{"title":"周边入侵者检测系统性能标准","authors":"D. Armstrong, C. Peile","doi":"10.1109/CCST.2005.1594845","DOIUrl":null,"url":null,"abstract":"This paper includes discussion of the main high level principles upon which the development of the standards is based. These are: impartiality; objectivity; reproducibility (precision by other organisations); repeatability (precision by the same tester); validity and, of course, accuracy. A comparison is made between application and technology specific based testing in order to demonstrate why the former is most suited to the PIDS performance standard. The paper then addresses the key characteristics of a PIDS (false alarm rate, detection rate, and vulnerability to defeat) and suggest how these could be assessed as part of a general evaluation methodology in order to give the end user the required level of information. Finally, an update on the progress of the drafting of the standard is given","PeriodicalId":411051,"journal":{"name":"Proceedings 39th Annual 2005 International Carnahan Conference on Security Technology","volume":"1 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"6","resultStr":"{\"title\":\"Perimeter intruder detection systems performance standard\",\"authors\":\"D. Armstrong, C. Peile\",\"doi\":\"10.1109/CCST.2005.1594845\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"This paper includes discussion of the main high level principles upon which the development of the standards is based. These are: impartiality; objectivity; reproducibility (precision by other organisations); repeatability (precision by the same tester); validity and, of course, accuracy. A comparison is made between application and technology specific based testing in order to demonstrate why the former is most suited to the PIDS performance standard. The paper then addresses the key characteristics of a PIDS (false alarm rate, detection rate, and vulnerability to defeat) and suggest how these could be assessed as part of a general evaluation methodology in order to give the end user the required level of information. Finally, an update on the progress of the drafting of the standard is given\",\"PeriodicalId\":411051,\"journal\":{\"name\":\"Proceedings 39th Annual 2005 International Carnahan Conference on Security Technology\",\"volume\":\"1 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"1900-01-01\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"6\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"Proceedings 39th Annual 2005 International Carnahan Conference on Security Technology\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1109/CCST.2005.1594845\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"Proceedings 39th Annual 2005 International Carnahan Conference on Security Technology","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/CCST.2005.1594845","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
Perimeter intruder detection systems performance standard
This paper includes discussion of the main high level principles upon which the development of the standards is based. These are: impartiality; objectivity; reproducibility (precision by other organisations); repeatability (precision by the same tester); validity and, of course, accuracy. A comparison is made between application and technology specific based testing in order to demonstrate why the former is most suited to the PIDS performance standard. The paper then addresses the key characteristics of a PIDS (false alarm rate, detection rate, and vulnerability to defeat) and suggest how these could be assessed as part of a general evaluation methodology in order to give the end user the required level of information. Finally, an update on the progress of the drafting of the standard is given