AMETHYST: automatic alarm assessment: operational experience
The aim of the AMETHYST (Automatic Event Authentication Systems) project is to encourage the development of a high-performance perimeter detection system by using video assessment to enhance the Perimeter Intrusion Detection System (PIDS). AMETHYST will automatically assess the cause of all PIDS ala...
Saved in:
Published in | 2000 34th Annual IEEE International Carnahan Conference on Security Technology pp. 107 - 112 |
---|---|
Main Authors | , , |
Format | Conference Proceeding |
Language | English |
Published |
IEEE
2000
|
Subjects | |
Online Access | Get full text |
ISBN | 9780780359659 0780359658 |
DOI | 10.1109/CCST.2000.891175 |
Cover
Loading…
Abstract | The aim of the AMETHYST (Automatic Event Authentication Systems) project is to encourage the development of a high-performance perimeter detection system by using video assessment to enhance the Perimeter Intrusion Detection System (PIDS). AMETHYST will automatically assess the cause of all PIDS alarms and pass to an operator only those alarms that are likely to be caused by an intruder. It will therefore filter out alarms that are not likely to have a human cause. |
---|---|
AbstractList | The aim of the AMETHYST (Automatic Event Authentication Systems) project is to encourage the development of a high-performance perimeter detection system by using video assessment to enhance the Perimeter Intrusion Detection System (PIDS). AMETHYST will automatically assess the cause of all PIDS alarms and pass to an operator only those alarms that are likely to be caused by an intruder. It will therefore filter out alarms that are not likely to have a human cause. |
Author | Leach, G. O'Dwyer, T. Horner, M. |
Author_xml | – sequence: 1 givenname: M. surname: Horner fullname: Horner, M. organization: Police Sci. Dev. Branch, Home Office, Horsham, UK – sequence: 2 givenname: G. surname: Leach fullname: Leach, G. – sequence: 3 givenname: T. surname: O'Dwyer fullname: O'Dwyer, T. |
BookMark | eNotj01Lw0AURQdUUGv24mr-QOJ7mZlMprgpobVCxUWzcVVekjcQyUfJRNB_b6DChcPlwIV7L66HcWAhHhESRHDPRXEskxQAktwhWnMlImdzWKKMy4y7FVEIX4sHbbQFfSdeNu_bcv95LNeSvuexp7mtJXU09ZJC4BB6Hua1HM88LWocqJP8s5SWh5ofxI2nLnD0z5Uod9uy2MeHj9e3YnOIWwQ9x6S89Z4I6jz1jWGFqbMZUm7JUV1liFnlFZNWrmkQGzagwYPjymLNWq3E02W2ZebTeWp7mn5Pl4fqDzccSG4 |
ContentType | Conference Proceeding |
DBID | 6IE 6IH CBEJK RIE RIO |
DOI | 10.1109/CCST.2000.891175 |
DatabaseName | IEEE Electronic Library (IEL) Conference Proceedings IEEE Proceedings Order Plan (POP) 1998-present by volume IEEE Xplore All Conference Proceedings IEEE Electronic Library (IEL) IEEE Proceedings Order Plans (POP) 1998-present |
DatabaseTitleList | |
Database_xml | – sequence: 1 dbid: RIE name: IEEE Electronic Library (IEL) url: https://proxy.k.utb.cz/login?url=https://ieeexplore.ieee.org/ sourceTypes: Publisher |
DeliveryMethod | fulltext_linktorsrc |
Discipline | Engineering |
EndPage | 112 |
ExternalDocumentID | 891175 |
GroupedDBID | 6IE 6IH 6IK 6IL AAJGR AAVQY AAWTH ALMA_UNASSIGNED_HOLDINGS BEFXN BFFAM BGNUA BKEBE BPEOZ CBEJK OCL RIE RIL RIO |
ID | FETCH-LOGICAL-i104t-a3f7ffaa0c82fd5e3129761a87a9acb6116bf3ea439dd11de5040f09eb71ce43 |
IEDL.DBID | RIE |
ISBN | 9780780359659 0780359658 |
IngestDate | Tue Aug 26 18:24:50 EDT 2025 |
IsPeerReviewed | false |
IsScholarly | false |
Language | English |
LinkModel | DirectLink |
MergedId | FETCHMERGED-LOGICAL-i104t-a3f7ffaa0c82fd5e3129761a87a9acb6116bf3ea439dd11de5040f09eb71ce43 |
PageCount | 6 |
ParticipantIDs | ieee_primary_891175 |
PublicationCentury | 2000 |
PublicationDate | 20000000 |
PublicationDateYYYYMMDD | 2000-01-01 |
PublicationDate_xml | – year: 2000 text: 20000000 |
PublicationDecade | 2000 |
PublicationTitle | 2000 34th Annual IEEE International Carnahan Conference on Security Technology |
PublicationTitleAbbrev | CCST |
PublicationYear | 2000 |
Publisher | IEEE |
Publisher_xml | – name: IEEE |
SSID | ssj0000454704 |
Score | 1.2759207 |
Snippet | The aim of the AMETHYST (Automatic Event Authentication Systems) project is to encourage the development of a high-performance perimeter detection system by... |
SourceID | ieee |
SourceType | Publisher |
StartPage | 107 |
SubjectTerms | Authentication Cameras Data security Event detection Filters Humans Intrusion detection Production systems Prototypes Vehicles |
Title | AMETHYST: automatic alarm assessment: operational experience |
URI | https://ieeexplore.ieee.org/document/891175 |
hasFullText | 1 |
inHoldings | 1 |
isFullTextHit | |
isPrint | |
link | http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwjZ3PS8MwFMeD86QXdU78TQ5e2zVr2qTDi4yNIUyEVZin8dK-gIjrmO3Fv94k7eoPPHhreighIf2-95LvJ4TcKGVUQEqTm5hw1-Mc0AMeCU_JIBwwZYEftqA_e4inT_x-ES0azrbzwiCiO3yGvn10e_l5kVW2VNaXiQVLdkjH5G21Vastp1iSnAi4S8ylxdIZZW34Ott2st2lDJL-aDRPnUvFr7_5424VJy2Tg9qz_e6IhPZEyatflcrPPn7xGv_Z60PS-_Lw0cdWnY7IDq66ZP8bfvCY3N7Nxun0eZ4OKVRl4eCtFEyq-0ahBXYOabHGTVMypNiSkXsknYzT0dRrblPwXkzKVXoQaqE1QJDJgc4jDI3Si5iBFJBAZmaFxUqHCCZCyXPGcozM-tZBgkqwDHl4QnZXxQpPCZUyiUFmPAeIzS9AgeAR0xYEZ8I5zfIz0rWjsFzXvIxlPQDnf769IHu1ud0WNS7Jbrmp8MrIfKmu3QR_Am9louA |
linkProvider | IEEE |
linkToHtml | http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwjZ3PT4MwFMcbnQf1os4Zf8vBK4yOAmXxYpYtqNtiMkzmaXmF18QYt2XCxb_etjD8EQ_eKAfStCnf9177_ZSQayGUCnCuchMV7tqMAdrA_NAW3PU6VGjghy7oj8ZB_MTup_604mwbLwwimsNn6OhHs5efLdJCl8raPNJgyU2ypWSfRaVZqy6oaJZc6DKTmnMNplPaWhF21u1ovU_pRu1eb5IYn4pTfvXH7SpGXAZ7pWv73TAJ9ZmSV6fIhZN-_CI2_rPf-6T15eKzHmt9OiAbOG-S3W8AwkNyczvqJ_HzJOlaUOQLg2-1QCW7bxbUyM6utVjiqioaWlizkVskGfSTXmxX9ynYLyrpym3wZCglgJvyjsx89JTWhwEFHkIEqZoXGgjpIagYJcsozdBXK1y6EYqQpsi8I9KYL-Z4TCzOowB4yjKAQP0EBITMp1Kj4FRAJ2l2Qpp6FGbLkpgxKwfg9M-3V2Q7TkbD2fBu_HBGdkqruy5xnJNGvirwQol-Li7NZH8CMgymMA |
openUrl | ctx_ver=Z39.88-2004&ctx_enc=info%3Aofi%2Fenc%3AUTF-8&rfr_id=info%3Asid%2Fsummon.serialssolutions.com&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Abook&rft.genre=proceeding&rft.title=2000+34th+Annual+IEEE+International+Carnahan+Conference+on+Security+Technology&rft.atitle=AMETHYST%3A+automatic+alarm+assessment%3A+operational+experience&rft.au=Horner%2C+M.&rft.au=Leach%2C+G.&rft.au=O%27Dwyer%2C+T.&rft.date=2000-01-01&rft.pub=IEEE&rft.isbn=9780780359659&rft.spage=107&rft.epage=112&rft_id=info:doi/10.1109%2FCCST.2000.891175&rft.externalDocID=891175 |
thumbnail_l | http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=9780780359659/lc.gif&client=summon&freeimage=true |
thumbnail_m | http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=9780780359659/mc.gif&client=summon&freeimage=true |
thumbnail_s | http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=9780780359659/sc.gif&client=summon&freeimage=true |