"AMI threats, intrusion detection requirements and deployment recommendations."

David Grochocki et al. (2012)
a service of Schloss Dagstuhl - Leibniz Center for Informatics