{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,12,29]],"date-time":"2025-12-29T19:08:42Z","timestamp":1767035322928},"reference-count":23,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2018,2]]},"DOI":"10.1109\/wf-iot.2018.8355148","type":"proceedings-article","created":{"date-parts":[[2018,5,8]],"date-time":"2018-05-08T17:25:21Z","timestamp":1525800321000},"page":"529-534","source":"Crossref","is-referenced-by-count":18,"title":["Energy theft detection in advanced metering infrastructure"],"prefix":"10.1109","author":[{"given":"Sandeep Kumar","family":"Singh","sequence":"first","affiliation":[]},{"given":"Ranjan","family":"Bose","sequence":"additional","affiliation":[]},{"given":"Anupam","family":"Joshi","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref10","first-page":"264","author":"amin","year":"2012","journal-title":"Incentives and Security in Electricity Distribution Networks"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1109\/Allerton.2012.6483444"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1109\/TPWRD.2011.2161621"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1109\/PES.2011.6039050"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1109\/TSG.2015.2425222"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1109\/PSCE.2011.5772466"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1109\/GLOCOM.2013.6831171"},{"key":"ref17","first-page":"70","author":"badrinath krishna","year":"2015","journal-title":"PCA-Based Method for Detecting Integrity Attacks on Advanced Metering Infrastructure"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1049\/iet-cps.2017.0063"},{"journal-title":"Principal Component Analysis","year":"2002","author":"jolliffe","key":"ref19"},{"journal-title":"Smart Power","year":"2017","author":"kulkarni","key":"ref4"},{"journal-title":"Smart Meters Have Security Holes","year":"2010","author":"wright","key":"ref3"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1109\/TETC.2013.2274043"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1109\/MSP.2009.76"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1109\/WTS.2011.5960892"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1109\/JSAC.2013.130714"},{"journal-title":"Smart meters can be hacked to cut power bills","year":"2014","author":"ward","key":"ref2"},{"journal-title":"India Country Report reserach development demonstration and deployment of smart grids in india","year":"2017","key":"ref1"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1109\/MCOM.2013.6400434"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1109\/TSMC.1983.6313189"},{"journal-title":"Irish Social Science Data Archive","year":"0","key":"ref22"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1109\/TII.2017.2773475"},{"key":"ref23","article-title":"Roc graphs: Notes and practical considerations for researchers","author":"fawcett","year":"2004","journal-title":"Tech Rep"}],"event":{"name":"2018 IEEE 4th World Forum on Internet of Things (WF-IoT)","start":{"date-parts":[[2018,2,5]]},"location":"Singapore","end":{"date-parts":[[2018,2,8]]}},"container-title":["2018 IEEE 4th World Forum on Internet of Things (WF-IoT)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/8353083\/8355082\/08355148.pdf?arnumber=8355148","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2018,6,1]],"date-time":"2018-06-01T14:54:25Z","timestamp":1527864865000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/8355148\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2018,2]]},"references-count":23,"URL":"https:\/\/doi.org\/10.1109\/wf-iot.2018.8355148","relation":{},"subject":[],"published":{"date-parts":[[2018,2]]}}}