On the practicality of detecting anomalies with encrypted traffic in AMI | IEEE Conference Publication | IEEE Xplore