{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,7,11]],"date-time":"2025-07-11T10:31:26Z","timestamp":1752229886987,"version":"3.28.0"},"reference-count":18,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2017,5]]},"DOI":"10.23919\/acc.2017.7963366","type":"proceedings-article","created":{"date-parts":[[2017,7,10]],"date-time":"2017-07-10T21:39:58Z","timestamp":1499722798000},"page":"2739-2746","source":"Crossref","is-referenced-by-count":2,"title":["Value of intrusion detection systems for countering energy fraud"],"prefix":"10.23919","author":[{"given":"Abhishek Rajkumar","family":"Sethi","sequence":"first","affiliation":[]},{"given":"Saurabh","family":"Amin","sequence":"additional","affiliation":[]},{"given":"Galina","family":"Schwartz","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref10","doi-asserted-by":"crossref","first-page":"210","DOI":"10.1007\/978-3-642-33338-5_11","article-title":"Evaluating electricity theft detectors in smart grid networks","author":"mashima","year":"2012","journal-title":"Research in Attacks Intrusions and Defenses"},{"key":"ref11","doi-asserted-by":"crossref","first-page":"1947","DOI":"10.1016\/S1574-0005(02)03014-X","article-title":"Inspection games","volume":"3","author":"avenhaus","year":"2002","journal-title":"Handbook of Game Theory with Economic Applications"},{"doi-asserted-by":"publisher","key":"ref12","DOI":"10.2753\/MIS0742-1222250211"},{"doi-asserted-by":"publisher","key":"ref13","DOI":"10.1145\/1190195.1190198"},{"year":"2015","author":"amin","journal-title":"Game theoretic models of electricity theft detection in smart utility networks","key":"ref14"},{"key":"ref15","article-title":"Introduction to the theory of statistics","author":"boes","year":"1974","journal-title":"Series in probabili"},{"year":"2016","author":"sethi","journal-title":"Evaluating intrusion detection systems for energy diversion attacks","key":"ref16"},{"doi-asserted-by":"publisher","key":"ref17","DOI":"10.1287\/isre.1050.0041"},{"doi-asserted-by":"publisher","key":"ref18","DOI":"10.1109\/Allerton.2012.6483444"},{"year":"2014","author":"snook","journal-title":"Why its time to get tougher on energy theft","key":"ref4"},{"year":"2012","author":"krebs","journal-title":"FBI Smart Meter Hacks Likely to Spread","key":"ref3"},{"year":"2014","author":"jon","journal-title":"Making big data work Retail energy","key":"ref6"},{"year":"2012","author":"lesser","journal-title":"When Big IT Goes after Big Data on the Smart Grid","key":"ref5"},{"doi-asserted-by":"publisher","key":"ref8","DOI":"10.1109\/TPWRD.2009.2030890"},{"doi-asserted-by":"publisher","key":"ref7","DOI":"10.1109\/PSCE.2009.4840253"},{"year":"2015","author":"peeples","journal-title":"India plans 21 6 billion spend on smart grid to stop theft","key":"ref2"},{"key":"ref1","article-title":"Reducing technical and non-technical losses in the power sector","author":"antmann","year":"2009","journal-title":"World Bank Tech Rep"},{"doi-asserted-by":"publisher","key":"ref9","DOI":"10.1109\/PSCE.2011.5772466"}],"event":{"name":"2017 American Control Conference (ACC)","start":{"date-parts":[[2017,5,24]]},"location":"Seattle, WA, USA","end":{"date-parts":[[2017,5,26]]}},"container-title":["2017 American Control Conference (ACC)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/7951530\/7962914\/07963366.pdf?arnumber=7963366","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2021,6,23]],"date-time":"2021-06-23T20:01:47Z","timestamp":1624478507000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/7963366\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2017,5]]},"references-count":18,"URL":"https:\/\/doi.org\/10.23919\/acc.2017.7963366","relation":{},"subject":[],"published":{"date-parts":[[2017,5]]}}}