<!DOCTYPE article PUBLIC "-//NLM//DTD JATS (Z39.96) Journal Archiving and Interchange DTD v1.0 20120330//EN" "JATS-archivearticle1.dtd">
<article xmlns:xlink="http://www.w3.org/1999/xlink">
  <front>
    <journal-meta>
      <journal-title-group>
        <journal-title>AT</journal-title>
      </journal-title-group>
    </journal-meta>
    <article-meta>
      <title-group>
        <article-title>Detection of Collusive Behavior in Energy Markets ?</article-title>
      </title-group>
      <contrib-group>
        <contrib contrib-type="author">
          <string-name>Radu-Casian Mihailescu</string-name>
          <xref ref-type="aff" rid="aff0">0</xref>
        </contrib>
        <contrib contrib-type="author">
          <string-name>Matteo Vasirani</string-name>
          <xref ref-type="aff" rid="aff0">0</xref>
        </contrib>
        <contrib contrib-type="author">
          <string-name>Sascha Ossowski</string-name>
          <xref ref-type="aff" rid="aff0">0</xref>
        </contrib>
        <aff id="aff0">
          <label>0</label>
          <institution>Rey Juan Carlos University Centre for Intelligent Information Technologies Madrid</institution>
          ,
          <country country="ES">Spain</country>
        </aff>
      </contrib-group>
      <pub-date>
        <year>2012</year>
      </pub-date>
      <volume>15</volume>
      <fpage>15</fpage>
      <lpage>16</lpage>
      <abstract>
        <p>Fundamental changes in the electrical energy sector are drawing on serious implications. One key arising challenge regards current energy markets, which are undergoing a transformation towards accommodating a more decentralized and sustainable provision of energy. As the number of traders in the market is increasing steadily and the trading activities are becoming more complex, the energy markets are becoming more exposed to potential fraud. In this paper we address the problem of detecting collusive behavior, where a group of individual traders act together, inconsistently with the competitive model, to arti cially manipulate the market and elicit illegal pro ts. We investigate collusion attacks in the energy market and propose a novel mechanism, showing the e ectiveness and practical applicability of our method to real scenarios.</p>
      </abstract>
    </article-meta>
  </front>
  <body>
    <sec id="sec-1">
      <title>Introduction</title>
      <p>Market surveillance represents a serious challenge and it refers broadly to the
detection of abnormal market behaviors, which are known to be predominant
especially in the emerging markets. In practice, an e cient way for in uencing
the market and gaining illegal pro ts is represented by the class of
collusionbased malpractices. Conceptually, collusive behavior represents an attempt of
a group of individual traders, that act together, to arti cially manipulate the
market (e.g. through price or market share) for maximizing their gains, in a
manner inconsistent with a competitive model and in detriment to the other
participants in the market.</p>
      <p>
        While collusion has been reported in various market domains, the damages
discovered were averaged at about a 25% increase in costs incurred by costumers
[
        <xref ref-type="bibr" rid="ref6">6</xref>
        ]. Unfortunately, most of the collusion cases that have been discovered thus far
came as a result of investigations triggered not through economic analysis, but
rather due to customers' complaints or suspicious competition complaints (e.g.
stainless steel industry, graphite electrodes, facsimile paper).
      </p>
      <p>Though there are many ways in which collusion could be discovered, we
address in this work collusion detection via the analysis of economic data, freely
available in the market. The set of laws that regulate the market require
continuous surveillance of trading activities. This can essentially be achieved either
through online or o ine surveillance. The former is constrained to analysing
short-term data as well as being restricted to a limited time-window, thus being
prone to overlooking occurrences of more complex types of fraud. Alternatively,
o ine techniques can encompass a wider spectrum of illegal trading strategies,
while having an anticipatory or retroactive character. Obviously though, both
approaches remain dependent on the amount of input data available.</p>
      <p>
        In this paper, we propose an e ective o ine method to identify collusive
groups with respect to the domain of energy markets, which are being reoriented
towards replacing the traditional top-down energy supply with a decentralized,
market-oriented provision [
        <xref ref-type="bibr" rid="ref10 ref7 ref8">10, 7, 8</xref>
        ].
      </p>
      <p>This paper is organized as follows: in Section 2 we provide a survey of some
related work. Section 3 introduces our novel mechanism and discusses how to
apply it to detect collusive behavior in the energy market. In Section 4 we
show the experimental results. Finally, Section 5 concludes the paper and points
directions for future work.
2</p>
    </sec>
    <sec id="sec-2">
      <title>Related Work and Energy Markets</title>
      <p>Emerging nancial markets are inherently exposed to malpractices, whereas a
subset of traders collaborate tacitly to manipulate the market for maximizing
their individual gains. In the course of the last years, new challenges in the
Electricity Market have come to the forefront, due to the transformations occurring
in the power supply infrastructure. As new distributed energy resources (DERs:
e.g. wind plants, photovoltaics, combined heat and power units) are pervading
the electricity grid, they provide for an increasing number of participants in the
market. This trend has driven the liberalization of electricity markets and the
creation of power exchanges with the emphasis on decentralized power provision.</p>
      <p>More formally, the participants in the market, consumers and suppliers of
power, can be denoted by the market agent set A = fa1; : : : ; ang, which exists
in a bijective relationship with the set of devices D = fd1; : : : ; dng connected to
the grid. The day-ahead market is discretized over a nonempty and nite set of
distinct and successive time periods T = ft1; : : : ; tmg. Under this setting, a bid
of agent ai timestamped at tmpij is represented by the function bij : T ! R R,
specifying respectively, for time slot ti, the amount of electricity requested or
o ered and the intended price per unit, as bij (ti) = (vj ; pj ). To summarize the
trading activity for agent ai at trading day tmpij we associate the time-series
Xij = fbij (t1); : : : ; bij (tm)g, which captures the existing bids for each time-slot in
T , else being considered a null bid.</p>
      <p>
        Several approaches have attempted to automate the process of collusion
detection based on economic data. A common method would be to apply supervised
learning techniques, given that proven fraudulent activities, previously detected,
could be obtained. Of course such datasets for training are not usually available
in signi cant amount. Thus, some work has looked into unsupervised learning,
namely using graph clustering algorithms. In [
        <xref ref-type="bibr" rid="ref4">4</xref>
        ], the collusive marker that the
authors base their detection mechanism on, addresses circular trading, where a
group of market agents are trading heavily among themselves aiming to raise the
price of their shares. A Markov clustering algorithm is introduced and applied to
the stock ow graph, which summarizes a trading database. In [
        <xref ref-type="bibr" rid="ref9">9</xref>
        ], the authors
have adopted cross trading as a collusive marker and compared the performance
of di erent o -the-shelf clustering algorithms. A similar approach is introduced
in [
        <xref ref-type="bibr" rid="ref2">2</xref>
        ], by means of employing a spectral clustering method.
      </p>
      <p>In this paper we address the phenomenon of collusion in the emerging
energy markets where the collusive markers identi ed above do not hold, as novel
domain driven markers need to be derived.
3</p>
    </sec>
    <sec id="sec-3">
      <title>Collusion Detection Methodology</title>
      <p>To start with, for discovering collusion in a market we need to be speci c
as to what behavioral patterns, that might be indicative of collusion, we will be
looking for.</p>
      <p>Our goal is to detect the presence of colluders that are coordinating their
behavior at the expense of the rest of the market participants, by adopting a
behavior inconsistent with what a competitive environment might entail. In this
work, the collusive marker that we investigate in order to provide evidence of
economic collusion consists of detecting colluders in the energy market based on
the similar trading behaviors of agents. Colluders can generally be di erentiated
by similar trading patterns (which also depart from competition), as opposed to
those outside their coalition. Thus, within a coalition of colluders their trading
behavior should exhibit correlations when they should normally be independent.</p>
      <p>Consequently, we design our collusion detection method as a two-stage
process: a screening phase and a veri cation phase, as depicted in the diagram of
Fig 1. The screening phase has the role of performing a triage through the order
record of the market and identifying a set of market agents that are worthy of
closer scrutiny. Due to the combinatorial explosion of possible colluder subsets
and the data-intensive analysis, this phase is ought to output a set of candidates
that will be further addressed during the veri cation phase.</p>
      <p>Speci cally, the screening phase is testing each market agent, looking for
structural breaks in its behavior. Such behavioral breakpoint could be
associated with the formation of a coalition of colluders (or with its dissolution). We
approach this by running a change-point analysis (CPA) over the discretized
order record of each market agent. If any behavioral breakpoints, which may be
conductive to colluding coalitions, have been identi ed, they will represent the
input for the second phase. Obviously such behavioral changes could be expected
even when no collusion takes place. During veri cation we are essentially looking
at two aspects: i) whether there is a price or volume correlation between the
candidates' breakpoint and ii) if there appears inconsistencies with the competitive
model.</p>
      <p>While this methodology preserves a broad outlook into the realm of collusion
detection in nancial markets in general, further approaches can be directly
derived for di erent contexts based upon the available data of the speci c markets
and agents. Additional domain-speci c insights (see case study in Section 4.2),
such as inferring estimates of costs, may ease the distinction between collusion
and competition.
3.1</p>
      <p>
        CPA based Behavioral Screening Phase
This section demonstrates the potential usefulness of change-point analysis
techniques for detection of colluding behavior in Energy markets. The approach
undertaken in this paper falls under the class of nonparametric change point
detection methods [
        <xref ref-type="bibr" rid="ref1">1</xref>
        ], that do not rely on pre-speci ed parametric models and
thus avoid strong model assumptions.
      </p>
      <p>Change-point detection is the problem of discovering time points at which
properties of time-series data change. Suppose that X = fx1; : : : ; xng is a
sequence of independent random variables, such that the rst r observations
XA = fx1A; : : : ; xrAg are distributed as FA and the remaining observations XB =
fx1B; : : : ; xB</p>
      <p>n rg come from another unknown distribution FB, where FA 6= FB.
Hence, integer r is called change point. Representing the trading activity of each
market agent ai 2 A in terms of time-series enables us to perform a change-point
analysis (Algorithm 1).</p>
      <p>So, when a behavioral breakpoint occurs this corresponds to a step change
of the mean value of X at r from to + , where represents the minimum
increase of the mean value of X. Then, the deviation from the average may
indicate that a collusion attack is being launched, if the cumulative deviation is
noticeably higher than the random uctuations, lower-bounded by .</p>
      <p>
        A popular method based on a recursive nonparametric change point detection
scheme uses a combination of cumulative sum charts (CUSUM) and
bootstrapping to detect the changes [
        <xref ref-type="bibr" rid="ref5">5</xref>
        ]. The analysis begins with the construction of
the CUSUM chart by calculating and plotting a cumulative sum, based on the
timeseries data X.
      </p>
      <p>The cumulative sums can be recursively de ned using a new sequence fSng:
Sn = Sn 1 + (xj
S0 = 0</p>
      <p>X)
where by X we denote the mean of the sample:</p>
      <p>Pn
X = i=1 xi (2)</p>
      <p>n</p>
      <p>Thus, the cumulative sum series can be obtained iteratively by adding to the
previous sum the di erence between a current value and the sample mean. This
means that the sequence fSng always ends at zero ( Sn = 0), as the di erences
computed at each iteration sum to zero. Based on these remarks a CUSUM chart
can be interpreted as follows. An upward slope of the chart indicates that the
corresponding values tend to be above the overall mean of the sample, while a
downward slope indicates a period of time where the values tend to be below.
When a sudden turn occurs this indicates that around this time, the mean has
shifted, which represents a potential changepoint. Likewise, a relatively straight
CUSUM represents a period where the average did not change.</p>
      <p>In order to associate a con dence level with a changepoint occurrence, a
bootstrap analysis can be performed. To start with, a number of bootstrap samples
are generated by sampling without replacement, which essentially is a random
reordering of the original sample values. Thus, considering the initial sample
X of size n, a bootstrapping sample at iteration i will be obtained by
permuting without replacing k elements, generating Xki = fx1; xi2; : : : ; xing. For each
i
of these samples, the bootstrap CUSUM is computed similarly. Moreover, for
each sample we need to determine the maximum, minimum and di erence of the
bootstrap CUSUM denoted respectively as Smiax = j=m0;1a;x:::;nSj , Smiinj=0m;1i;n:::;nSj
and Sdiiff = Smiax Smiin. A bootstrap analysis consists of performing a large
number of bootstraps and counting the number of bootstraps for which Sdiiff is
less than Sdiff of the initial sample. Let N be the number of bootstrap samples
performed. Then, the probability of a changepoint occurrence for a xed point
r is given by:</p>
      <p>Pr =
#fj : Sdiiff
(3)</p>
      <p>The bootstrapping technique basically compares the Sdiff value of the
original data with the Sdiiff values from a number of bootstrap samples, which
estimate how much Sdiff would vary if no change took place and checks whether
these results are consistent. It is clear that a better estimate can be obtained
by increasing the number of bootstrap samples, however statistically signi cant
result can typically be obtained for a reasonable number of generations.</p>
      <p>Now, if a changepoint has been detected, in order to determine when the
change has occurred, di erent estimators can be employed. A straightforward
approach would be to determine the changepoint r as the point furthest from
zero in the CUSUM chart:
j Sr j= argmax j Si j</p>
      <p>i=0;1;:::;n</p>
      <p>The point r estimates last point before the change occurred, while the point
r + 1 estimates the rst point after the change.</p>
      <p>Alternatively, the changepoint occurrence can be estimated by applying the
mean square error estimator (MSE). The idea behind this estimator is that of
partitioning the data in two sequences X1 = fx1; : : : ; xrg and X2 = fxr+1; : : : ; xng
and estimating the mean of each sequence and compare this against the initial
data:</p>
      <p>M SE(r) =</p>
      <p>r
X(xi
i=1</p>
      <p>X1)2 +
n
X (xi
i=r+1</p>
      <p>X2)2
where X1 =</p>
      <p>Pir=1 xi and X2 =
r</p>
      <p>Pin=r+1 xi .</p>
      <p>n r
(4)
(5)
Algorithm 1: Change point analysis</p>
      <p>Data: Xn, N , k,
Result: changepoint r (if any)
S0 0;
for i</p>
      <p>Si
1 to n do
Si 1 + (xi</p>
      <p>X) ;
end
for j 1 to N do
generate bootstrap sample Xkj , S0</p>
      <p>j
for i 1 to n do</p>
      <p>Sij Sij 1 + (xij Xj );
end</p>
      <p>0;
1 to N do
j
Sdiff = Smjax</p>
      <p>j
if Sdiff</p>
      <p>cnt
else
end</p>
      <p>Sdiff then
cnt + 1;</p>
      <p>Smjin, cnt</p>
      <p>0;
end
for j
else
end
end
P = cnt</p>
      <p>N
if P 1 then</p>
      <p>apply estimator to determine changepoint r
3.2</p>
      <p>Veri cation Phase for Collusive Coalitions
Now, having identi ed a candidate set of potential colluders, which allows to
narrow our search space, we proceed to the second phase. Here, the focus is on
detecting correlations between any members of the candidate set, resulting in a
coalition structure1. Considering two timeseries X = fx1; x2; : : : xng and Y =
fy1; y2; : : : yng representing the trading activities of agents ax and ay respectively,
we are interested to capture linear dependencies between the two variables: X
and Y . As a measure of similarity, we evaluate the covariance, which determines
how X and Y vary together:</p>
      <p>i=1
where x is the sample mean of the X values and y is the sample mean of the
Y values. The covariance measure ranges from 1 for perfectly correlated results,
1 If all members of the candidate set show correlations we refer to this as the grand
colluding coalition, while no correlations corresponds to the empty set.</p>
      <p>n
Cov(X; Y ) = 1 X(x(i)
n
x)(y(i)
y)
(6)
through 0 when there is no relation between X and Y , to -1 when the results
are perfectly correlated negatively.</p>
      <p>More generally, if we consider k variables we can construct the covariance
matrix (k k), where an element (i; j) represents the covariance between the ith
and jth variables. Removing the dependence of the covariance on the ranges of
the variables can be done by standardization, dividing the result by the standard
deviations of X and Y . The result is the correlation coe cient between X and
Y :
(X; Y ) =</p>
      <p>Pn
i=1(x(i)
x)(y(i)</p>
      <p>y)
Pn
i=1(x(i)
x)2 Pn
i=1(x(i)
x)2
1=2
(7)</p>
      <p>Algorithm 2 summarizes the veri cation phase according to the computations
previously detailed.</p>
      <p>Algorithm 2: Collusion detection</p>
      <p>Data: order record set O from one trading day discretize over a xed
time slot sequence = ft1; : : : ; tkg; set of market agents</p>
      <p>A = fa1; : : : ; ang
Result: collusion candidate set C = fS1; : : : ; Slg
C ;;
for each market agent ai do
extract order record Xi associated to agents ai from O
run change point analysis for given Xi
if probability of change point occurrence 95% then</p>
      <p>C C [ ai;
determine change point r with estimator ;
else
end
generating covariance matrix for elements ai 2 C , l = 1;
for i 1 to sizeof(C) do
for j i to sizeof(C) do</p>
      <p>M (i; j) Cov(Xi; Yi);
if M (i; j) 1 then</p>
      <p>Sl fai; aj g;
if ai Sk or aj Sk then</p>
      <p>append Sl to Sk;
end
else
l l + 1;
append Sl to C;
else
end
end
end</p>
    </sec>
    <sec id="sec-4">
      <title>Experimental results</title>
      <p>Data preparation
Prior to running our collusion detection mechanism, the dataset needs to undergo
a pre-processing phase. As discussed in Section 2, we retain from the order record
of the Energy Market, for every agent, a time-series for each day consisting of
their bids, with respect to the prede ned time-slots T of the day-ahead market.
Therefore, agent ai is characterized at day j by Xij = fbij (t1); : : : ; bij (tm)g.</p>
      <p>Now, in order to run a meaningful change-point analysis over this data,
detecting relevant behavioral breakpoints, we need to span the investigation over
a time-window of several days. Moreover, we need to relate the agents' trading
patterns to the temporal organization of the day-ahead market, T . Speci cally,
let's assume a time-window of length l days and a xed discretization of the
day-ahead market T = ft1; : : : ; tmg. This requires constructing for each agent ai
the set of time-series Xki = fb1(tk); : : : ; bl(tk)g, k = 1; m. Next, recall that a bid,
bij (ti) = (vj ; pj ), from an energy supplier consists of the amount of electricity
offered and the intended price per unit. This further implies that for each Xki there
corresponds a time-series denoting price Pki = fp1(tk); : : : ; pl(tk)g and another
for the intended trading volume Vki = fv1(tk); : : : ; vl(tk)g. This representation
of the data is used during the screening phase for generating the collusion
candidate set, as well as during the veri cation phase for detecting price or volume
correlations.
4.2</p>
      <p>
        Case study
In this section we report on results2 obtained from applying our model to
real datasets, collected from the Philippine Wholesale Electricity Spot Market
(WESM) [
        <xref ref-type="bibr" rid="ref3">3</xref>
        ]. We ran the analysis on the Market Bids submitted by the trading
participants over a one month time-window (January 2012), for the Luzon
region. The list of registered WESM market participants consists of 60 members;
prices are listed in Pesos per MWh; the nominated energy quantity is given in
MW.
      </p>
      <p>We proceed with the screening phase by conducting an exhaustive
changepoint analysis over the bid records of each market participant. Table 1
summarizes the results obtained at this stage, outlining the colluding candidate set as
input for the following phase. For the given scenario we have generated 1000
bootstrap samples for each run of the algorithm. The results indicate that out of
the total number of market agents, behavioral breakpoints have been detected
for 10 agents, some of which exhibiting multiple ones. An illustration of this
process is given in Figure 2 for market agent a6. Figure 2a is a representation
2 We remind the reader that the analysis of economic data only, has the role of
discovering suspicious behavior and is not meant to provide conclusive evidence of
collusion, nor substitute antitrust authorities, but rather to provide supporting
evidence and triggers for deciding whether antitrust authorities should actively engage
and further pursue such an investigation.</p>
      <p>Fig. 2. a) Plot of the trading activity P16 corresponding to market agent a6 for January
2012. b) The associated CUSUM chart for the time-series of market agent a6.
of a6's trading activity during the speci ed time-window. The result of
performing the screening analysis over this data, using the MSE estimator, detects the
occurrence of one change-point timestamped at day 24. The con dence level
associated, indicates a 100% accuracy. In Figure 2b we plot the corresponding
CUSUM chart, highlighting a sudden shift in the average, associated with the
change-point detection. Generally, it is not the case that change-points can be
readily detected visually from the time series plot. A CUSUM chart however,
can facilitate pinpointing shifts in the mean of the data, by identifying slope
changes at the points where a change has occurred.</p>
      <p>Next, the mechanism proceeds with the veri cation phase. As previously
detailed, for the designated candidate set, generated during screening, we
investigate further correlations between the market agents' trading patterns. This
phase yields the covariance matrix, a representation of which is given in Figure 3.
Here, we perform an exhaustive pairwise comparison of the candidate set. White
squares denote a perfect correlation between the respective market agents, while
black stands for no similarities. The color shading inbetween is indicative of the
correlation strength. Finally, according to Algorithm 2 the coalition structure of
colluders is determined. For the considered scenario, the coalition structure of
potential colluders consists of solely one group: CS = ffa1; a5; a6; a7; a10gg. For
privacy concerns, we omit other direct reference to the suspected colluders. Note
that the particular choice of the value of the correlation coe cient threshold
is ought to impact the number of resulting colluders. One one hand, higher
thresholds imply a higher level of con dence for the collusion detection process,
but on the other hand it may as well reduce the number of possible suspects,
disregarding certain abnormal trading behaviors. Alternatively, lower thresholds
may result in including false colluders to the coalition structure and therefore
reducing the accuracy of the mechanism. In this context, selecting a reliable
correlation coe cient threshold is an important issue for the overall performance
of the mechanism, which we plan to address in future work. Speci cally, we
intend to calibrate the system based on already proven cases of collusion and
use such scenarios as training data. In addition to this, we plan to extend the
model to integrate details regarding the devices D, which are controlled by the
market agents A, such as DER type and geographical location. Adding this
domain-dependent dimension is ought to provide further insight into di
erentiating between correlations that may come as a result of external conditions (e.g.
weather conditions) and those that are irrespective to this regard.
5</p>
    </sec>
    <sec id="sec-5">
      <title>Conclusions</title>
      <p>In this paper we have addressed the challenge of detecting collusive traders
that collaborate illegally to increase their bene ts at the expense of the other
market participants. We have pose this question in the domain of the emerging
energy markets, that are adapting to the integration of a diversity of distributed
energy generators. Such contexts are especially susceptible to various trading
malpractices.</p>
      <p>The proposed method for discovering colluders consists of two phases. Firstly
we apply a screening phase that performs a change-point analysis in order to
detect behavioral breakpoint in the traders' activities, proposing a reduced
candidate set of possible colluders. Secondly, for the denominated group we run
a veri cation phase aimed at revealing behavioral correlations. The procedure
determines a potential coalition structure of colluders. We evaluate our
mechanism on real datasets and show the e ectiveness and practical applicability of our
method, even for scenarios that are exploiting a minimal amount of data, that
is freely available on the market. Continuing along these lines, future work will
further investigate and exploit other collusive markers that may expose potential
vulnerabilities in the energy market.</p>
    </sec>
  </body>
  <back>
    <ref-list>
      <ref id="ref1">
        <mixed-citation>
          1.
          <string-name>
            <surname>Boris</surname>
            <given-names>E.</given-names>
          </string-name>
          <string-name>
            <surname>Brodsky</surname>
            and
            <given-names>Boris S.</given-names>
          </string-name>
          <string-name>
            <surname>Darkhovsky</surname>
          </string-name>
          . Nonparametric Methods in ChangePoint Problems. Kluwer Academic Publishers,
          <year>1993</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref2">
        <mixed-citation>
          2.
          <string-name>
            <given-names>Markus</given-names>
            <surname>Franke</surname>
          </string-name>
          , Bettina Hoser, and
          <string-name>
            <given-names>Jan</given-names>
            <surname>Schrder</surname>
          </string-name>
          .
          <article-title>On the analysis of irregular stock market trading behavior</article-title>
          . In Christine Preisach, Hans Burkhardt, Lars SchmidtThieme, and Reinhold Decker, editors,
          <source>Data Analysis, Machine Learning and Applications</source>
          , Studies in Classi cation,
          <source>Data Analysis, and Knowledge Organization</source>
          , pages
          <volume>355</volume>
          {
          <fpage>362</fpage>
          . Springer Berlin Heidelberg,
          <year>2008</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref3">
        <mixed-citation>
          3.
          <string-name>
            <given-names>The</given-names>
            <surname>Philippine Wholesale Electricity Spot Market</surname>
          </string-name>
          (WESM): http://www.wesm.
          <source>ph/.</source>
        </mixed-citation>
      </ref>
      <ref id="ref4">
        <mixed-citation>
          4.
          <string-name>
            <given-names>M.N.</given-names>
            <surname>Islam</surname>
          </string-name>
          ,
          <string-name>
            <given-names>S.M.R.</given-names>
            <surname>Haque</surname>
          </string-name>
          ,
          <string-name>
            <surname>K.M. Alam</surname>
            , and
            <given-names>M.</given-names>
          </string-name>
          <string-name>
            <surname>Tarikuzzaman</surname>
          </string-name>
          .
          <article-title>An approach to improve collusion set detection using mcl algorithm</article-title>
          .
          <source>In Computers and Information Technology</source>
          ,
          <year>2009</year>
          . ICCIT '
          <volume>09</volume>
          . 12th International Conference on, pages
          <volume>237</volume>
          {242, dec.
          <year>2009</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref5">
        <mixed-citation>
          5.
          <string-name>
            <given-names>Antoch</given-names>
            <surname>Jaromir</surname>
          </string-name>
          , Hukov Marie, and
          <string-name>
            <given-names>Veraverbeke</given-names>
            <surname>Noel</surname>
          </string-name>
          .
          <article-title>Change-point problem and bootstrap</article-title>
          .
          <source>Journal of Nonparametric Statistics</source>
          ,
          <volume>5</volume>
          (
          <issue>2</issue>
          ):
          <volume>123</volume>
          {
          <fpage>144</fpage>
          ,
          <year>1995</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref6">
        <mixed-citation>
          6.
          <string-name>
            <surname>Robert</surname>
            <given-names>H.</given-names>
          </string-name>
          <string-name>
            <surname>Lande and John M. Connor</surname>
          </string-name>
          .
          <article-title>How High Do Cartels Raise Prices? Implications for Reform of the Antitrust Sentencing Guidelines</article-title>
          . SSRN eLibrary.
        </mixed-citation>
      </ref>
      <ref id="ref7">
        <mixed-citation>
          7.
          <string-name>
            <surname>R.-C. Mihailescu</surname>
            ,
            <given-names>M.</given-names>
          </string-name>
          <string-name>
            <surname>Vasirani</surname>
            , and
            <given-names>S.</given-names>
          </string-name>
          <string-name>
            <surname>Ossowski</surname>
          </string-name>
          .
          <article-title>Towards agent-based virtual power stations via multi-level coalition formation</article-title>
          .
          <source>In Proceedings of the International Workshop on Agent Technologies for Energy Systems</source>
          , pages
          <fpage>107</fpage>
          {
          <fpage>108</fpage>
          ,
          <year>2010</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref8">
        <mixed-citation>
          8.
          <string-name>
            <surname>Radu-Casian</surname>
            <given-names>Mihailescu</given-names>
          </string-name>
          , Matteo Vasirani, and
          <string-name>
            <given-names>Sascha</given-names>
            <surname>Ossowski</surname>
          </string-name>
          .
          <article-title>Dynamic coalition adaptation for e cient agent-based virtual power plants</article-title>
          .
          <source>In Proceedings of the 9th German ConferenceMultiagent System Technologies</source>
          , MATES.
        </mixed-citation>
      </ref>
      <ref id="ref9">
        <mixed-citation>
          9.
          <string-name>
            <given-names>Girish</given-names>
            <surname>Keshav Palshikar and Manoj M. Apte</surname>
          </string-name>
          .
          <article-title>Collusion set detection using graph clustering</article-title>
          .
          <source>Data Min. Knowl. Discov.</source>
          ,
          <volume>16</volume>
          :
          <fpage>135</fpage>
          {
          <fpage>164</fpage>
          ,
          <string-name>
            <surname>April</surname>
          </string-name>
          <year>2008</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref10">
        <mixed-citation>
          10.
          <string-name>
            <surname>Sarvapali</surname>
            <given-names>Ramchurn</given-names>
          </string-name>
          , Perukrishnen Vytelingum, Alex Rogers, and
          <string-name>
            <given-names>Nick</given-names>
            <surname>Jennings</surname>
          </string-name>
          .
          <article-title>Putting the "smarts" into the smart grid: A grand challenge for arti cial intelligence</article-title>
          .
          <source>Communications of the ACM</source>
          ,
          <year>2012</year>
          .
        </mixed-citation>
      </ref>
    </ref-list>
  </back>
</article>