Abstract: The configuration of security functions in computer networks is still typically performed manually, which likely leads to security breaches and long re-configuration times. This problem is ...
Abstract: As a class of randomized learner model, stochastic configuration networks (SCNs) have been successfully applied in a few data analytics tasks. Given the industrial big data modeling tasks, ...
The Guest Configuration Extension for Linux configures the Guest Configuration Agent on VMs. Together, they allow a customer to run In-Guest Policy on their VMs, which gives the customer the ability ...
The Mozilla SSL Configuration Generator is a tool which builds configuration files to help you follow the Mozilla Server Side TLS configuration guidelines. This tool ...
Some results have been hidden because they may be inaccessible to you
Show inaccessible results