Research Article

An Efficient Communication Intrusion Detection Scheme in AMI Combining Feature Dimensionality Reduction and Improved LSTM

Figure 4

Communication scenario in AMI. (i) Communication network hierarchy structure in AMI. (ii) The collection environment of communication data in AMI. (iii) Protocols used in each layer of AMI.