An Energy-Fraud Detection-System Capable of Distinguishing Frauds from Other Energy Flow Anomalies in an Urban Environment
Abstract
:1. Introduction
2. Materials and Methods
2.1. Proposed Architecture
2.2. System Flow Diagram—At Distinguishing Various Anomalies Level
2.3. An Ever-Learning Algorithm Flow Diagram
2.4. Group One: Energetic Distribution from Load-Profile
- The distribution is distinctive in terms of mathematical formulation between fraud and non-fraud. The right-hand side of Figure 2, representing verified non-frauds, is a sum of normal distribution, where for each distribution the maximal height is larger than the width. The height is a maximal count of bins per specific energy value or alternatively stating “energy bin value”. On the other hand, observing all verified frauds, the maximal height is smaller than the half probability width. This rule was tested for a very large count of frauds and non-frauds and is always correct. On its own, it is insufficient for reliable fraud detection. The fraud customer is “shaving the peak”. The clustering into fraud/non-fraud shall be performed using AI and not some selection rule.
- Behavior is collaborative, assuming Figure 2 is generic and that it is based on large cases count. It reflects the entire load-profile, and the litmus test is that by observation it is possible to initially mark suspects of electricity fraud versus non suspects.
- Rule 1 of suspected fraud detection is correct even without a reference of non-fraud for that same customer. A customer may start stealing from day one and disguise themselves as a low consumption customer, yet the statistical energy distribution signature cannot be tricked. There is one exception. Anomaly due to data chain fault may look similar, and that is similar to other features by other algorithms as well. It shall be shown within the paper how this may be resolved. This means that there is no requirement for reference of non-fraud from that same customer, and that is innovative as compared to most fraud-detection algorithms.
2.5. Group Two: Daily Hourly Trends Computed from Load-Profile
2.6. Group 3: Seasonal Hourly Boxplot Graphs
2.7. Group 1: Energy Distribution Feature Extraction and Construction of a High-Order Dimensional Space
2.8. Group 2: Daily Hourly Trends Distribution Feature Extraction and Construction of a High-Order Dimensional Space
2.9. Group 3: Seasonal Hourly Boxplots Extraction and Construction of a High-Order Dimensional Space
2.10. Proof of Fraud-Detection Theorems—A Mathematical Universal Foundation of Fraud-Detection Theory
- The non-fraud is farther from the planes than the frauds.
- There may be, at an N dimensional PCA, up to N fraud clusters closer to the planes.
2.11. Fraud-Detection Data Augmentation—Importance and Difference from Load Forecasting Data Augmentation
2.12. Cascading High-Order Dimensional Space, Followed by Correlation Heatmap Filter, to a Clustering AI Core
2.13. A Short Introduction into the Machine Learning Classifiers
2.14. Reduction of False Positive Rates—Sub-Algorithm for Maintenance and Cyber-Attack and Sub-Algorithm for Data Mismatch
2.14.1. Forward
2.14.2. A Specialized Sub-Algorithm for Preventive Maintenance and Cyber Intrusion Detection
2.14.3. Data Mismatch in Smart Metering Chain—Detection Sub-Algorithm
2.15. The Statistical Meaning of Ignoring or Inclusion of the Other Anomaly Phenomena—For at Least Some of Fraud Detection Algorithms
- “not data mismatch anomaly” ;
- “not preventive maintenance anomaly” ;
- “not a cyber-attack anomaly”;
- customer information: “customer not from high socio-economic status” “customer not abroad” “customer is not from town with low fraud rate” ;
- “not super consumption” ;
- “events from smart meter included”—magnetic tampering, and front-panel opening.
2.16. A Discussion as to Why Does a Linear Classifier Outperforms Non-Linear Classifiers for Some Cases
3. Results
3.1. General Results
3.2. Random Forest Classifier
3.3. Decision Tree Classifier
3.4. KNN Classifier
3.5. Logistic Regression Classifier
3.6. Ridge Classifier
3.7. Support Vector Machine (SVM) Classifier
3.8. Concluding Discussion as Regards to Which Algorithm Outperforms
3.9. Example No. 1: A Mismatch Caused Due to Incomplete Load Profile Transition between MDM Database and Data Warehouse Database
3.10. Example No. 2: A Multiplication Factor Zeroing Due to MDM Multiplication-Factor Configuration Bug
3.11. Super-Consumption: Detection of a 3rd Party Consuming Energy from an Observed Consumer
3.12. Comparative Empirical Study to Other Fraud Detection Algorithms
- Maturity stages algorithm selection: during algorithm operation, the infancy stage (20 m dataset) logistic regression is superior. In the first (200 m) and second maturity stage, RF and DT are preferable. In the second maturity stage (10,000 m dataset), CNN/LSTM may be better. RF and DT are implemented herein.
- One of the lessons learned from the current study is that the existing training datasets [31,32] are recommended to scientific community judgement, to be enhanced to include varieties of the “use cases”, reported for example by current research and by [54] or to be tagged as additional anomalies [30].
- Ignoring the above-mentioned phenomena, sending teams to the field is costly. Fraud detection departments are pragmatic; if it is unworthy, they should stop using the algorithm.
- Another conclusion is that part of the reported accuracies are of a dataset filtered out of the reported phenomena, and in field tests they might potentially become of lower accuracy. The other alternative is item 5 herein. There are non-fraud embedded samples and they are not absolutely verified as non-frauds.
- Another conclusion is that until dataset enlargement happens, it is necessary to add a field test bench on top of the training dataset validation, where a qualified fraud detection team goes out to the field in order to validate the fraud, and where emulation of fraud is set as a test for the algorithm’s correct performance. What does not work reinforces the algorithm, and the next time it shall operate more accurately.
- The last conclusion is that running on datasets without tagging of fraud cases means that there is no actual validation that the cases are fraud, verified cases show in the dataset. Taking, for example, data mismatches at a smart metering data chain.
3.13. Discussion of Other Algorithms Patterns in Light of the Mathematical Background
4. Discussion
4.1. Application of Algorithm to Fraud Detection of Individual Customer from the Distribution Transformer
4.2. Application of the Algorithm to Fraud Detection of Energy: Electricity, Water, and Gas
4.3. Application of the Algorithm to Using the Non-Validated near Real-Time Data Port for Revolutionary High Sampling Rate Fraud Detection
4.4. Addition of (Import, Export) X (Active, Reactive) Load Profile Channels
4.5. Addition of Customer Textual Data to Training Space
5. Conclusions
6. Patents
Author Contributions
Funding
Institutional Review Board Statement
Informed Consent Statement
Data Availability Statement
Conflicts of Interest
References
- Alaton, C.; Tounquet, F. Tractebel Impact ENGIE (Tractebel is the energy consultant of ENGIE. In Benchmarking Smart Metering Deployment in the EU-28 Final Report; Directorate-General for Energy (European Commission); ENGIE is a multi-national energy utility company to 28 EU countries and 48 countries worldwide); “Publications office” of the European Union: Bruxelles, Belgium.
- World Fraud Report. 2014. Available online: https://www.prnewswire.com/news-releases/world-loses-893-billion-to-electricity-theft-annually-587-billion-in-emerging-markets-300006515.html (accessed on 9 December 2014).
- CEER Council of European Energy Regulators Report on Power Losses; CEER – Council of European Energy Regulators: Bruxelles, Belgium, 2014.
- Smith, T.B. Electricity theft: A comparative analysis. Energy Policy 2004, 32, 2067–2076. [Google Scholar] [CrossRef]
- Ayub, N.; Aurangzeb, K.; Awais, M.; Ali, U. Electricity Theft Detection using CNN-GRU and Manta Ray Foraging Optimization Algorithm. In Proceedings of the 2020 IEEE 23rd International Multitopic Conference (INMIC), Bahawalpur, Pakistan, 5–7 November 2020. [Google Scholar] [CrossRef]
- Tanveer, A.; Chen, H.; Wang, J.; Guo, Y. Review of various modeling techniques for the detection of electricity theft in smart grid environment. Renew. Sustain. Energy Rev. 2018, 82 Pt 3, 2916–2933. [Google Scholar]
- Ullah, A.; Javaid, N.; Samuel, O.; Imran, M.; Shoaib, M. CNN and GRU based Deep Neural Network for Electricity Theft Detection to Secure Smart Grid. In Proceedings of the 2020 International Wireless Communications and Mobile Computing (IWCMC), Limassol, Cyprus, 15–19 June 2020; pp. 1598–1602. [Google Scholar] [CrossRef]
- Hasan, M.N.; Toma, R.N.; Nahid, A.-A.; Islam, M. M M.; Kim, J.-M. Electricity Theft Detection in Smart Grid Systems: A CNN-LSTM Based Approach. Energies 2019, 12, 3310. [Google Scholar] [CrossRef] [Green Version]
- Choi, Y.; Lim, H.; Choi, H.; Kim, I. GAN-Based Anomaly Detection and Localization of Multivariate Time Series Data for Power Plant. In Proceedings of the 2020 IEEE International Conference on Big Data and Smart Computing (Big Comp), Busan, Korea, 19–22 February 2020; pp. 71–74. [Google Scholar] [CrossRef]
- Korba, A.A.; Karabadji, N.E.I. Smart Grid Energy Fraud Detection Using SVM. In Proceedings of the 2019 International Conference on Networking and Advanced Systems (ICNAS), Annaba, Algeria, 26–27 June 2019. [Google Scholar] [CrossRef]
- Wang, H.; Li, Z.; Zhao, H.; Yue, Y. Research on Abnormal Power Consumption Detection Technology Based on Decision Tree and Improved SVM. In Proceedings of the 2020 IEEE International Conference on Mechatronics and Automation (ICMA), Beijing, China, 13–16 October 2020; pp. 1687–1691. [Google Scholar] [CrossRef]
- Kocaman, B.; Tümen, V. Detection of electricity theft using data processing and LSTM method in distribution systems. Sādhanā 2020, 45, 286. [Google Scholar] [CrossRef]
- Aldegheishem, A.; Anwar, M.; Javaid, N.; Alrajeh, N.; Shafiq, M.; Ahmed, H. Towards Sustainable Energy Efficiency with Intelligent Electricity Theft Detection in Smart Grids Emphasising Enhanced Neural Networks. IEEE Access 2021, 9, 25036–25061. [Google Scholar] [CrossRef]
- Lemaître, G.; Nogueira, F.; Aridas, C.K. Imbalanced-learn: A python toolbox to tackle the curse of imbalanced datasets in machine learning. J. Mach. Learn. Res. 2017, 18, 559–563. [Google Scholar]
- Ford, V.; Siraj, A.; Eberle, W. Smart Grid Energy Fraud Detection Using Artificial Neural Networks. In Proceedings of the 2014 IEEE Symposium on Computational Intelligence Applications in Smart Grid, Orlando, FL, USA, 9–12 December 2014. [Google Scholar]
- Jindal, A.; Dua, A.; Kaur, K.; Singh, M.; Kumar, N.; Mishra, S. Decision tree and svm-based data analytics for theft detection in smart grid. IEEE Trans. Ind. Inform. 2016, 12, 1005–1016. [Google Scholar] [CrossRef]
- Zheng, Z.; Yang, Y.; Niu, X.; Dai, H.; Zhou, Y. Wide and Deep Convolutional Neural Networks for Electricity-Theft Detection to Secure Smart Grids. IEEE Trans. Ind. Inform. 2018, 14, 1606–1615. [Google Scholar] [CrossRef]
- Li, S.; Han, Y.; Yao, X.; Yingchen, S.; Wang, J.; Zhao, Q. Electricity Theft Detection in Power Grids with Deep Learning and Random Forests. J. Electr. Comput. Eng. 2019, 2019, 4136874. [Google Scholar] [CrossRef]
- Fan, C.; Xiao, F.; Zhao, Y.; Wang, J. Analytical investigation of autoencoder-based methods for unsupervised anomaly detection in building energy data. Appl. Energy 2018, 211, 1123–1135. [Google Scholar] [CrossRef]
- Meira, J.A.; Glauner, P.; State, R.; Valtchev, P.; Dolberg, L.; Bettinger, F.; Duarte, D. Distilling provider-independent data for general detection of non-technical losses. In Proceedings of the 2017 IEEE Power and Energy Conference at Illinois (PECI), Champaign, IL, USA, 23–24 February 2017. [Google Scholar]
- Messinis, G.M.; Hatziargyriou, N.D. Review of non-technical loss detection methods. Electr. Power Syst. Res. 2018, 158, 250–266. [Google Scholar] [CrossRef]
- Gul, H.; Javaid, N.; Ullah, I.; Qamar, A.M.; Afzal, M.K.; Joshi, G.P. Detection of Non-Technical Losses using SOSTLink and Bidirectional Gated Recurrent Unit to Secure Smart Meters. Appl. Sci. 2020, 10, 3151. [Google Scholar] [CrossRef]
- Bracewell, R.N. The Fourier Transform and Its Applications, 2nd ed.; McGraw-Hill: New York, NY, USA, 1986. [Google Scholar]
- Mohebbi, H.R.; Majedi, A.H. Analysis of Series-Connected Discrete Josephson Transmission Line. IEEE Trans. Microw. Theory Tech. 2009, 57, 1865–1873. [Google Scholar] [CrossRef]
- Singer, S.; Ozeri, S.; Shmilovitz, D. A pure realization of Loss-Free Resistor. IEEE Trans. Circuits Syst. I Regul. Pap. 2004, 51, 1639–1647. [Google Scholar] [CrossRef]
- Shmilovitz, D. Gyrator realization based on a capacitive switched cell. IEEE Trans. Circuits Syst. II 2006, 53, 1418–1422. [Google Scholar] [CrossRef]
- Anwar, A.; Mahmood, A.N. Anomaly detection in electric network database of smart grid: Graph matching approach. Electr. Power Syst. Res. 2016, 133, 51–62. [Google Scholar] [CrossRef]
- Fenza, G.; Gallo, M.; Loia, V. Drift-aware methodology for anomaly detection in smart grid. IEEE Access 2019, 7, 9645–9657. [Google Scholar] [CrossRef]
- Buja, A.; Hastie, T.; Tibshirani, R. Linear Smoothers and Additive Models. Ann. Stat. 1989, 17, 453–555. [Google Scholar] [CrossRef]
- Calamaro, N.; Ofir, A.; Shmilovitz, D. Application of Enhanced CPC for Load Identification, Preventive Maintenance and Grid Interpretation. Energies 2021, 14, 3275. [Google Scholar] [CrossRef]
- Irish Social Science Data Archive. Available online: https://www.ucd.ie/issda/data/commissionforenergyregulationcer/ (accessed on 30 September 2020).
- NREL Eastern Wind Data Set. Available online: https://www.nrel.gov/grid/eastern-wind-data.html (accessed on 31 March 2010).
- Spear, M.E. Charting Statistics; McGraw Hill: New-York, NY, USA, 1952; p. 166. [Google Scholar]
- Spear, M.E. Practical Charting Techniques; McGraw-Hill: New York, NY, USA, 1969. [Google Scholar]
- Wickham, H.; Stryjewski, L. Technical Report 2011: 40 Years of Boxplots. 2011. [Google Scholar]
- Reynolds, D. Gaussian Mixture Models. In Encyclopedia of Biometrics; Springer Science: New York, NY, USA, 2009; pp. 659–663. [Google Scholar]
- Friedman, J.; Hastie, T.; Tibshirani, R. The Elements of Statistical Learning; Springer Series in Statistics; Springer: New York, NY, USA, 2001; Volume 1. [Google Scholar]
- Itzykson, C.; Drouffe, J.M. From Brownian motion to renormalization and lattice gauge theory Cambridge. In Statistical Field Theory; Cambridge University Press: Cambridge, UK, 1989; Volume 1. [Google Scholar]
- Smith, L.I. A Tutorial on principal components analysis. Cornell Univ. USA 2002, 51, 52. [Google Scholar]
- Matej, K.; Aleš, L. Multivariate online kernel density estimation. In Computer Vision Winter Workshop; Czech Pattern Recognition Society: Czech Republic, 2010; pp. 77–86. [Google Scholar]
- Patel, H.; Prajapati, P. Study and Analysis of Decision Tree Based Classification Algorithms. Int. J. Comput. Sci. Eng. 2018, 6, 74–78. [Google Scholar] [CrossRef]
- Kotsiantis, S.B. Bagging and boosting variants for handling classifications problems: A survey. In The Knowledge Engineering Review; Cambridge University Press: Cambridge, UK, 2014; Volume 29, pp. 78–100. [Google Scholar] [CrossRef]
- Sutton, O. University Lectures: Introduction to K Nearest Neighbor Classification and Condensed Nearest Neighbor Data Reduction; University of Leicester: Leicester, UK, 2012. [Google Scholar]
- Jordan, A.Y. On discriminative versus generative classifiers: A comparison of logistic regression and naive Bayes. Adv. Neural Inform. Process. Syst. 2001, 14, 605–610. [Google Scholar]
- Van Wieringen, W.N. Lecture notes on ridge regression. arXiv 2015, arXiv:1509.09169, last revised 31 May 2021. 1–129. [Google Scholar]
- Mountrakis, G.; Im, J.; Ogole, C. Support vector machines in remote sensing: A review. ISPRS J. Photogramm. Remote. Sens. 2011, 66, 247–259. [Google Scholar] [CrossRef]
- Glauner, P.; Meira, J.A.; Valtchev, P.; Bettinger, F. The challenge of non-technical loss detection using artificial intelligence: A survey. Int. J. Comput. Intell. Syst. 2017, 10, 760–775. [Google Scholar] [CrossRef] [Green Version]
- Wood, S.N.; Pya, N.; Saefken, B. Smoothing parameter and model selection for general smooth models (with discussion). J. Am. Stat. Assoc. 2016, 111, 1548–1575. [Google Scholar] [CrossRef]
- Shafi, A. What Is a Generalized Additive Model? Towards Datascience Portal. Available online: https://towardsdatascience.com/generalised-additive-models-6dfbedf1350a (accessed on 16 May 2021).
- Baader, G.; Krcmar, H. Reducing false positives in fraud detection: Combining the red flag approach with process mining. Int. J. Account. Inf. Syst. 2018, 31, 1–16. [Google Scholar] [CrossRef]
- Powers, D.M.W. Evaluation: From Precision, Recall and F-Measure to ROC, Informedness, Markedness & Correlation. J. Mach. Learn. Technol. 2011, 2, 37–63. [Google Scholar]
- Khan, Z.A.; Adil, M.; Javaid, N.; Saqib, M.N.; Shafiq, M.; Choi, J.-G. Electricity Theft Detection Using Supervised Learning Techniques on Smart Meter Data. Sustainability 2020, 12, 8023. [Google Scholar] [CrossRef]
- Huang, J.-T.; Li, J.; Gong, Y. An analysis of convolutional neural networks for speech recognition. In Proceedings of the 2015 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP), South Brisbane, QLD, Australia, 19–24 April 2015; pp. 4989–4993. [Google Scholar]
- Abdel-Hamid, O.; Mohamed, A.; Jiang, H.; Deng, L.; Penn, G.; Yu, D. Convolutional Neural Networks for Speech Recognition, IEEE/ACM Trans. Audio. Speech Lang. Process. 2014, 22, 1533–1545. [Google Scholar] [CrossRef] [Green Version]
- Glover, J.D.; Sarma, M.S. Power System Analysis and Design; Brooks/Cole Thomson Learning: Boston, MA, USA, 2002. [Google Scholar]
- Li, J.; Wang, F. Non-Technical Loss Detection in Power Grids with Statistical Profile Images Based on Semi-Supervised Learning. Sensors 2020, 20, 236. [Google Scholar] [CrossRef] [PubMed] [Green Version]
- Saadat, H. Power System Analysis; McGraw-Hill: Singapore, 2004. [Google Scholar]
- Duman, U.; Güvenç, Y.; Sönmes, N. Yörükerenc, “optimal power flow using gravitational search algorithm”. Energ. Convers. Manag. 2012, 59, 86–95. [Google Scholar] [CrossRef]
Classifier Type | References | Linearity | Comments |
---|---|---|---|
Random forest | [39,41,42] | Non-linear | Known as bootstrap bagging |
Decision tree | [39,42] | Non-linear | |
The k-nearest neighbors (KNN) | [39,42,43] | Non-linear | |
Logistic regression | [39,42,44] | Linear | More correctly known as generalized additive model |
Ridge | [39,42,45] | Non-linear | Non-linear enhancement to linear classifier Known as Tikhonov regularization |
Support Vector Machine | [39,42,46] | Non-linear |
Fraud 1 | Non-Fraud 1 | |||||||
---|---|---|---|---|---|---|---|---|
Model | Accuracy Macro, weighted | Precision | f1-Score | Recall | Accuracy | Precision | f1-Score | Recall |
Proposed SVM + HDS 2 | 0.81 | 0.81 | 0.5 | 0.33 | 0.81 | 0.62 | 0.77 | 1 |
Proposed Ridge + HDS | 0.81 0.8 | 1 | 0.55 | 0.33 | 0.81 0.8 | 0.81 | 0.77 | 1 |
Proposed KNN + HDS | 0.88 | 1 | 0.800 | 0.67 | 0.88 | 0.77 | 0.67 | 1 |
Proposed RF + HDS | 0.92 0.91 | 1 | 0.88 | 0.78 | 0.92 0.91 | 0.83 | 0.91 | 1 |
Proposed DT + HDS | 0.95 0.95 | 1 | 0.94 | 0.89 | 0.95 0.95 | 0.91 | 0.95 | 1 |
Proposed LR + HDS | 1 1 | 1 | 1 | 1 | 1 1 | 1 | 1 | 1 |
Wide & deep CNN [17] | 0.9503 | 0.9503 | 0.9093 | -- 3 | -- | -- | -- | -- |
SVM w/o preprocess | 0.772 | 0.765 | 0.863 | -- | -- | -- | -- | -- |
LR without preprocess | 0.676 | 0.645 | 0.937 | -- | -- | -- | -- | -- |
CNN | 0.812 | 0.805 | 0.845 | -- | -- | -- | -- | -- |
RUSBoost 4 | 0.869 | 0.85 | 0.871 | -- | -- | -- | -- | -- |
CNN+Work [52] with preprocessing and supervised learning | 0.95 | 0.93 | 0.937 | -- | -- | -- | -- | -- |
Non-Fraud | Fraud | |||
---|---|---|---|---|
Index→ Model↓ | 1,1 | 1,2 | 2,1 | 2,2 |
Proposed SVM + HDS 1 | 3 | 6 | 0 | 10 |
Proposed Ridge + HDS | 3 | 6 | 0 | 10 |
Proposed KNN + HDS | 6 | 3 | 0 | 10 |
Proposed RF + HDS | 7 | 2 | 0 | 10 |
Proposed DT + HDS | 8 | 1 | 0 | 10 |
Proposed LR + HDS | 9 | 0 | 0 | 10 |
No | Scenario | Description |
---|---|---|
1 | fraud from the supplier | customer is stealing electricity from supplier |
2 | third party customer connected to larger neighboring consumer | larger consumer is unaware of paying the bill |
3 | PV of customer | At night PV gradually stops generating energy and self-consumption is from the supplier |
4 | A customer with second active cycle at night | A factory with two shifts |
Model | Accuracy (Theft/NON-theft Avg) | Precision (Theft/Non-Theft Avg) | f1-Score (Theft/Non-Theft Avg) | Separation of Data Mismatches Anomaly- Reported Yes/No 3 | Separation of Preventive Maintenance Anomaly—Reported Yes/No | Separation of Cyber-Attack Anomaly—Reported Yes/No | Reported Super Consumption Identification and Separation (Yes/No) |
---|---|---|---|---|---|---|---|
Proposed SVM + HDS 2 | 0.81 | 0.81 | yes | yes | yes | yes | |
Proposed Ridge + HDS | data | yes | yes | yes | yes | ||
Proposed KNN + HDS | 0.84 | 0.885 | 0.835 | yes | yes | yes | yes |
Proposed RF + HDS | 0.89 | 0.915 | 0.89 | yes | yes | yes | yes |
Proposed DT + HDS | 0.95 | 0.955 | 0.945 | yes | yes | yes | yes |
Proposed DT + HDS | 0.95 | 0.955 | 0.945 | yes | yes | yes | yes |
Proposed LR + HDS | 1 | 1 | 1 | yes | yes | yes | yes |
Wide & deep CNN [17] | 0.9503 | 0.9503 | 0.9093 | no | no | no | no |
SVM w/o preprocess | 0.772 | 0.765 | 0.863 | no | no | no | no |
LR without preprocess | 0.676 | 0.645 | 0.937 | no | no | no | no |
CNN | 0.812 | 0.805 | 0.845 | no | no | no | no |
RUSBoost | 0.869 | 0.85 | 0.871 | no | no | no | no |
Work [52] with preprocessing and supervised learning | 0.95 | 0.93 | 0.937 | no | no | no | no |
Type of Anomaly that Is Non-Fraud to Be Classified as Separate | Description |
---|---|
Mismatch at smart metering data chain | Data mismatch |
Preventive maintenance alert | Anomaly due to failing equipment |
Cyber-attack alert | Anomaly due to cyber-attack |
Super-consumption | Anomaly due to one of Table 1 events |
Customer textual data | Statistical data as to customer: geographic location, socio-economic information (such as consumption), abroad/not-abroad |
Publisher’s Note: MDPI stays neutral with regard to jurisdictional claims in published maps and institutional affiliations. |
© 2021 by the authors. Licensee MDPI, Basel, Switzerland. This article is an open access article distributed under the terms and conditions of the Creative Commons Attribution (CC BY) license (https://creativecommons.org/licenses/by/4.0/).
Share and Cite
Calamaro, N.; Beck, Y.; Ben Melech, R.; Shmilovitz, D. An Energy-Fraud Detection-System Capable of Distinguishing Frauds from Other Energy Flow Anomalies in an Urban Environment. Sustainability 2021, 13, 10696. https://doi.org/10.3390/su131910696
Calamaro N, Beck Y, Ben Melech R, Shmilovitz D. An Energy-Fraud Detection-System Capable of Distinguishing Frauds from Other Energy Flow Anomalies in an Urban Environment. Sustainability. 2021; 13(19):10696. https://doi.org/10.3390/su131910696
Chicago/Turabian StyleCalamaro, Netzah, Yuval Beck, Ran Ben Melech, and Doron Shmilovitz. 2021. "An Energy-Fraud Detection-System Capable of Distinguishing Frauds from Other Energy Flow Anomalies in an Urban Environment" Sustainability 13, no. 19: 10696. https://doi.org/10.3390/su131910696
APA StyleCalamaro, N., Beck, Y., Ben Melech, R., & Shmilovitz, D. (2021). An Energy-Fraud Detection-System Capable of Distinguishing Frauds from Other Energy Flow Anomalies in an Urban Environment. Sustainability, 13(19), 10696. https://doi.org/10.3390/su131910696