may represent levy() with the random walk as in Equation (7).…”
mentioning
confidence: 99%
“…Traditional methods for detecting electricity theft rely heavily on manual inspections and billing analysis, necessitating specialized personnel for on-site investigations. These inspections entail scrutinizing the connections of electrical devices and the status of electric meters, with anomalies identified through comparisons between historical electricity consumption and current usage patterns [4], [5].…”
mentioning
confidence: 99%