{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,3]],"date-time":"2026-04-03T10:07:24Z","timestamp":1775210844842,"version":"3.50.1"},"publisher-location":"Berlin, Heidelberg","reference-count":23,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"value":"9783642342653","type":"print"},{"value":"9783642342660","type":"electronic"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2012]]},"DOI":"10.1007\/978-3-642-34266-0_16","type":"book-chapter","created":{"date-parts":[[2012,11,4]],"date-time":"2012-11-04T18:49:04Z","timestamp":1352054944000},"page":"264-280","source":"Crossref","is-referenced-by-count":26,"title":["Incentives and Security in Electricity Distribution Networks"],"prefix":"10.1007","author":[{"given":"Saurabh","family":"Amin","sequence":"first","affiliation":[]},{"given":"Galina A.","family":"Schwartz","sequence":"additional","affiliation":[]},{"given":"Hamidou","family":"Tembine","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"16_CR1","unstructured":"Antmann, P.: Reducing technical and non-technical losses in the power sector. Technical report, World Bank Group Energy Sector (2009)"},{"key":"16_CR2","doi-asserted-by":"crossref","unstructured":"Anderson, R., Fuloria, S.: Who controls the off switch? In: 2010 First IEEE International Conference on Smart Grid Communications (SmartGridComm), pp. 96\u2013101 (October 2010)","DOI":"10.1109\/SMARTGRID.2010.5622026"},{"key":"16_CR3","unstructured":"Jeff Smith, N.G.: Smart meters take bite out of electricity theft (September 2011), http:\/\/news.nationalgeographic.com\/news\/energy\/2011\/09\/110913-smart-meters-for-electricity-theft\/"},{"key":"16_CR4","doi-asserted-by":"crossref","unstructured":"Cleveland, F.M.: Cyber security issues for advanced metering infrastructure (ami). In: 2008 IEEE Power and Energy Society General Meeting-Conversion and Delivery of Electrical Energy in the 21st Century, pp. 1\u20135. IEEE (2008)","DOI":"10.1109\/PES.2008.4596535"},{"issue":"18","key":"16_CR5","doi-asserted-by":"publisher","first-page":"2067","DOI":"10.1016\/S0301-4215(03)00182-4","volume":"32","author":"T.B. Smith","year":"2004","unstructured":"Smith, T.B.: Electricity theft: a comparative analysis. Energy Policy\u00a032(18), 2067\u20132076 (2004)","journal-title":"Energy Policy"},{"key":"16_CR6","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"176","DOI":"10.1007\/978-3-642-14379-3_15","volume-title":"Critical Information Infrastructures Security","author":"S. McLaughlin","year":"2010","unstructured":"McLaughlin, S., Podkuiko, D., McDaniel, P.: Energy Theft in the Advanced Metering Infrastructure. In: Rome, E., Bloomfield, R. (eds.) CRITIS 2009. LNCS, vol.\u00a06027, pp. 176\u2013187. Springer, Heidelberg (2010)"},{"key":"16_CR7","unstructured":"Anderson, R., Fuloria, S.: On the security economics of electricity metering. In: The Ninth Workshop on the Economics of Information Security, Citeseer (2010)"},{"key":"16_CR8","unstructured":"Kassakian, J.G., Schmalensee, R.: The future of electric grid: An interdisciplinary MIT study. Technical report, Massachusetts Institute of Technology (2011)"},{"key":"16_CR9","unstructured":"Sam Dolnick, A.P.: Indian officials wage war on energy theft (July 2009), http:\/\/dailyreporter.com\/2009\/07\/06\/indian-officials-wage-war-on-energy-theft\/"},{"key":"16_CR10","unstructured":"PPPIRC: Theft \/ non-technical losses (water and electricity) (2011), http:\/\/ppp.worldbank.org\/public-private-partnership\/legislation-regulation\/laws\/theft-nontechnical-loss"},{"key":"16_CR11","unstructured":"Victor, D.G., Heller, T.C. (eds.): The Political Economy of Power Sector Reform. Cambridge University Press (2009)"},{"key":"16_CR12","unstructured":"Joskow, P.L.: Incentive regulation in theory and practice: Electricity distribution and transmission networks. In: Economic Regulation and Its Reform: What Have We Learned? NBER Chapters. National Bureau of Economic Research, Inc. (Julio Dic 2011)"},{"key":"16_CR13","doi-asserted-by":"crossref","unstructured":"Vogelsang, I.: Electricity transmission pricing and performance-based regulation. CESifo Working Paper Series 1474, CESifo Group Munich (2005)","DOI":"10.5547\/ISSN0195-6574-EJ-Vol27-No4-5"},{"key":"16_CR14","doi-asserted-by":"crossref","unstructured":"Laffont, J., Martimort, D.: The theory of incentives: the principal-agent model. Princeton Univ. Pr. (2002)","DOI":"10.1515\/9781400829453"},{"key":"16_CR15","unstructured":"Bolton, P., Dewatripont, M.: Contract Theory, vol.\u00a01. The MIT Press (2005)"},{"key":"16_CR16","doi-asserted-by":"crossref","unstructured":"Armstrong, M., Sappington, D.E.: Recent Developments in the Theory of Regulation. Handbook of Industrial Organization, vol.\u00a03, pp. 1557\u20131700. Elsevier (2007)","DOI":"10.1016\/S1573-448X(06)03027-5"},{"key":"16_CR17","unstructured":"Laffont, J.J., Tirole, J.: A Theory of Incentives in Procurement and Regulation, 1st edn., vol.\u00a01. The MIT Press (1993)"},{"issue":"1","key":"16_CR18","doi-asserted-by":"publisher","first-page":"33","DOI":"10.1016\/0047-2727(94)01466-2","volume":"58","author":"M. Amrstong","year":"1995","unstructured":"Amrstong, M., Cowan, S., Vickers, J.: Nonlinear pricing and price cap regulation. Journal of Public Economics\u00a058(1), 33\u201355 (1995)","journal-title":"Journal of Public Economics"},{"key":"16_CR19","unstructured":"Tirole, J.: A Theory of Industrial Organizaton. The MIT Press (1988)"},{"issue":"2","key":"16_CR20","doi-asserted-by":"publisher","first-page":"454","DOI":"10.1109\/TAC.1981.1102652","volume":"26","author":"Y.C. Ho","year":"1981","unstructured":"Ho, Y.C., Luh, P., Muralidharan, R.: Information structure, stackelberg games, and incentive controllability. IEEE Transactions on Automatic Control\u00a026(2), 454\u2013460 (1981)","journal-title":"IEEE Transactions on Automatic Control"},{"issue":"2","key":"16_CR21","doi-asserted-by":"publisher","first-page":"167","DOI":"10.1016\/0005-1098(82)90106-6","volume":"18","author":"Y.C. Ho","year":"1982","unstructured":"Ho, Y.C., Luh, P.B., Olsder, G.J.: A control-theoretic view on incentives. Automatica\u00a018(2), 167\u2013179 (1982)","journal-title":"Automatica"},{"issue":"6","key":"16_CR22","doi-asserted-by":"publisher","first-page":"1216","DOI":"10.1109\/JSAC.2007.070815","volume":"25","author":"H. Shen","year":"2007","unstructured":"Shen, H., Basar, T.: Optimal nonlinear pricing for a monopolistic network service provider with complete and incomplete information. IEEE Journal on Selected Areas in Communications\u00a025(6), 1216\u20131223 (2007)","journal-title":"IEEE Journal on Selected Areas in Communications"},{"issue":"4","key":"16_CR23","doi-asserted-by":"publisher","first-page":"571","DOI":"10.2307\/2600990","volume":"22","author":"M. Armstrong","year":"1991","unstructured":"Armstrong, M., Vickers, J.: Welfare effects of price discrimination by a regulated monopolist. RAND Journal of Economics\u00a022(4), 571\u2013581 (1991)","journal-title":"RAND Journal of Economics"}],"container-title":["Lecture Notes in Computer Science","Decision and Game Theory for Security"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-642-34266-0_16.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2021,5,4]],"date-time":"2021-05-04T08:49:44Z","timestamp":1620118184000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-642-34266-0_16"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2012]]},"ISBN":["9783642342653","9783642342660"],"references-count":23,"URL":"https:\/\/doi.org\/10.1007\/978-3-642-34266-0_16","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"value":"0302-9743","type":"print"},{"value":"1611-3349","type":"electronic"}],"subject":[],"published":{"date-parts":[[2012]]}}}