“…Security Intrusion detection ( [8], [15], [52], [74], [76], [77], [143], [148], [209]),false data injection attacks ( [13], [16], [17], [31], [100], [119], [151], [163], [168], [184], [185], [230], [251], [257]), energy theft ( [54], [99], [169], [191], [254], [258]), distinguishing cyber-attacks from physical faults ( [18]) C10. SG failures fault status detection [41], [46], [61], [62], [126], [127], [142], [176], fault type classification [197], power distribution reliability [149], [195] As it can be seen, there is large variability in the aspects covered by the research. Themes that are covered by more articles are consumption prediction (69 papers), load profile clustering (19), forecast renewable power sources (19), false data injection attacks (14), consumption clustering (...…”