{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2023,11,17]],"date-time":"2023-11-17T00:39:30Z","timestamp":1700181570026},"reference-count":53,"publisher":"Springer Science and Business Media LLC","issue":"S1","license":[{"start":{"date-parts":[[2018,10,1]],"date-time":"2018-10-01T00:00:00Z","timestamp":1538352000000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Energy Inform"],"published-print":{"date-parts":[[2018,10]]},"DOI":"10.1186\/s42162-018-0025-3","type":"journal-article","created":{"date-parts":[[2018,10,10]],"date-time":"2018-10-10T02:34:46Z","timestamp":1539138886000},"update-policy":"http:\/\/dx.doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":10,"title":["The influence of differential privacy on short term electric load forecasting"],"prefix":"10.1186","volume":"1","author":[{"ORCID":"http:\/\/orcid.org\/0000-0001-9570-5246","authenticated-orcid":false,"given":"G\u00fcnther","family":"Eibl","sequence":"first","affiliation":[]},{"ORCID":"http:\/\/orcid.org\/0000-0002-8231-4331","authenticated-orcid":false,"given":"Kaibin","family":"Bao","sequence":"additional","affiliation":[]},{"given":"Philip-William","family":"Grassal","sequence":"additional","affiliation":[]},{"given":"Daniel","family":"Bernau","sequence":"additional","affiliation":[]},{"ORCID":"http:\/\/orcid.org\/0000-0002-4295-7631","authenticated-orcid":false,"given":"Hartmut","family":"Schmeck","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2018,10,10]]},"reference":[{"key":"25_CR1","doi-asserted-by":"publisher","first-page":"118","DOI":"10.1007\/978-3-642-24178-9_9","volume-title":"Proc. of the 13th International Conference on Information Hiding (IH)","author":"G Acs","year":"2011","unstructured":"Acs, G, Castelluccia C (2011) I have a DREAM! (DiffeRentially privatE smArt Metering) In: Proc. of the 13th International Conference on Information Hiding (IH), 118\u2013132.. Springer, Berlin."},{"key":"25_CR2","unstructured":"Bundesnetzagentur (2011) Anlage zum Beschluss BK6-07-002: Marktregeln f\u00fcr die Durchf\u00fchrung der Bilanzkreisabrechnung Strom (MaBiS) in der konsolidierten Lesefassung vom 28.10.2011. https:\/\/www.bundesnetzagentur.de\/DE\/Service-Funktionen\/Beschlusskammern\/Beschlusskammer6\/BK6_31_GPKE_und_GeLiGas\/Mitteilung_Nr_31\/Anlagen\/Konsolidierte_Lesefassung_MaBiS.pdf?__blob=publicationFile&v=2 . Accessed 23 May 2018."},{"issue":"3","key":"25_CR3","doi-asserted-by":"publisher","first-page":"229","DOI":"10.1023\/A:1007682208299","volume":"40","author":"L Breiman","year":"2000","unstructured":"Breiman, L (2000) Randomizing outputs to increase prediction accuracy. Mach Learn 40(3):229\u2013242.","journal-title":"Mach Learn"},{"issue":"3","key":"25_CR4","doi-asserted-by":"publisher","first-page":"248","DOI":"10.1109\/JIOT.2015.2412552","volume":"2","author":"H Bao","year":"2015","unstructured":"Bao, H, Lu R (2015) A New Differentially Private Data Aggregation with Fault Tolerance for Smart Grid Communications. IEEE Internet of Things J 2(3):248\u2013258.","journal-title":"IEEE Internet of Things J"},{"issue":"4","key":"25_CR5","first-page":"118","volume":"2017","author":"N Buescher","year":"2017","unstructured":"Buescher, N, Boukoros S, Bauregger S, Katzenbeisser S (2017) Two Is Not Enough: Privacy Assessment of Aggregation Schemes in Smart Metering. Proc Priv Enhancing Technol 2017(4):118\u2013134.","journal-title":"Proc Priv Enhancing Technol"},{"key":"25_CR6","first-page":"225","volume-title":"IFIP Annual Conference on Data and Applications Security and Privacy","author":"J B\u00f6hler","year":"2017","unstructured":"B\u00f6hler, J, Bernau D, Kerschbaum F (2017) Privacy-preserving outlier detection for data streams In: IFIP Annual Conference on Data and Applications Security and Privacy, 225\u2013238.. Springer, Cham."},{"issue":"Supplement C","key":"25_CR7","doi-asserted-by":"publisher","first-page":"355","DOI":"10.1016\/j.ins.2016.08.011","volume":"370","author":"P Barbosa","year":"2016","unstructured":"Barbosa, P, Brito A, Almeida H (2016) A Technique to provide differential privacy for appliance usage in smart metering. J Inf Sci 370(Supplement C):355\u2013367.","journal-title":"J Inf Sci"},{"key":"25_CR8","doi-asserted-by":"publisher","first-page":"208","DOI":"10.1109\/PerCom.2014.6813962","volume-title":"Proc. of the 2014 IEEE International Conference on Pervasive Computing and Communications (PerCom)","author":"D Chen","year":"2014","unstructured":"Chen, D, Irwin D, Shenoy P, Albrecht J (2014) Combined heat and privacy: Preventing occupancy detection from smart meters In: Proc. of the 2014 IEEE International Conference on Pervasive Computing and Communications (PerCom), 208\u2013215.. IEEE, New Jersey."},{"issue":"2","key":"25_CR9","doi-asserted-by":"publisher","first-page":"364","DOI":"10.1016\/j.ijforecast.2013.07.003","volume":"30","author":"N Charlton","year":"2014","unstructured":"Charlton, N, Singleton C (2014) A refined parametric model for short term load forecasting. Int J Forecast 30(2):364\u2013368.","journal-title":"Int J Forecast"},{"key":"25_CR10","doi-asserted-by":"publisher","first-page":"65","DOI":"10.1145\/2516930.2516936","volume-title":"Proc. of the 1st ACM Workshop on Smart Energy Grid Security (SEGS)","author":"B Defend","year":"2013","unstructured":"Defend, B, Kursawe K (2013) Implementation of privacy-friendly aggregation for the smart grid In: Proc. of the 1st ACM Workshop on Smart Energy Grid Security (SEGS), 65\u201374.. ACM, New York."},{"key":"25_CR11","first-page":"1","volume-title":"Proc. of the 33rd International Colloquium on Automata, Languages and Programming (ICALP)","author":"C Dwork","year":"2006","unstructured":"Dwork, C (2006) Differential Privacy In: Proc. of the 33rd International Colloquium on Automata, Languages and Programming (ICALP), 1\u201312.. Springer, Berlin."},{"key":"25_CR12","doi-asserted-by":"publisher","first-page":"265","DOI":"10.1007\/11681878_14","volume-title":"Proc. of the 3rd Conference on Theory of Cryptography (TCC)","author":"C Dwork","year":"2006","unstructured":"Dwork, C, McSherry F, Nissim K, Smith A (2006) Calibrating noise to sensitivity in private data analysis In: Proc. of the 3rd Conference on Theory of Cryptography (TCC), 265\u2013284.. Springer, Berlin."},{"key":"25_CR13","volume-title":"Proc. of the 42nd ACM Symposium on Theory of Computing (STOC)","author":"C Dwork","year":"2010","unstructured":"Dwork, C, Naor M, Pitassi T, Rothblum GN (2010) Differential privacy under continual observation In: Proc. of the 42nd ACM Symposium on Theory of Computing (STOC).. ACM, New York."},{"key":"25_CR14","doi-asserted-by":"crossref","unstructured":"Danezis, G, Kohlweiss M, Rial A (2011) Lecture Notes in Computer Science (including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). In: Filler T, Pevny T, Craver S, Ker A (eds), 148\u2013162.. Springer, Berlin.","DOI":"10.1007\/978-3-642-24178-9_11"},{"issue":"2013","key":"25_CR15","first-page":"211","volume":"9","author":"C Dwork","year":"2014","unstructured":"Dwork, C, Roth A (2014) The Algorithmic Foundations of Differential Privacy. Found Trends Theor Comput Sci 9(2013):211\u2013407.","journal-title":"Found Trends Theor Comput Sci"},{"key":"25_CR16","unstructured":"Commission Regulation (2017) (EU) 2017\/1485 of 2 August 2017 establishing a guideline on electricity transmission system operation. Official Journal of the European Union. http:\/\/data.europa.eu\/eli\/reg\/2017\/1485\/oj . Accessed 23 May 2018."},{"key":"25_CR17","unstructured":"Commission Regulation (2017) (EU) 2017\/2195 of 23 November 2017 establishing a guideline on electricity balancing. Official Journal of the European Union. http:\/\/data.europa.eu\/eli\/reg\/2017\/1485\/oj . Accessed 23 May 2018."},{"key":"25_CR18","first-page":"854","volume-title":"Proc. of the 5th IEEE International Conference on Smart Grid Communications","author":"D Egarter","year":"2014","unstructured":"Egarter, D, Prokop C, Elmenreich W (2014) Load hiding of household\u2019s power demand In: Proc. of the 5th IEEE International Conference on Smart Grid Communications, 854\u2013859.. IEEE, New Jersey."},{"issue":"1-2","key":"25_CR19","doi-asserted-by":"publisher","first-page":"173","DOI":"10.1007\/s00450-016-0310-y","volume":"32","author":"G Eibl","year":"2017","unstructured":"Eibl, G, Engel D (2017) Differential Privacy for Real Smart Metering Data. Comput Sci Res Dev 32(1-2):173\u2013182.","journal-title":"Comput Sci Res Dev"},{"key":"25_CR20","doi-asserted-by":"crossref","first-page":"561","DOI":"10.1007\/978-3-642-31284-7_33","volume-title":"Proc. of the 10th International Conference on Applied Cryptography and Network Security (ACNS)","author":"Z Erkin","year":"2012","unstructured":"Erkin, Z, Tsudik G (2012) Private Computation of Spatial and Temporal Power Consumption with Smart Meters In: Proc. of the 10th International Conference on Applied Cryptography and Network Security (ACNS), 561\u2013577.. Springer, Berlin."},{"issue":"2","key":"25_CR21","doi-asserted-by":"publisher","first-page":"930","DOI":"10.1109\/TSG.2014.2376613","volume":"6","author":"G Eibl","year":"2015","unstructured":"Eibl, G, Engel D (2015) Influence of Data Granularity on Smart Meter Privacy. IEEE Trans Smart Grid 6(2):930\u2013939.","journal-title":"IEEE Trans Smart Grid"},{"key":"25_CR22","first-page":"652","volume-title":"Proc. of the 2014 IEEE Conf. on Computer Communications Workshops (INFOCOM)","author":"S Finster","year":"2014","unstructured":"Finster, S, Baumgart I (2014) SMART-ER: Peer-based privacy for smart metering In: Proc. of the 2014 IEEE Conf. on Computer Communications Workshops (INFOCOM), 652\u2013657.. IEEE, New Jersey."},{"issue":"5","key":"25_CR23","doi-asserted-by":"publisher","first-page":"1189","DOI":"10.1214\/aos\/1013203451","volume":"29","author":"JH Friedman","year":"2001","unstructured":"Friedman, JH (2001) Greedy function approximation: A gradient boosting machine. Ann Stat 29(5):1189\u20131232.","journal-title":"Ann Stat"},{"issue":"4","key":"25_CR24","doi-asserted-by":"publisher","first-page":"1452","DOI":"10.1109\/TIA.2009.2023569","volume":"45","author":"S Fan","year":"2009","unstructured":"Fan, S, Methaprayoon K, Lee W-J (2009) Multiregion load forecasting for system with large geographical area. IEEE Trans Ind Appl 45(4):1452\u20131459.","journal-title":"IEEE Trans Ind Appl"},{"key":"25_CR25","unstructured":"Federal Energy Regulatory Commission (2015) Energy primer, a handbook of energy market basics, 1\u2013140.. Federal Energy Regulatory Commission, Washington, DC."},{"key":"25_CR26","first-page":"226","volume-title":"Proc. of the 6th Conference on Security and Trust Management (STM)","author":"FD Garcia","year":"2010","unstructured":"Garcia, FD, Jacobs B (2010) Privacy-friendly energy-metering via homomorphic encryption In: Proc. of the 6th Conference on Security and Trust Management (STM), 226\u2013238.. Springer, Berlin."},{"issue":"3","key":"25_CR27","doi-asserted-by":"publisher","first-page":"914","DOI":"10.1016\/j.ijforecast.2015.11.011","volume":"32","author":"T Hong","year":"2016","unstructured":"Hong, T, Fan S (2016) Probabilistic electric load forecasting: A tutorial review. Int J Forecast 32(3):914\u2013938.","journal-title":"Int J Forecast"},{"key":"25_CR28","first-page":"398","volume-title":"Proceedings of the 27th IEEE Computer Security Foundations Symposium (CSF)","author":"J Hsu","year":"2014","unstructured":"Hsu, J, Gaboardi M, Haeberlen A, Khanna S, Narayan A, Pierce BC, Roth A (2014) Differential privacy: An economic method for choosing epsilon In: Proceedings of the 27th IEEE Computer Security Foundations Symposium (CSF), 398\u2013410.. IEEE, New Jersey."},{"issue":"2","key":"25_CR29","doi-asserted-by":"publisher","first-page":"357","DOI":"10.1016\/j.ijforecast.2013.07.001","volume":"30","author":"T Hong","year":"2014","unstructured":"Hong, T, Pinson P, Fan S (2014) Global energy forecasting competition 2012. Int J Forecast 30(2):357\u2013363.","journal-title":"Int J Forecast"},{"key":"25_CR30","doi-asserted-by":"publisher","first-page":"673","DOI":"10.1145\/2480362.2480491","volume-title":"Proc. of the 28th ACM Symposium on Applied Computing (SAC)","author":"D. Ili\u0107","year":"2013","unstructured":"Ili\u0107, D., da Silva PG, Karnouskos S, Jacobi M (2013) Impact assessment of smart meter grouping on the accuracy of forecasting algorithms In: Proc. of the 28th ACM Symposium on Applied Computing (SAC), 673\u2013679.. ACM, New York."},{"key":"25_CR31","doi-asserted-by":"publisher","first-page":"192","DOI":"10.1007\/978-3-642-22263-4_11","volume-title":"Privacy Enhancing Technologies Symposium","author":"M Jawurek","year":"2011","unstructured":"Jawurek, M, Johns M, Kerschbaum F (2011) Plug-in privacy for smart metering billing In: Privacy Enhancing Technologies Symposium, 192\u2013210.. Springer, Berlin."},{"key":"25_CR32","first-page":"4","volume-title":"Proc. of the 4th ACM International Conference on Systems for Energy-Efficient Built Environments. BuildSys \u201917","author":"R Jia","year":"2017","unstructured":"Jia, R, Sangogboye FC, Hong T, Spanos C, Kj\u00e6rgaard M. B. (2017) PAD: Protecting Anonymity in Publishing Building Related Datasets In: Proc. of the 4th ACM International Conference on Systems for Energy-Efficient Built Environments. BuildSys \u201917, 4\u20131410.. ACM, New York."},{"key":"25_CR33","volume-title":"Planung Von Elektroanlagen","author":"I Kasikci","year":"2013","unstructured":"Kasikci, I (2013) Planung Von Elektroanlagen. Springer, Wiesbaden."},{"key":"25_CR34","first-page":"232","volume-title":"Proc. of the 1st IEEE International Conference on Smart Grid Communications","author":"G Kalogridis","year":"2010","unstructured":"Kalogridis, G, Efthymiou C, Denic SZ, Lewis TA, Cepeda R (2010) Privacy for smart meters: Towards undetectable appliance load signatures In: Proc. of the 1st IEEE International Conference on Smart Grid Communications, 232\u2013237.. IEEE, New Jersey."},{"key":"25_CR35","doi-asserted-by":"publisher","DOI":"10.1007\/978-1-4612-0173-1","volume-title":"The Laplace Distribution and Generalizations","author":"S Kotz","year":"2001","unstructured":"Kotz, S, Kozubowski T, Podgorski K (2001) The Laplace Distribution and Generalizations. Birkh\u00e4user, Basel."},{"issue":"4","key":"25_CR36","doi-asserted-by":"publisher","first-page":"3351","DOI":"10.1109\/TSG.2016.2630803","volume":"9","author":"F Knirsch","year":"2018","unstructured":"Knirsch, F, Eibl G, Engel D (2018) Error-resilient masking approaches for privacy preserving data aggregation. IEEE Trans Smart Grid 9(4):3351\u20133361.","journal-title":"IEEE Trans Smart Grid"},{"issue":"6","key":"25_CR37","doi-asserted-by":"publisher","first-page":"4037","DOI":"10.1109\/TIT.2017.2685505","volume":"63","author":"P Kairouz","year":"2017","unstructured":"Kairouz, P, Oh S, Viswanath P (2017) The Composition Theorem for Differential Privacy. IEEE Trans Inf Theory 63(6):4037\u20134049.","journal-title":"IEEE Trans Inf Theory"},{"issue":"1","key":"25_CR38","doi-asserted-by":"publisher","first-page":"11","DOI":"10.1109\/MSP.2010.40","volume":"8","author":"MA Lisovich","year":"2010","unstructured":"Lisovich, MA, Mulligan DK, Wicker SB (2010) Inferring personal information from demand-response systems. IEEE Secur Priv 8(1):11\u201320.","journal-title":"IEEE Secur Priv"},{"key":"25_CR39","first-page":"327","volume-title":"Proc. of the 1st IEEE International Conference on Smart Grid Communications","author":"F Li","year":"2010","unstructured":"Li, F, Luo B, Liu P (2010) Secure Information Aggregation for Smart Grids Using Homomorphic Encryption In: Proc. of the 1st IEEE International Conference on Smart Grid Communications, 327\u2013332.. IEEE, NJ."},{"key":"25_CR40","doi-asserted-by":"crossref","first-page":"1041","DOI":"10.1145\/2339530.2339695","volume-title":"Proc. of the 18th ACM SIGKDD International Conference on Knowledge Discovery and Data Mining (KDD)","author":"J Lee","year":"2012","unstructured":"Lee, J, Clifton C (2012) Differential Identifiability In: Proc. of the 18th ACM SIGKDD International Conference on Knowledge Discovery and Data Mining (KDD), 1041\u20131049.. ACM, New York."},{"key":"25_CR41","first-page":"889","volume-title":"Proc. of the 2013 ACM SIGSAC Conference on Computer & Communications Security (CCS)","author":"N Li","year":"2013","unstructured":"Li, N, Qardaji W, Su D, Wu Y, Yang W (2013) Membership privacy: A unifying framework for privacy definitions In: Proc. of the 2013 ACM SIGSAC Conference on Computer & Communications Security (CCS), 889\u2013900.. ACM, New York."},{"issue":"2","key":"25_CR42","doi-asserted-by":"publisher","first-page":"369","DOI":"10.1016\/j.ijforecast.2013.07.002","volume":"30","author":"JR Lloyd","year":"2014","unstructured":"Lloyd, JR (2014) GEFCom2012 hierarchical load forecasting: Gradient boosting machines and Gaussian processes. Int J Forecast 30(2):369\u2013374.","journal-title":"Int J Forecast"},{"key":"25_CR43","doi-asserted-by":"crossref","first-page":"87","DOI":"10.1145\/2046707.2046720","volume-title":"Proceedings of the 18th ACM conference on Computer and communications security","author":"S McLaughlin","year":"2011","unstructured":"McLaughlin, S, McDaniel P, Aiello W (2011) Protecting consumer privacy from electric load monitoring In: Proceedings of the 18th ACM conference on Computer and communications security, 87\u201398.. ACM, New York."},{"issue":"3","key":"25_CR44","doi-asserted-by":"publisher","first-page":"75","DOI":"10.1109\/MSP.2009.76","volume":"7","author":"P McDaniel","year":"2009","unstructured":"McDaniel, P, McLaughlin S (2009) Security and Privacy Challenges in the Smart Grid. IEEE Secur Priv 7(3):75\u201377.","journal-title":"IEEE Secur Priv"},{"key":"25_CR45","doi-asserted-by":"publisher","first-page":"61","DOI":"10.1145\/1878431.1878446","volume-title":"Proc. of the 2nd ACM Workshop on Embedded Sensing Systems for Energy-efficiency in Building (BuildSys)","author":"A Molina-Markham","year":"2010","unstructured":"Molina-Markham, A, Shenoy P, Fu K, Cecchet E, Irwin D (2010) Private memoirs of a smart meter In: Proc. of the 2nd ACM Workshop on Embedded Sensing Systems for Energy-efficiency in Building (BuildSys), 61\u201366.. ACM, New York."},{"key":"25_CR46","unstructured":"MsbG (2016) Messstellenbetriebsgesetz vom 29. August 2016 (BGBl. I S. 2034), das durch Artikel 15 des Gesetzes vom 22. Dezember (BGBl. I S. 3106) ge\u00e4ndert worden ist. https:\/\/www.gesetze-im-internet.de\/messbg . Accessed 23 May 2018."},{"key":"25_CR47","doi-asserted-by":"publisher","first-page":"911","DOI":"10.1016\/j.renene.2015.09.003","volume":"87","author":"I Mauser","year":"2016","unstructured":"Mauser, I, M\u00fcller J, Allerding F, Schmeck H (2016) Adaptive building energy management with multiple commodities and flexible evolutionary optimization. Renew Energy 87:911\u2013921.","journal-title":"Renew Energy"},{"key":"25_CR48","first-page":"23","volume-title":"Helmholtz Portfolio Theme Large-scale Data Management and Analysis","author":"F Rigoll","year":"2017","unstructured":"Rigoll, F, Schmeck H (2017) A concept for a user-oriented energy data management system In: Helmholtz Portfolio Theme Large-scale Data Management and Analysis, 23\u201339.. KIT Scientific Publishing, Karlsruhe."},{"key":"25_CR49","doi-asserted-by":"crossref","first-page":"49","DOI":"10.1145\/2046556.2046564","volume-title":"Proc. of the 10th Annual ACM Workshop on Privacy in the Electronic Society","author":"A Rial","year":"2011","unstructured":"Rial, A, Danezis G (2011) Privacy-preserving smart metering In: Proc. of the 10th Annual ACM Workshop on Privacy in the Electronic Society, 49\u201360.. ACM, New York."},{"key":"25_CR50","doi-asserted-by":"publisher","first-page":"317","DOI":"10.1016\/j.enbuild.2018.05.007","volume":"172","author":"HN Rafsanjani","year":"2016","unstructured":"Rafsanjani, HN, Ahn CR, Chen J (2016) Linking building energy-load variations with occupants\u2019 energy-use behaviors in commercial buildings: non-intrusive occupant load monitoring (NIOLM). Energy Build 172:317\u2013327.","journal-title":"Energy Build"},{"key":"25_CR51","unstructured":"Smart Metering Project - Electricity Customer Behaviour Trial, CER (2012) 2009-2010 dataset. Commission for Energy Regulation (CER). Irish Social Science Data Archive. https:\/\/www.ucd.ie\/issda\/data\/commissionforenergyregulationcer . Accessed 11 Jan 2018."},{"key":"25_CR52","unstructured":"StromNZV (2017) Stromnetzzugangsverordnung vom 25. Juli 2005 (BGBl. I S. 2243), die zuletzt durch Artikel 1 der Verordnung vom 19. Dezember (BGBl. I S. 3988) ge\u00e4ndert worden ist. https:\/\/www.gesetze-im-internet.de\/stromnzv . Accessed 23 May 2018."},{"key":"25_CR53","unstructured":"Epe, C, Fuhrberg-Baumann J, Herbst U, Hermann M, Kreye HD, Mahn U, M\u00f6nnig R, Scherer U (2007) DistributionCode, 1\u201328.. Verband der Netzbetreiber VDN e.V. beim VDEW, Berlin."}],"container-title":["Energy Informatics"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/article\/10.1186\/s42162-018-0025-3\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1186\/s42162-018-0025-3.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1186\/s42162-018-0025-3.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,9,3]],"date-time":"2022-09-03T18:14:33Z","timestamp":1662228873000},"score":1,"resource":{"primary":{"URL":"https:\/\/energyinformatics.springeropen.com\/articles\/10.1186\/s42162-018-0025-3"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2018,10]]},"references-count":53,"journal-issue":{"issue":"S1","published-print":{"date-parts":[[2018,10]]}},"alternative-id":["25"],"URL":"https:\/\/doi.org\/10.1186\/s42162-018-0025-3","relation":{},"ISSN":["2520-8942"],"issn-type":[{"value":"2520-8942","type":"electronic"}],"subject":[],"published":{"date-parts":[[2018,10]]},"assertion":[{"value":"10 October 2018","order":1,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"The authors declare that they have no competing interests.","order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Competing interests"}}],"article-number":"48"}}