{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,1,13]],"date-time":"2026-01-13T23:06:33Z","timestamp":1768345593930,"version":"3.49.0"},"publisher-location":"Cham","reference-count":21,"publisher":"Springer International Publishing","isbn-type":[{"value":"9783319333304","type":"print"},{"value":"9783319333311","type":"electronic"}],"license":[{"start":{"date-parts":[[2016,1,1]],"date-time":"2016-01-01T00:00:00Z","timestamp":1451606400000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2016]]},"DOI":"10.1007\/978-3-319-33331-1_16","type":"book-chapter","created":{"date-parts":[[2016,5,17]],"date-time":"2016-05-17T14:12:12Z","timestamp":1463494332000},"page":"199-210","source":"Crossref","is-referenced-by-count":40,"title":["ARIMA-Based Modeling and Validation of Consumption Readings in Power Grids"],"prefix":"10.1007","author":[{"given":"Varun","family":"Badrinath Krishna","sequence":"first","affiliation":[]},{"given":"Ravishankar K.","family":"Iyer","sequence":"additional","affiliation":[]},{"given":"William H.","family":"Sanders","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2016,5,18]]},"reference":[{"key":"16_CR1","unstructured":"Forecasting with ARIMA Models. https:\/\/onlinecourses.science.psu.edu\/stat510\/node\/66"},{"key":"16_CR2","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"crossref","first-page":"70","DOI":"10.1007\/978-3-319-22264-6_5","volume-title":"Quantitative Evaluation of Systems","author":"V Badrinath Krishna","year":"2015","unstructured":"Badrinath Krishna, V., Weaver, G.A., Sanders, W.H.: PCA-based method for detecting integrity attacks on advanced metering infrastructure. In: Campos, J., Haverkort, B.R. (eds.) Quantitative Evaluation of Systems. LNCS, vol. 9259, pp. 70\u201385. Springer, Heidelberg (2015)"},{"key":"16_CR3","unstructured":"BC Hydro: Smart metering program (2014). https:\/\/www.bchydro.com\/energy-in-bc\/projects\/smart_metering_infrastructure_program.html"},{"key":"16_CR4","doi-asserted-by":"crossref","unstructured":"Berthier, R., Sanders, W.H., Khurana, H.: Intrusion Detection for Advanced Metering Infrastructures: Requirements and Architectural Directions. In: Proceedings of IEEE SmartGridComm 2010, pp. 350\u2013355. IEEE, October 2010","DOI":"10.1109\/SMARTGRID.2010.5622068"},{"key":"16_CR5","unstructured":"ComEd: Safeguarding data through smarter technology (2014). https:\/\/www.comed.com\/documents\/technology\/grid_mod_fact_sheet_security_2014_r2.pdf"},{"issue":"3","key":"16_CR6","doi-asserted-by":"crossref","first-page":"1014","DOI":"10.1109\/TPWRS.2002.804943","volume":"18","author":"J Contreras","year":"2003","unstructured":"Contreras, J., Espinola, R., Nogales, F.J.: ARIMA models to predict next-day electricity prices. IEEE Trans. Power Syst. 18(3), 1014\u20131020 (2003)","journal-title":"IEEE Trans. Power Syst."},{"key":"16_CR7","unstructured":"Cyber Intelligence Section: Smart grid electric meters altered to steal electricity, May 2010. http:\/\/krebsonsecurity.com\/wp-content\/uploads\/2012\/04\/FBI-SmartMeterHack-285x305.png"},{"key":"16_CR8","unstructured":"Edison Electric Institute: Smart Meters and Smart Meter Systems : A Metering Industry Perspective, p. 35, March 2011. http:\/\/www.eei.org\/issuesandpolicy\/grid-enhancements\/documents\/smartmeters.pdf"},{"key":"16_CR9","unstructured":"Hyndman, R.J.: Forecasting with long seasonal periods, September 2010. http:\/\/robjhyndman.com\/hyndsight\/longseasonality\/"},{"issue":"3","key":"16_CR10","doi-asserted-by":"crossref","first-page":"1","DOI":"10.18637\/jss.v027.i03","volume":"27","author":"RJ Hyndman","year":"2008","unstructured":"Hyndman, R.J., Khandakar, Y.: Automatic time series forecasting: the forecast package for R. J.Stat. Softw. 27(3), 1\u201322 (2008)","journal-title":"J.Stat. Softw."},{"key":"16_CR11","unstructured":"ICS-CERT: Internet accessible control systems at risk (2014). https:\/\/ics-cert.us-cert.gov\/sites\/default\/files\/Monitors\/ICS-CERT_Monitor_%20Jan-April2014.pdf"},{"key":"16_CR12","unstructured":"Institute for Electric Efficiency: Utility-Scale Smart Meter Deployments September, pp. 1\u201311 (2014)"},{"issue":"2","key":"16_CR13","doi-asserted-by":"crossref","first-page":"105","DOI":"10.1109\/TST.2014.6787363","volume":"19","author":"R Jiang","year":"2014","unstructured":"Jiang, R., Lu, R., Wang, L., Luo, J., Changxiang, S., Xuemin, S.: Energy-theft detection issues for advanced metering infrastructure in smart grid. Tsinghua Sci. Technol. 19(2), 105\u2013120 (2014)","journal-title":"Tsinghua Sci. Technol."},{"key":"16_CR14","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"crossref","first-page":"210","DOI":"10.1007\/978-3-642-33338-5_11","volume-title":"Research in Attacks, Intrusions, and Defenses","author":"D Mashima","year":"2012","unstructured":"Mashima, D., C\u00e1rdenas, A.A.: Evaluating electricity theft detectors in smart grid networks. In: Balzarotti, D., Stolfo, S.J., Cova, M. (eds.) RAID 2012. LNCS, vol. 7462, pp. 210\u2013229. Springer, Heidelberg (2012)"},{"key":"16_CR15","doi-asserted-by":"crossref","unstructured":"McLaughlin, S., Holbert, B., Zonouz, S., Berthier, R.: AMIDS: A multi-sensor energy theft detection framework for advanced metering infrastructures. In: Proceedings of SmartGridComm 2012, pp. 354\u2013359, November 2012","DOI":"10.1109\/SmartGridComm.2012.6486009"},{"key":"16_CR16","doi-asserted-by":"crossref","unstructured":"McLaughlin, S., Podkuiko, D., Miadzvezhanka, S., Delozier, A., McDaniel, P.: Multi-vendor penetration testing in the advanced metering infrastructure. In: Proceedings of ACSAC 2010, pp. 107\u2013116. ACM, New York (2010)","DOI":"10.1145\/1920261.1920277"},{"key":"16_CR17","unstructured":"Mohamed, Z., Bodger, P.: Forecasting electricity consumption a comparison of models for New Zealand. In: Electricity Engineers\u2019 Association of New Zealand Annual Conference, vol. 64, pp. 1\u201315 (2004). http:\/\/ir.canterbury.ac.nz\/handle\/10092\/821"},{"key":"16_CR18","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"crossref","first-page":"379","DOI":"10.1007\/978-3-642-39712-7_29","volume-title":"Mach. Learn. Data Min. Pattern Recogn.","author":"DN Nikovski","year":"2013","unstructured":"Nikovski, D.N., Wang, Z., Esenther, A., Sun, H., Sugiura, K., Muso, T., Tsuru, K.: Smart meter data analysis for power theft detection. In: Perner, P. (ed.) MLDM 2013. LNCS, vol. 7988, pp. 379\u2013389. Springer, Heidelberg (2013)"},{"key":"16_CR19","unstructured":"PG&E: Electric schedule e-1. residntial services, February 2015. http:\/\/www.pge.com\/tariffs\/tm2\/pdf\/ELEC_SCHEDS_E-1.pdf"},{"key":"16_CR20","doi-asserted-by":"crossref","unstructured":"Tan, R., Badrinath Krishna, V., Yau, D.K., Kalbarczyk, Z.: Impact of integrity attacks on real-time pricing in smart grids. In: Proceedings of ACM CCS 2013, pp. 439\u2013450. ACM, New York (2013)","DOI":"10.1145\/2508859.2516705"},{"issue":"3","key":"16_CR21","doi-asserted-by":"crossref","first-page":"815","DOI":"10.1109\/59.780891","volume":"14","author":"H Wan","year":"1999","unstructured":"Wan, H., McCalley, J., Vittal, V.: Increasing thermal rating by risk analysis. IEEE Trans. Power Syst. 14(3), 815\u2013828 (1999)","journal-title":"IEEE Trans. Power Syst."}],"container-title":["Lecture Notes in Computer Science","Critical Information Infrastructures Security"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-319-33331-1_16","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,6,24]],"date-time":"2017-06-24T13:48:39Z","timestamp":1498312119000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-319-33331-1_16"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2016]]},"ISBN":["9783319333304","9783319333311"],"references-count":21,"URL":"https:\/\/doi.org\/10.1007\/978-3-319-33331-1_16","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"value":"0302-9743","type":"print"},{"value":"1611-3349","type":"electronic"}],"subject":[],"published":{"date-parts":[[2016]]}}}