{"id":2554,"date":"2024-04-12T10:44:16","date_gmt":"2024-04-12T10:44:16","guid":{"rendered":"https:\/\/jita-au.com\/?p=2554"},"modified":"2024-04-29T13:33:28","modified_gmt":"2024-04-29T13:33:28","slug":"on-intrusion-detection-in-a-neighbourhood-area-network-in-the-smart-grid","status":"publish","type":"post","link":"https:\/\/jita-au.com\/index.php\/2024\/04\/12\/on-intrusion-detection-in-a-neighbourhood-area-network-in-the-smart-grid\/","title":{"rendered":"On Intrusion Detection in a Neighbourhood Area Network in the Smart Grid"},"content":{"rendered":"\t\t<div data-elementor-type=\"wp-post\" data-elementor-id=\"2554\" class=\"elementor elementor-2554\" data-elementor-settings=\"{&quot;ha_cmc_init_switcher&quot;:&quot;no&quot;}\">\n\t\t\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-e232701 elementor-section-height-min-height elementor-section-full_width elementor-hidden-tablet elementor-hidden-mobile elementor-section-height-default elementor-section-items-middle wpr-particle-no wpr-jarallax-no wpr-parallax-no wpr-sticky-section-no\" data-id=\"e232701\" data-element_type=\"section\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;,&quot;_ha_eqh_enable&quot;:false}\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-cb97594\" data-id=\"cb97594\" data-element_type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-a18c791 elementor-widget__width-inherit ha-has-bg-overlay elementor-widget elementor-widget-heading\" data-id=\"a18c791\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">Vol. 2 No. 1 (2012): JITA - APEIRON<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-b2fff26 elementor-widget elementor-widget-heading\" data-id=\"b2fff26\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\"><b>Nasim Beigi-Mohammadi, Hamzeh Khazaei, Jelena Mi\u0161i\u0107, Vojislav B. Mi\u0161i\u0107<b><\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-52044bb elementor-widget-divider--view-line elementor-widget elementor-widget-divider\" data-id=\"52044bb\" data-element_type=\"widget\" data-widget_type=\"divider.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"elementor-divider\">\n\t\t\t<span class=\"elementor-divider-separator\">\n\t\t\t\t\t\t<\/span>\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-1c82606 elementor-widget elementor-widget-heading\" data-id=\"1c82606\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">On Intrusion Detection in a Neighbourhood Area Network in the Smart Grid<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-c297c9e elementor-widget-divider--view-line elementor-widget elementor-widget-divider\" data-id=\"c297c9e\" data-element_type=\"widget\" data-widget_type=\"divider.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"elementor-divider\">\n\t\t\t<span class=\"elementor-divider-separator\">\n\t\t\t\t\t\t<\/span>\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-d78a8d5 e-grid e-con-full wpr-particle-no wpr-jarallax-no wpr-parallax-no wpr-sticky-section-no e-con e-parent\" data-id=\"d78a8d5\" data-element_type=\"container\" data-settings=\"{&quot;_ha_eqh_enable&quot;:false}\">\n\t\t\t\t<div class=\"elementor-element elementor-element-9384f2d elementor-widget__width-initial elementor-widget elementor-widget-heading\" data-id=\"9384f2d\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">Original scientific paper<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-a5fd248 elementor-widget__width-initial elementor-widget elementor-widget-heading\" data-id=\"a5fd248\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">DOI: https:\/\/doi.org\/10.7251\/JIT1201007M<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-2f3b63f elementor-align-center elementor-widget elementor-widget-button\" data-id=\"2f3b63f\" data-element_type=\"widget\" data-widget_type=\"button.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<div class=\"elementor-button-wrapper\">\n\t\t\t\t\t<a class=\"elementor-button elementor-button-link elementor-size-sm\" href=\"https:\/\/jita-au.com\/wp-content\/uploads\/2024\/04\/372-Article-Text-803-1-10-20130110.pdf\">\n\t\t\t\t\t\t<span class=\"elementor-button-content-wrapper\">\n\t\t\t\t\t\t\t\t\t<span class=\"elementor-button-text\">Download Article PDF<\/span>\n\t\t\t\t\t<\/span>\n\t\t\t\t\t<\/a>\n\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-cb7c4cb elementor-widget__width-inherit elementor-widget elementor-widget-heading\" data-id=\"cb7c4cb\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">Abstract<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-61aebe3 elementor-widget__width-inherit elementor-widget elementor-widget-text-editor\" data-id=\"61aebe3\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>Smart grid, which is an upgrade of power electric system, mainly relies on powerful communication networks to provide a secure, reliable and efficient information delivery. Updating a system as complex as the electrical power grid with a large number of components has the potential of introducing new security vulnerabilities into the system. Hence, security mechanisms should be deployed to protect the smart grid as a first wall of defence against malicious attacks. As a second wall of defence, there should be intrusion detection systems in place to protect the smart grid against any security breaches. In this work, we describe an anomaly-based intrusion detection system (IDS) for neighbourhood area network whose security is of critical importance in smart grid.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-5c5f19e elementor-widget elementor-widget-heading\" data-id=\"5c5f19e\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">Keywords: Intrusion Detection System, smart grid, Neighbourhood Area Network<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-6dd494a wpr-logo-position-center elementor-widget elementor-widget-wpr-logo\" data-id=\"6dd494a\" data-element_type=\"widget\" data-widget_type=\"wpr-logo.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\n\t\t\t<div class=\"wpr-logo elementor-clearfix\">\n\n\t\t\t\t\t\t\t\t<picture class=\"wpr-logo-image\">\n\t\t\t\t\t\n\t\t\t\t\t\t\t\t\t\t\n\t\t\t\t\t<img decoding=\"async\" src=\"https:\/\/jita-au.com\/wp-content\/uploads\/2024\/03\/cc-by-1.png\" alt=\"\">\n\n\t\t\t\t\t\t\t\t\t\t\t<a class=\"wpr-logo-url\" rel=\"home\" aria-label=\"\" href=\"https:\/\/jita-au.com\/\"><\/a>\n\t\t\t\t\t\t\t\t\t<\/picture>\n\t\t\t\t\n\t\t\t\t\n\t\t\t\t\t\t\t\t\t<a class=\"wpr-logo-url\" rel=\"home\" aria-label=\"\" href=\"https:\/\/jita-au.com\/\"><\/a>\n\t\t\t\t\n\t\t\t<\/div>\n\t\t\t\t\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-cb049d1 elementor-widget elementor-widget-shortcode\" data-id=\"cb049d1\" data-element_type=\"widget\" data-widget_type=\"shortcode.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"elementor-shortcode\"><div class=\"post-views content-post post-2554 entry-meta load-static\">\r\n\t\t\t\t<span class=\"post-views-icon dashicons dashicons-chart-bar\"><\/span> <span class=\"post-views-label\">Post Views:<\/span> <span class=\"post-views-count\">706<\/span>\r\n\t\t\t<\/div><\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-511d0df elementor-section-height-min-height elementor-section-full_width elementor-hidden-mobile elementor-hidden-desktop elementor-hidden-laptop elementor-section-height-default elementor-section-items-middle wpr-particle-no wpr-jarallax-no wpr-parallax-no wpr-sticky-section-no\" data-id=\"511d0df\" data-element_type=\"section\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;,&quot;_ha_eqh_enable&quot;:false}\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-0acee9c\" data-id=\"0acee9c\" data-element_type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-c0e98b3 elementor-widget__width-inherit ha-has-bg-overlay elementor-widget elementor-widget-heading\" data-id=\"c0e98b3\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">Vol. 26 No. 2 (2023): JITA - APEIRON<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-e6b43c5 elementor-widget elementor-widget-heading\" data-id=\"e6b43c5\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\"><strong>Igor Shubinsky, <\/strong>\n<strong> Alexey Ozerov<\/strong><\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-68f1849 elementor-widget-divider--view-line elementor-widget elementor-widget-divider\" data-id=\"68f1849\" data-element_type=\"widget\" data-widget_type=\"divider.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"elementor-divider\">\n\t\t\t<span class=\"elementor-divider-separator\">\n\t\t\t\t\t\t<\/span>\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-186a6b2 elementor-widget elementor-widget-heading\" data-id=\"186a6b2\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">Application of Artificial Intelligence Methods for the Prediction of Hazardous Failures<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-7b2f501 elementor-widget-divider--view-line elementor-widget elementor-widget-divider\" data-id=\"7b2f501\" data-element_type=\"widget\" data-widget_type=\"divider.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"elementor-divider\">\n\t\t\t<span class=\"elementor-divider-separator\">\n\t\t\t\t\t\t<\/span>\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-5027126 elementor-widget__width-initial elementor-widget elementor-widget-heading\" data-id=\"5027126\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">Original scientific paper<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-4a5312c elementor-widget__width-initial elementor-widget elementor-widget-heading\" data-id=\"4a5312c\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">DOI: <a href=\"http:\/\/localhost\/mytestingsite\/wp-content\/uploads\/2024\/02\/PVTC-Technical-Requirements.pdf\" target=\"_blank\" rel=\"noopener\">https:\/\/doi.org\/10.7251\/JIT2302061S<\/a><\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-8d7a912 elementor-align-center elementor-widget elementor-widget-button\" data-id=\"8d7a912\" data-element_type=\"widget\" data-widget_type=\"button.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<div class=\"elementor-button-wrapper\">\n\t\t\t\t\t<a class=\"elementor-button elementor-button-link elementor-size-sm\" href=\"https:\/\/jita-au.com\/wp-content\/uploads\/2024\/03\/10430-Article-Text-23890-1-10-20240103.pdf\">\n\t\t\t\t\t\t<span class=\"elementor-button-content-wrapper\">\n\t\t\t\t\t\t\t\t\t<span class=\"elementor-button-text\">Download Article PDF<\/span>\n\t\t\t\t\t<\/span>\n\t\t\t\t\t<\/a>\n\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-580ffd3 elementor-widget__width-inherit elementor-widget elementor-widget-heading\" data-id=\"580ffd3\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">Abstract<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-211717e elementor-widget__width-inherit elementor-widget elementor-widget-text-editor\" data-id=\"211717e\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>The availability of real-time data on the state of railway facilities and the state-of-the art technologies for data collection and analysis allow transition to the fourth generation maintenance. It is based on the prediction of the facility functional safety and dependability and the risk-oriented facility management. The article describes an approach to assessing the risks of hazardous facility failures using the latest digital data processing methods. The implementation of this approach will help set maintenance objectives and contribute to the efficient use of resources and the reduction of railway facility managers\u2019 expenditures.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-62b72c3 elementor-widget elementor-widget-heading\" data-id=\"62b72c3\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">Keywords: predictive analysis, maintenance, functional safety, Big Data, Data Science, risk indicators.<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-f4dcd16 wpr-logo-position-center elementor-widget elementor-widget-wpr-logo\" data-id=\"f4dcd16\" data-element_type=\"widget\" data-widget_type=\"wpr-logo.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\n\t\t\t<div class=\"wpr-logo elementor-clearfix\">\n\n\t\t\t\t\t\t\t\t<picture class=\"wpr-logo-image\">\n\t\t\t\t\t\n\t\t\t\t\t\t\t\t\t\t\n\t\t\t\t\t<img decoding=\"async\" src=\"https:\/\/jita-au.com\/wp-content\/uploads\/2024\/03\/cc-by-1.png\" alt=\"\">\n\n\t\t\t\t\t\t\t\t\t\t\t<a class=\"wpr-logo-url\" rel=\"home\" aria-label=\"\" href=\"https:\/\/jita-au.com\/\"><\/a>\n\t\t\t\t\t\t\t\t\t<\/picture>\n\t\t\t\t\n\t\t\t\t\n\t\t\t\t\t\t\t\t\t<a class=\"wpr-logo-url\" rel=\"home\" aria-label=\"\" href=\"https:\/\/jita-au.com\/\"><\/a>\n\t\t\t\t\n\t\t\t<\/div>\n\t\t\t\t\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-0f73093 elementor-widget elementor-widget-shortcode\" data-id=\"0f73093\" data-element_type=\"widget\" data-widget_type=\"shortcode.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"elementor-shortcode\"><div class=\"post-views content-post post-2554 entry-meta load-static\">\r\n\t\t\t\t<span class=\"post-views-icon dashicons dashicons-chart-bar\"><\/span> <span class=\"post-views-label\">Post Views:<\/span> <span class=\"post-views-count\">706<\/span>\r\n\t\t\t<\/div><\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-2d980b8 elementor-section-height-min-height elementor-section-full_width elementor-hidden-tablet elementor-hidden-desktop elementor-hidden-laptop elementor-section-height-default elementor-section-items-middle wpr-particle-no wpr-jarallax-no wpr-parallax-no wpr-sticky-section-no\" data-id=\"2d980b8\" data-element_type=\"section\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;,&quot;_ha_eqh_enable&quot;:false}\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-d772afa\" data-id=\"d772afa\" data-element_type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-5597455 elementor-widget__width-inherit elementor-widget-mobile__width-inherit ha-has-bg-overlay elementor-widget elementor-widget-heading\" data-id=\"5597455\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">Vol. 26 No. 2 (2023): JITA - APEIRON<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-f3e70ee elementor-widget elementor-widget-heading\" data-id=\"f3e70ee\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\"><strong>Igor Shubinsky, <\/strong>\n<strong> Alexey Ozerov<\/strong><\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-b0a72e2 elementor-widget-divider--view-line elementor-widget elementor-widget-divider\" data-id=\"b0a72e2\" data-element_type=\"widget\" data-widget_type=\"divider.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"elementor-divider\">\n\t\t\t<span class=\"elementor-divider-separator\">\n\t\t\t\t\t\t<\/span>\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-87a3678 elementor-widget elementor-widget-heading\" data-id=\"87a3678\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">Application of Artificial Intelligence Methods for the Prediction of Hazardous Failures<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-96936f4 elementor-widget-divider--view-line elementor-widget elementor-widget-divider\" data-id=\"96936f4\" data-element_type=\"widget\" data-widget_type=\"divider.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"elementor-divider\">\n\t\t\t<span class=\"elementor-divider-separator\">\n\t\t\t\t\t\t<\/span>\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-f04febc elementor-widget__width-initial elementor-widget-mobile__width-inherit elementor-widget elementor-widget-heading\" data-id=\"f04febc\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">Original scientific paper<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-389228b elementor-widget__width-initial elementor-widget-mobile__width-inherit elementor-widget elementor-widget-heading\" data-id=\"389228b\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">DOI: <a href=\"http:\/\/localhost\/mytestingsite\/wp-content\/uploads\/2024\/02\/PVTC-Technical-Requirements.pdf\" target=\"_blank\" rel=\"noopener\">https:\/\/doi.org\/10.7251\/JIT2302061S<\/a><\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-73b8917 elementor-align-center elementor-widget elementor-widget-button\" data-id=\"73b8917\" data-element_type=\"widget\" data-widget_type=\"button.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<div class=\"elementor-button-wrapper\">\n\t\t\t\t\t<a class=\"elementor-button elementor-button-link elementor-size-sm\" href=\"https:\/\/jita-au.com\/wp-content\/uploads\/2024\/03\/10430-Article-Text-23890-1-10-20240103.pdf\">\n\t\t\t\t\t\t<span class=\"elementor-button-content-wrapper\">\n\t\t\t\t\t\t\t\t\t<span class=\"elementor-button-text\">Download Article PDF<\/span>\n\t\t\t\t\t<\/span>\n\t\t\t\t\t<\/a>\n\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-80faf79 elementor-widget__width-inherit elementor-widget elementor-widget-heading\" data-id=\"80faf79\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">Abstract<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-8cefffd elementor-widget__width-inherit elementor-widget elementor-widget-text-editor\" data-id=\"8cefffd\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>The availability of real-time data on the state of railway facilities and the state-of-the art technologies for data collection and analysis allow transition to the fourth generation maintenance. It is based on the prediction of the facility functional safety and dependability and the risk-oriented facility management. The article describes an approach to assessing the risks of hazardous facility failures using the latest digital data processing methods. The implementation of this approach will help set maintenance objectives and contribute to the efficient use of resources and the reduction of railway facility managers\u2019 expenditures.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-0c5e44b elementor-widget elementor-widget-heading\" data-id=\"0c5e44b\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">Keywords: predictive analysis, maintenance, functional safety, Big Data, Data Science, risk indicators.<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-dee52ab wpr-logo-position-center elementor-widget elementor-widget-wpr-logo\" data-id=\"dee52ab\" data-element_type=\"widget\" data-widget_type=\"wpr-logo.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\n\t\t\t<div class=\"wpr-logo elementor-clearfix\">\n\n\t\t\t\t\t\t\t\t<picture class=\"wpr-logo-image\">\n\t\t\t\t\t\n\t\t\t\t\t\t\t\t\t\t\n\t\t\t\t\t<img decoding=\"async\" src=\"https:\/\/jita-au.com\/wp-content\/uploads\/2024\/03\/cc-by-1.png\" alt=\"\">\n\n\t\t\t\t\t\t\t\t\t\t\t<a class=\"wpr-logo-url\" rel=\"home\" aria-label=\"\" href=\"https:\/\/jita-au.com\/\"><\/a>\n\t\t\t\t\t\t\t\t\t<\/picture>\n\t\t\t\t\n\t\t\t\t\n\t\t\t\t\t\t\t\t\t<a class=\"wpr-logo-url\" rel=\"home\" aria-label=\"\" href=\"https:\/\/jita-au.com\/\"><\/a>\n\t\t\t\t\n\t\t\t<\/div>\n\t\t\t\t\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-5cb9871 elementor-widget elementor-widget-shortcode\" data-id=\"5cb9871\" data-element_type=\"widget\" data-widget_type=\"shortcode.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"elementor-shortcode\"><div class=\"post-views content-post post-2554 entry-meta load-static\">\r\n\t\t\t\t<span class=\"post-views-icon dashicons dashicons-chart-bar\"><\/span> <span class=\"post-views-label\">Post Views:<\/span> <span class=\"post-views-count\">706<\/span>\r\n\t\t\t<\/div><\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<\/div>\n\t\t","protected":false},"excerpt":{"rendered":"<p>Vol. 2 No. 1 (2012): JITA &#8211; APEIRON Nasim Beigi-Mohammadi, Hamzeh Khazaei, Jelena Mi\u0161i\u0107, Vojislav B. Mi\u0161i\u0107 On Intrusion Detection in a Neighbourhood Area Network in the Smart Grid Original scientific paper DOI: https:\/\/doi.org\/10.7251\/JIT1201007M Download Article PDF Abstract Smart grid, which is an upgrade of power electric system, mainly relies on powerful communication networks to provide a secure, reliable and efficient information delivery. Updating a system as complex as the electrical power grid with a large number of components has the potential of introducing new security vulnerabilities into the system. Hence, security mechanisms should be deployed to protect the smart grid as a first wall of defence against malicious attacks. As a second wall of defence, there should be intrusion detection systems in place to protect the smart grid against any security breaches. In this work, we describe an anomaly-based intrusion detection system (IDS) for neighbourhood area network whose security is of critical importance in smart grid. Keywords: Intrusion Detection System, smart grid, Neighbourhood Area Network Vol. 26 No. 2 (2023): JITA &#8211; APEIRON Igor Shubinsky, Alexey Ozerov Application of Artificial Intelligence Methods for the Prediction of Hazardous Failures Original scientific paper DOI: https:\/\/doi.org\/10.7251\/JIT2302061S Download Article PDF Abstract The availability of real-time data on the state of railway facilities and the state-of-the art technologies for data collection and analysis allow transition to the fourth generation maintenance. It is based on the prediction of the facility functional safety and dependability and the risk-oriented facility management. The article describes an approach to assessing the risks of hazardous facility failures using the latest digital data processing methods. The implementation of this approach will help set maintenance objectives and contribute to the efficient use of resources and the reduction of railway facility managers\u2019 expenditures. Keywords: predictive analysis, maintenance, functional safety, Big Data, Data Science, risk indicators. Vol. 26 No. 2 (2023): JITA &#8211; APEIRON Igor Shubinsky, Alexey Ozerov Application of Artificial Intelligence Methods for the Prediction of Hazardous Failures Original scientific paper DOI: https:\/\/doi.org\/10.7251\/JIT2302061S Download Article PDF Abstract The availability of real-time data on the state of railway facilities and the state-of-the art technologies for data collection and analysis allow transition to the fourth generation maintenance. It is based on the prediction of the facility functional safety and dependability and the risk-oriented facility management. The article describes an approach to assessing the risks of hazardous facility failures using the latest digital data processing methods. The implementation of this approach will help set maintenance objectives and contribute to the efficient use of resources and the reduction of railway facility managers\u2019 expenditures. Keywords: predictive analysis, maintenance, functional safety, Big Data, Data Science, risk indicators.<\/p>\n","protected":false},"author":1,"featured_media":534,"comment_status":"open","ping_status":"open","sticky":false,"template":"elementor_header_footer","format":"standard","meta":{"footnotes":""},"categories":[1],"tags":[],"class_list":["post-2554","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-uncategorized"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v26.8 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>On Intrusion Detection in a Neighbourhood Area Network in the Smart Grid - JITA -Journal of Information Technology and Application<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/jita-au.com\/index.php\/2024\/04\/12\/on-intrusion-detection-in-a-neighbourhood-area-network-in-the-smart-grid\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"On Intrusion Detection in a Neighbourhood Area Network in the Smart Grid - JITA -Journal of Information Technology and Application\" \/>\n<meta property=\"og:description\" content=\"Vol. 2 No. 1 (2012): JITA &#8211; APEIRON Nasim Beigi-Mohammadi, Hamzeh Khazaei, Jelena Mi\u0161i\u0107, Vojislav B. Mi\u0161i\u0107 On Intrusion Detection in a Neighbourhood Area Network in the Smart Grid Original scientific paper DOI: https:\/\/doi.org\/10.7251\/JIT1201007M Download Article PDF Abstract Smart grid, which is an upgrade of power electric system, mainly relies on powerful communication networks to provide a secure, reliable and efficient information delivery. Updating a system as complex as the electrical power grid with a large number of components has the potential of introducing new security vulnerabilities into the system. Hence, security mechanisms should be deployed to protect the smart grid as a first wall of defence against malicious attacks. As a second wall of defence, there should be intrusion detection systems in place to protect the smart grid against any security breaches. In this work, we describe an anomaly-based intrusion detection system (IDS) for neighbourhood area network whose security is of critical importance in smart grid. Keywords: Intrusion Detection System, smart grid, Neighbourhood Area Network Vol. 26 No. 2 (2023): JITA &#8211; APEIRON Igor Shubinsky, Alexey Ozerov Application of Artificial Intelligence Methods for the Prediction of Hazardous Failures Original scientific paper DOI: https:\/\/doi.org\/10.7251\/JIT2302061S Download Article PDF Abstract The availability of real-time data on the state of railway facilities and the state-of-the art technologies for data collection and analysis allow transition to the fourth generation maintenance. It is based on the prediction of the facility functional safety and dependability and the risk-oriented facility management. The article describes an approach to assessing the risks of hazardous facility failures using the latest digital data processing methods. The implementation of this approach will help set maintenance objectives and contribute to the efficient use of resources and the reduction of railway facility managers\u2019 expenditures. Keywords: predictive analysis, maintenance, functional safety, Big Data, Data Science, risk indicators. Vol. 26 No. 2 (2023): JITA &#8211; APEIRON Igor Shubinsky, Alexey Ozerov Application of Artificial Intelligence Methods for the Prediction of Hazardous Failures Original scientific paper DOI: https:\/\/doi.org\/10.7251\/JIT2302061S Download Article PDF Abstract The availability of real-time data on the state of railway facilities and the state-of-the art technologies for data collection and analysis allow transition to the fourth generation maintenance. It is based on the prediction of the facility functional safety and dependability and the risk-oriented facility management. The article describes an approach to assessing the risks of hazardous facility failures using the latest digital data processing methods. The implementation of this approach will help set maintenance objectives and contribute to the efficient use of resources and the reduction of railway facility managers\u2019 expenditures. Keywords: predictive analysis, maintenance, functional safety, Big Data, Data Science, risk indicators.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/jita-au.com\/index.php\/2024\/04\/12\/on-intrusion-detection-in-a-neighbourhood-area-network-in-the-smart-grid\/\" \/>\n<meta property=\"og:site_name\" content=\"JITA -Journal of Information Technology and Application\" \/>\n<meta property=\"article:published_time\" content=\"2024-04-12T10:44:16+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2024-04-29T13:33:28+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/jita-au.com\/wp-content\/uploads\/2024\/03\/cover_issue_949_en_US.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"595\" \/>\n\t<meta property=\"og:image:height\" content=\"793\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"admin\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"admin\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"3 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/jita-au.com\/index.php\/2024\/04\/12\/on-intrusion-detection-in-a-neighbourhood-area-network-in-the-smart-grid\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/jita-au.com\/index.php\/2024\/04\/12\/on-intrusion-detection-in-a-neighbourhood-area-network-in-the-smart-grid\/\"},\"author\":{\"name\":\"admin\",\"@id\":\"https:\/\/jita-au.com\/#\/schema\/person\/d4becda53cfcbc99c449927eabf3877f\"},\"headline\":\"On Intrusion Detection in a Neighbourhood Area Network in the Smart Grid\",\"datePublished\":\"2024-04-12T10:44:16+00:00\",\"dateModified\":\"2024-04-29T13:33:28+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/jita-au.com\/index.php\/2024\/04\/12\/on-intrusion-detection-in-a-neighbourhood-area-network-in-the-smart-grid\/\"},\"wordCount\":458,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\/\/jita-au.com\/#organization\"},\"image\":{\"@id\":\"https:\/\/jita-au.com\/index.php\/2024\/04\/12\/on-intrusion-detection-in-a-neighbourhood-area-network-in-the-smart-grid\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/jita-au.com\/wp-content\/uploads\/2024\/03\/cover_issue_949_en_US.jpg\",\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\/\/jita-au.com\/index.php\/2024\/04\/12\/on-intrusion-detection-in-a-neighbourhood-area-network-in-the-smart-grid\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/jita-au.com\/index.php\/2024\/04\/12\/on-intrusion-detection-in-a-neighbourhood-area-network-in-the-smart-grid\/\",\"url\":\"https:\/\/jita-au.com\/index.php\/2024\/04\/12\/on-intrusion-detection-in-a-neighbourhood-area-network-in-the-smart-grid\/\",\"name\":\"On Intrusion Detection in a Neighbourhood Area Network in the Smart Grid - JITA -Journal of Information Technology and Application\",\"isPartOf\":{\"@id\":\"https:\/\/jita-au.com\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/jita-au.com\/index.php\/2024\/04\/12\/on-intrusion-detection-in-a-neighbourhood-area-network-in-the-smart-grid\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/jita-au.com\/index.php\/2024\/04\/12\/on-intrusion-detection-in-a-neighbourhood-area-network-in-the-smart-grid\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/jita-au.com\/wp-content\/uploads\/2024\/03\/cover_issue_949_en_US.jpg\",\"datePublished\":\"2024-04-12T10:44:16+00:00\",\"dateModified\":\"2024-04-29T13:33:28+00:00\",\"breadcrumb\":{\"@id\":\"https:\/\/jita-au.com\/index.php\/2024\/04\/12\/on-intrusion-detection-in-a-neighbourhood-area-network-in-the-smart-grid\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/jita-au.com\/index.php\/2024\/04\/12\/on-intrusion-detection-in-a-neighbourhood-area-network-in-the-smart-grid\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/jita-au.com\/index.php\/2024\/04\/12\/on-intrusion-detection-in-a-neighbourhood-area-network-in-the-smart-grid\/#primaryimage\",\"url\":\"https:\/\/jita-au.com\/wp-content\/uploads\/2024\/03\/cover_issue_949_en_US.jpg\",\"contentUrl\":\"https:\/\/jita-au.com\/wp-content\/uploads\/2024\/03\/cover_issue_949_en_US.jpg\",\"width\":595,\"height\":793},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/jita-au.com\/index.php\/2024\/04\/12\/on-intrusion-detection-in-a-neighbourhood-area-network-in-the-smart-grid\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/jita-au.com\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"On Intrusion Detection in a Neighbourhood Area Network in the Smart Grid\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/jita-au.com\/#website\",\"url\":\"https:\/\/jita-au.com\/\",\"name\":\"JITA -Journal of Information Technology and Application\",\"description\":\"\",\"publisher\":{\"@id\":\"https:\/\/jita-au.com\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/jita-au.com\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/jita-au.com\/#organization\",\"name\":\"JITA -Journal of Information Technology and Application\",\"url\":\"https:\/\/jita-au.com\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/jita-au.com\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/jita-au.com\/wp-content\/uploads\/2024\/03\/cropped-JITA-logo-300px-1-1.jpg\",\"contentUrl\":\"https:\/\/jita-au.com\/wp-content\/uploads\/2024\/03\/cropped-JITA-logo-300px-1-1.jpg\",\"width\":300,\"height\":164,\"caption\":\"JITA -Journal of Information Technology and Application\"},\"image\":{\"@id\":\"https:\/\/jita-au.com\/#\/schema\/logo\/image\/\"}},{\"@type\":\"Person\",\"@id\":\"https:\/\/jita-au.com\/#\/schema\/person\/d4becda53cfcbc99c449927eabf3877f\",\"name\":\"admin\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/jita-au.com\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/fb1767673e75e9127846ff73b2b9e96214fba2d4675dc6799cec11e9b4380ca2?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/fb1767673e75e9127846ff73b2b9e96214fba2d4675dc6799cec11e9b4380ca2?s=96&d=mm&r=g\",\"caption\":\"admin\"},\"sameAs\":[\"https:\/\/jita-au.com\"],\"url\":\"https:\/\/jita-au.com\/index.php\/author\/jita-au-com\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"On Intrusion Detection in a Neighbourhood Area Network in the Smart Grid - JITA -Journal of Information Technology and Application","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/jita-au.com\/index.php\/2024\/04\/12\/on-intrusion-detection-in-a-neighbourhood-area-network-in-the-smart-grid\/","og_locale":"en_US","og_type":"article","og_title":"On Intrusion Detection in a Neighbourhood Area Network in the Smart Grid - JITA -Journal of Information Technology and Application","og_description":"Vol. 2 No. 1 (2012): JITA &#8211; APEIRON Nasim Beigi-Mohammadi, Hamzeh Khazaei, Jelena Mi\u0161i\u0107, Vojislav B. Mi\u0161i\u0107 On Intrusion Detection in a Neighbourhood Area Network in the Smart Grid Original scientific paper DOI: https:\/\/doi.org\/10.7251\/JIT1201007M Download Article PDF Abstract Smart grid, which is an upgrade of power electric system, mainly relies on powerful communication networks to provide a secure, reliable and efficient information delivery. Updating a system as complex as the electrical power grid with a large number of components has the potential of introducing new security vulnerabilities into the system. Hence, security mechanisms should be deployed to protect the smart grid as a first wall of defence against malicious attacks. As a second wall of defence, there should be intrusion detection systems in place to protect the smart grid against any security breaches. In this work, we describe an anomaly-based intrusion detection system (IDS) for neighbourhood area network whose security is of critical importance in smart grid. Keywords: Intrusion Detection System, smart grid, Neighbourhood Area Network Vol. 26 No. 2 (2023): JITA &#8211; APEIRON Igor Shubinsky, Alexey Ozerov Application of Artificial Intelligence Methods for the Prediction of Hazardous Failures Original scientific paper DOI: https:\/\/doi.org\/10.7251\/JIT2302061S Download Article PDF Abstract The availability of real-time data on the state of railway facilities and the state-of-the art technologies for data collection and analysis allow transition to the fourth generation maintenance. It is based on the prediction of the facility functional safety and dependability and the risk-oriented facility management. The article describes an approach to assessing the risks of hazardous facility failures using the latest digital data processing methods. The implementation of this approach will help set maintenance objectives and contribute to the efficient use of resources and the reduction of railway facility managers\u2019 expenditures. Keywords: predictive analysis, maintenance, functional safety, Big Data, Data Science, risk indicators. Vol. 26 No. 2 (2023): JITA &#8211; APEIRON Igor Shubinsky, Alexey Ozerov Application of Artificial Intelligence Methods for the Prediction of Hazardous Failures Original scientific paper DOI: https:\/\/doi.org\/10.7251\/JIT2302061S Download Article PDF Abstract The availability of real-time data on the state of railway facilities and the state-of-the art technologies for data collection and analysis allow transition to the fourth generation maintenance. It is based on the prediction of the facility functional safety and dependability and the risk-oriented facility management. The article describes an approach to assessing the risks of hazardous facility failures using the latest digital data processing methods. The implementation of this approach will help set maintenance objectives and contribute to the efficient use of resources and the reduction of railway facility managers\u2019 expenditures. Keywords: predictive analysis, maintenance, functional safety, Big Data, Data Science, risk indicators.","og_url":"https:\/\/jita-au.com\/index.php\/2024\/04\/12\/on-intrusion-detection-in-a-neighbourhood-area-network-in-the-smart-grid\/","og_site_name":"JITA -Journal of Information Technology and Application","article_published_time":"2024-04-12T10:44:16+00:00","article_modified_time":"2024-04-29T13:33:28+00:00","og_image":[{"width":595,"height":793,"url":"https:\/\/jita-au.com\/wp-content\/uploads\/2024\/03\/cover_issue_949_en_US.jpg","type":"image\/jpeg"}],"author":"admin","twitter_card":"summary_large_image","twitter_misc":{"Written by":"admin","Est. reading time":"3 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/jita-au.com\/index.php\/2024\/04\/12\/on-intrusion-detection-in-a-neighbourhood-area-network-in-the-smart-grid\/#article","isPartOf":{"@id":"https:\/\/jita-au.com\/index.php\/2024\/04\/12\/on-intrusion-detection-in-a-neighbourhood-area-network-in-the-smart-grid\/"},"author":{"name":"admin","@id":"https:\/\/jita-au.com\/#\/schema\/person\/d4becda53cfcbc99c449927eabf3877f"},"headline":"On Intrusion Detection in a Neighbourhood Area Network in the Smart Grid","datePublished":"2024-04-12T10:44:16+00:00","dateModified":"2024-04-29T13:33:28+00:00","mainEntityOfPage":{"@id":"https:\/\/jita-au.com\/index.php\/2024\/04\/12\/on-intrusion-detection-in-a-neighbourhood-area-network-in-the-smart-grid\/"},"wordCount":458,"commentCount":0,"publisher":{"@id":"https:\/\/jita-au.com\/#organization"},"image":{"@id":"https:\/\/jita-au.com\/index.php\/2024\/04\/12\/on-intrusion-detection-in-a-neighbourhood-area-network-in-the-smart-grid\/#primaryimage"},"thumbnailUrl":"https:\/\/jita-au.com\/wp-content\/uploads\/2024\/03\/cover_issue_949_en_US.jpg","inLanguage":"en-US","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/jita-au.com\/index.php\/2024\/04\/12\/on-intrusion-detection-in-a-neighbourhood-area-network-in-the-smart-grid\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/jita-au.com\/index.php\/2024\/04\/12\/on-intrusion-detection-in-a-neighbourhood-area-network-in-the-smart-grid\/","url":"https:\/\/jita-au.com\/index.php\/2024\/04\/12\/on-intrusion-detection-in-a-neighbourhood-area-network-in-the-smart-grid\/","name":"On Intrusion Detection in a Neighbourhood Area Network in the Smart Grid - JITA -Journal of Information Technology and Application","isPartOf":{"@id":"https:\/\/jita-au.com\/#website"},"primaryImageOfPage":{"@id":"https:\/\/jita-au.com\/index.php\/2024\/04\/12\/on-intrusion-detection-in-a-neighbourhood-area-network-in-the-smart-grid\/#primaryimage"},"image":{"@id":"https:\/\/jita-au.com\/index.php\/2024\/04\/12\/on-intrusion-detection-in-a-neighbourhood-area-network-in-the-smart-grid\/#primaryimage"},"thumbnailUrl":"https:\/\/jita-au.com\/wp-content\/uploads\/2024\/03\/cover_issue_949_en_US.jpg","datePublished":"2024-04-12T10:44:16+00:00","dateModified":"2024-04-29T13:33:28+00:00","breadcrumb":{"@id":"https:\/\/jita-au.com\/index.php\/2024\/04\/12\/on-intrusion-detection-in-a-neighbourhood-area-network-in-the-smart-grid\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/jita-au.com\/index.php\/2024\/04\/12\/on-intrusion-detection-in-a-neighbourhood-area-network-in-the-smart-grid\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/jita-au.com\/index.php\/2024\/04\/12\/on-intrusion-detection-in-a-neighbourhood-area-network-in-the-smart-grid\/#primaryimage","url":"https:\/\/jita-au.com\/wp-content\/uploads\/2024\/03\/cover_issue_949_en_US.jpg","contentUrl":"https:\/\/jita-au.com\/wp-content\/uploads\/2024\/03\/cover_issue_949_en_US.jpg","width":595,"height":793},{"@type":"BreadcrumbList","@id":"https:\/\/jita-au.com\/index.php\/2024\/04\/12\/on-intrusion-detection-in-a-neighbourhood-area-network-in-the-smart-grid\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/jita-au.com\/"},{"@type":"ListItem","position":2,"name":"On Intrusion Detection in a Neighbourhood Area Network in the Smart Grid"}]},{"@type":"WebSite","@id":"https:\/\/jita-au.com\/#website","url":"https:\/\/jita-au.com\/","name":"JITA -Journal of Information Technology and Application","description":"","publisher":{"@id":"https:\/\/jita-au.com\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/jita-au.com\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/jita-au.com\/#organization","name":"JITA -Journal of Information Technology and Application","url":"https:\/\/jita-au.com\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/jita-au.com\/#\/schema\/logo\/image\/","url":"https:\/\/jita-au.com\/wp-content\/uploads\/2024\/03\/cropped-JITA-logo-300px-1-1.jpg","contentUrl":"https:\/\/jita-au.com\/wp-content\/uploads\/2024\/03\/cropped-JITA-logo-300px-1-1.jpg","width":300,"height":164,"caption":"JITA -Journal of Information Technology and Application"},"image":{"@id":"https:\/\/jita-au.com\/#\/schema\/logo\/image\/"}},{"@type":"Person","@id":"https:\/\/jita-au.com\/#\/schema\/person\/d4becda53cfcbc99c449927eabf3877f","name":"admin","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/jita-au.com\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/fb1767673e75e9127846ff73b2b9e96214fba2d4675dc6799cec11e9b4380ca2?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/fb1767673e75e9127846ff73b2b9e96214fba2d4675dc6799cec11e9b4380ca2?s=96&d=mm&r=g","caption":"admin"},"sameAs":["https:\/\/jita-au.com"],"url":"https:\/\/jita-au.com\/index.php\/author\/jita-au-com\/"}]}},"_links":{"self":[{"href":"https:\/\/jita-au.com\/index.php\/wp-json\/wp\/v2\/posts\/2554","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/jita-au.com\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/jita-au.com\/index.php\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/jita-au.com\/index.php\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/jita-au.com\/index.php\/wp-json\/wp\/v2\/comments?post=2554"}],"version-history":[{"count":7,"href":"https:\/\/jita-au.com\/index.php\/wp-json\/wp\/v2\/posts\/2554\/revisions"}],"predecessor-version":[{"id":2926,"href":"https:\/\/jita-au.com\/index.php\/wp-json\/wp\/v2\/posts\/2554\/revisions\/2926"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/jita-au.com\/index.php\/wp-json\/wp\/v2\/media\/534"}],"wp:attachment":[{"href":"https:\/\/jita-au.com\/index.php\/wp-json\/wp\/v2\/media?parent=2554"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/jita-au.com\/index.php\/wp-json\/wp\/v2\/categories?post=2554"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/jita-au.com\/index.php\/wp-json\/wp\/v2\/tags?post=2554"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}