{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,1,31]],"date-time":"2026-01-31T07:43:59Z","timestamp":1769845439392,"version":"3.49.0"},"reference-count":20,"publisher":"Springer Science and Business Media LLC","issue":"1-2","license":[{"start":{"date-parts":[[2018,6,22]],"date-time":"2018-06-22T00:00:00Z","timestamp":1529625600000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Comput Manag Sci"],"published-print":{"date-parts":[[2019,2]]},"DOI":"10.1007\/s10287-018-0325-x","type":"journal-article","created":{"date-parts":[[2018,6,22]],"date-time":"2018-06-22T01:57:33Z","timestamp":1529632653000},"page":"329-343","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":27,"title":["Big data analytics: an aid to detection of non-technical losses in power utilities"],"prefix":"10.1007","volume":"16","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-0873-3298","authenticated-orcid":false,"given":"Giovanni","family":"Micheli","sequence":"first","affiliation":[]},{"given":"Emiliano","family":"Soda","sequence":"additional","affiliation":[]},{"given":"Maria Teresa","family":"Vespucci","sequence":"additional","affiliation":[]},{"given":"Marco","family":"Gobbi","sequence":"additional","affiliation":[]},{"given":"Alessandro","family":"Bertani","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2018,6,22]]},"reference":[{"key":"325_CR20","doi-asserted-by":"crossref","unstructured":"Alahakoon D, Yu X (2013, November 14) Advanced Analytics for Harnessing the Power of Smart Meter Big Data. In: Proceedings of the 2013 IEEE International Workshop on Inteligent Energy Systems (IWIES), Vienna, pp 40\u201345","DOI":"10.1109\/IWIES.2013.6698559"},{"key":"325_CR1","unstructured":"Alejandro L, Blair C, Bloodgood L, Khan M, Lawless M, Meehan D, \u2026 Tsuji K (2014) Global market for smart electricity meters: government policies driving strong growth. In: U.S. International trade commission, office of industries working paper. Washington DC"},{"key":"325_CR2","doi-asserted-by":"crossref","unstructured":"Depuru S, Wang L, Devabhaktuni V (2011) Support vector machine based data classification for detection of electricity theft. In: 2011 IEEE\/PES power systems conference, pp 1\u20138","DOI":"10.1109\/PSCE.2011.5772466"},{"key":"325_CR3","doi-asserted-by":"crossref","unstructured":"Depuru S, Wang L, Devabhaktuni V (2012) Enhanced encoding technique for identifying abnormal energy usage pattern. In: IEEE North American power symposium, pp 1\u20136","DOI":"10.1109\/NAPS.2012.6336366"},{"key":"325_CR4","doi-asserted-by":"crossref","first-page":"21","DOI":"10.1016\/j.ijepes.2012.10.031","volume":"47","author":"S Depuru","year":"2013","unstructured":"Depuru S, Wang L, Devabhaktuni V, Green RC (2013) High performance computing for detection of electricity theft. Int J Electr Power Energy Syst 47:21\u201330","journal-title":"Int J Electr Power Energy Syst"},{"issue":"4","key":"325_CR5","doi-asserted-by":"crossref","first-page":"2436","DOI":"10.1109\/TPWRD.2011.2161621","volume":"26","author":"E Angelos dos","year":"2011","unstructured":"dos Angelos E, Saavedra O, Cortes O, de Souza A (2011) Detection and identification of abnormalities in customer consumptions in power distribution systems. IEEE Trans Power 26(4):2436\u20132442","journal-title":"IEEE Trans Power"},{"issue":"12","key":"325_CR6","first-page":"585","volume":"6","author":"M El-Dereny","year":"2011","unstructured":"El-Dereny M, Rashwan NI (2011) Solving multicollinearity problem using ridge regression models. Int J Contemp Math Sci 6(12):585\u2013600","journal-title":"Int J Contemp Math Sci"},{"key":"325_CR7","unstructured":"Federal Court of Audit (2007) Operational audit report held in national agency of electrical energy. Tech. Rep., No. TC 025.619\/2007-2. Brazil"},{"key":"325_CR8","unstructured":"Fehrenbacher K (2013, January 21) A startup emerges to use wireless mesh and the cloud to fight energy theft. Gigaom: the industry leader in emerging technology research: \n                    https:\/\/gigaom.com\/2013\/01\/21\/a-startup-emerges-to-use-wireless-mesh-and-the-cloud-to-fight-energy-theft\/\n                    \n                  . Accessed 15 Nov 2016"},{"key":"325_CR9","unstructured":"IBM (2012, May) Managing big data for smart grids. \n                    http:\/\/www-935.ibm.com\/services\/multimedia\/Managing_big_data_for_smart_grids_and_smart_meters.pdf\n                    \n                  . Accessed 15 Nov 2016"},{"issue":"2","key":"325_CR10","doi-asserted-by":"crossref","first-page":"105","DOI":"10.1109\/TST.2014.6787363","volume":"19","author":"R Jang","year":"2014","unstructured":"Jang R, Lu R, Wang Y, Luo J, Shen C, Shen XS (2014) Energy-theft detection issues for advanced metering infrastructure in smart grid. Tsinghua Sci Technol 19(2):105\u2013120","journal-title":"Tsinghua Sci Technol"},{"key":"325_CR11","doi-asserted-by":"crossref","unstructured":"Mashima D, Cardenas A (2012, Springer) Evaluating electricity theft detectors in smart grid networks. In: Research in attacks, intrusions, and defenses, pp 210\u2013229","DOI":"10.1007\/978-3-642-33338-5_11"},{"issue":"3","key":"325_CR12","doi-asserted-by":"crossref","first-page":"75","DOI":"10.1109\/MSP.2009.76","volume":"7","author":"P McDaniel","year":"2009","unstructured":"McDaniel P, McLaughlin S (2009) Security and privacy. IEEE Secur Priv 7(3):75\u201377","journal-title":"IEEE Secur Priv"},{"key":"325_CR13","unstructured":"Micheli G (2016) Big data analytics: individuazione delle perdite non tecniche nelle reti elettriche. Master\u2019s thesis. Universit\u00e0 degli Studi di Bergamo. Bergamo"},{"key":"325_CR14","unstructured":"Ministry of Power (2013) Overview of power distribution. India. \n                    http:\/\/www.powermin.nic.in\n                    \n                  . Accessed 15 Nov 2016"},{"key":"325_CR15","doi-asserted-by":"crossref","unstructured":"Muniz C, Figueiredo K, Vellasco M, Chavez G, Pacheco M (2009) Irregularity detection on low tension electric installations by neural network ensembles. In: IEEE international joint conference on neural networks, pp 2176\u20132182","DOI":"10.1109\/IJCNN.2009.5178985"},{"key":"325_CR16","doi-asserted-by":"crossref","unstructured":"Nagi J, Yap K, Tiong S, Ahmed S, Mohammad A (2008) Detection of abnormalities and electricity theft using genetic support vector machines. In: TENCON 2008-2008 IEEE region 10 conference, pp 1\u20136","DOI":"10.1109\/TENCON.2008.4766403"},{"issue":"2","key":"325_CR17","doi-asserted-by":"crossref","first-page":"1284","DOI":"10.1109\/TPWRD.2010.2055670","volume":"26","author":"J Nagi","year":"2011","unstructured":"Nagi J, Yap KS, Tiong SK, Ahmed S, Nagi F (2011) Improving SVM-based nontechnical loss detection in power utility using the fuzzy inference system. IEEE Trans Power Deliv 26(2):1284\u20131285","journal-title":"IEEE Trans Power Deliv"},{"key":"325_CR18","doi-asserted-by":"crossref","unstructured":"Salinas S, Li M, Li P (2012) Privacy-preserving energy theft detection in smart grids. In: 9th Annual IEEE communications society conference on sensor, mesh and ad hoc communications and networks (SECON), pp 605\u2013613","DOI":"10.1109\/SECON.2012.6275834"},{"issue":"9","key":"325_CR19","doi-asserted-by":"crossref","first-page":"257","DOI":"10.1109\/JSAC.2013.SUP.0513023","volume":"31","author":"S Salinas","year":"2013","unstructured":"Salinas S, Li M, Li P (2013) Privacy-preserving energy theft detection in smart grids: a P2P computing approach. J Sel Areas Commun 31(9):257\u2013267","journal-title":"J Sel Areas Commun"}],"container-title":["Computational Management Science"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/article\/10.1007\/s10287-018-0325-x\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s10287-018-0325-x.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s10287-018-0325-x.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,6,21]],"date-time":"2019-06-21T19:14:34Z","timestamp":1561144474000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/s10287-018-0325-x"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2018,6,22]]},"references-count":20,"journal-issue":{"issue":"1-2","published-print":{"date-parts":[[2019,2]]}},"alternative-id":["325"],"URL":"https:\/\/doi.org\/10.1007\/s10287-018-0325-x","relation":{},"ISSN":["1619-697X","1619-6988"],"issn-type":[{"value":"1619-697X","type":"print"},{"value":"1619-6988","type":"electronic"}],"subject":[],"published":{"date-parts":[[2018,6,22]]},"assertion":[{"value":"31 October 2017","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"12 June 2018","order":2,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"22 June 2018","order":3,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}}]}}