{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,27]],"date-time":"2026-02-27T09:00:29Z","timestamp":1772182829117,"version":"3.50.1"},"reference-count":12,"publisher":"IBM","issue":"1","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["IBM J. Res. &amp; Dev."],"published-print":{"date-parts":[[2016,1]]},"DOI":"10.1147\/jrd.2015.2503988","type":"journal-article","created":{"date-parts":[[2016,1,18]],"date-time":"2016-01-18T16:15:51Z","timestamp":1453133751000},"page":"11:1-11:13","source":"Crossref","is-referenced-by-count":6,"title":["Analytics for understanding customer behavior in the energy and utility industry"],"prefix":"10.1147","volume":"60","author":[{"given":"Y.","family":"Kim","sequence":"first","affiliation":[]},{"given":"A.","family":"Aravkin","sequence":"additional","affiliation":[]},{"given":"H.","family":"Fei","sequence":"additional","affiliation":[]},{"given":"A.","family":"Zondervan","sequence":"additional","affiliation":[]},{"given":"M.","family":"Wolf","sequence":"additional","affiliation":[]}],"member":"3082","reference":[{"key":"ref4","author":"hayes","year":"1998","journal-title":"Measuring customer satisfaction Survey design and statistical analysis methods"},{"key":"ref3","first-page":"1","article-title":"Overview of German grid issues and retrofit of photovoltaic power plants in Germany for the prevention of frequency stability problems in abnormal system conditions of the ENTSO-E region continental Europe","author":"boemer","year":"0","journal-title":"Proc 1st Int Workshop Integr Solar Power Into Power Syst"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1287\/mksc.13.3.203"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1023\/A:1018628609742"},{"key":"ref11","doi-asserted-by":"crossref","first-page":"176","DOI":"10.1007\/978-3-642-14379-3_15","article-title":"Energy theft in the advanced metering infrastructure","volume":"6027","author":"mclaughlin","year":"2010","journal-title":"Critical Information Infrastructures Security"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1016\/j.eswa.2007.12.002"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1016\/0377-2217(84)90282-0"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1007\/BF00337288"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.4324\/9780203451519"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1109\/59.260926"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1109\/TNN.2005.845141"},{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1109\/MPAE.2003.1192026"}],"container-title":["IBM Journal of Research and Development"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/5288520\/7384400\/07384570.pdf?arnumber=7384570","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,10,20]],"date-time":"2025-10-20T17:55:12Z","timestamp":1760982912000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/7384570\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2016,1]]},"references-count":12,"journal-issue":{"issue":"1"},"URL":"https:\/\/doi.org\/10.1147\/jrd.2015.2503988","relation":{},"ISSN":["0018-8646","0018-8646"],"issn-type":[{"value":"0018-8646","type":"print"},{"value":"0018-8646","type":"electronic"}],"subject":[],"published":{"date-parts":[[2016,1]]}}}