期刊文献+
共找到3篇文章
< 1 >
每页显示 20 50 100
A Potentially Shared Neural Basis Linking Rapid Saccades and Avoidance Initiation in the Superior Colliculus Driven by Visual Threats
1
作者 Zhou Sun Yu Gu 《Neuroscience Bulletin》 2025年第6期1115-1118,共4页
Throughout the lifespan,an animal can encounter predators frequently,thus the ability to avoid attacks from predators is crucial for its survival.The chances of evading danger can be greatly improved if the animal can... Throughout the lifespan,an animal can encounter predators frequently,thus the ability to avoid attacks from predators is crucial for its survival.The chances of evading danger can be greatly improved if the animal can respond immediately to the threat.Therefore,when an animal detects a threat through its visual system,it must quickly direct its gaze and attention toward the source of danger,assess the threat level,and take appropriate action. 展开更多
关键词 avoidance initiation threat assessment gaze direction survival visual systemit visual threats superior colliculus rapid saccades
原文传递
On Development of Platform for Organization Security Threat Analytics and Management (POSTAM) Using Rule-Based Approach 被引量:2
2
作者 Joseph E. Mbowe Simon S. Msanjila +1 位作者 George S. Oreku Khamisi Kalegele 《Journal of Software Engineering and Applications》 2016年第12期601-623,共23页
The integration of organisation’s information security policy into threat modeling enhances effectiveness of security strategies for information security management. These security policies are the ones which define ... The integration of organisation’s information security policy into threat modeling enhances effectiveness of security strategies for information security management. These security policies are the ones which define the sets of security issues, controls and organisation’s commitment for seamless integration with knowledge based platforms in order to protect critical assets and data. Such platforms are needed to evaluate and share violations which can create security loop-hole. The lack of rules-based approaches for discovering potential threats at organisation’s context, poses a challenge for many organisations in safeguarding their critical assets. To address the challenge, this paper introduces a Platform for Organisation Security Threat Analytic and Management (POSTAM) using rule-based approach. The platform enhances strategies for combating information security threats and thus improves organisations’ commitment in protecting their critical assets. R scripting language for data visualization and java-based scripts were used to develop a prototype to run on web protocol. MySQL database management system was used as back-end for data storage during threat analytic processes. 展开更多
关键词 Security threats Analytic threat visualization Security Management Automated Security Policies
在线阅读 下载PDF
VirusMap:A visualization database for the influenza A virus
3
作者 Yubin Xie Xiaotong Luo +5 位作者 Zhihao He Yueyuan Zheng Zhixiang Zuo Qi Zhao Yanyan Miao Jian Ren 《Journal of Genetics and Genomics》 SCIE CAS CSCD 2017年第5期281-284,共4页
Influenza A virus,a highly virulent pathogen that has caused several pandemic events over the course of human history,still remains a major threat to human health at present.The most serious influenza pandemic in reco... Influenza A virus,a highly virulent pathogen that has caused several pandemic events over the course of human history,still remains a major threat to human health at present.The most serious influenza pandemic in recorded history was the 1918 Spanish flu outbreak,which killed about 20-100 million people worldwide(Murray et al.,2006).Also, 展开更多
关键词 visualization threat Spanish killed Murray Influenza outbreak pathogen phylogenetic geographical
原文传递
上一页 1 下一页 到第
使用帮助 返回顶部