18 Questions 30 Answers 0 Followers
Questions related from Mohssine el Ajjouri
Thank you in advance.
09 September 2016 7,769 0 View
Dear reseachers, Have you any idea about the extraction, and analysis of data using WEKA tool datamining ? as mentioned in the two attached figures
06 June 2016 3,137 2 View
How can check that a proceeding conference is indexed in SCOPUS, and how can i get my author ID scopus ? I have no access on SCOPUS.
05 May 2016 510 15 View
For intrusion detection purposes Thank you in advance
04 April 2016 9,573 3 View
what to think about the publisher/journal ? This journal is free or paid ? Impact Factor ? Thank you in advance
12 December 2015 4,564 8 View
My intrusion detection architecture is composed by agents
06 June 2015 4,200 3 View
Dear researchers, Can I use the version academic for simulate my new IDS?
12 December 2014 6,770 2 View
Hi all, Can any one help me with any technical case study describe steps to follow for implementing my new IDS Algorithm based agents on OPNET and analyse results ?
12 December 2014 777 5 View
How can we create new agents under NS2, where the goal is to simulate intrusion detection?
06 June 2014 4,737 5 View
How could we implement the algorithm CBL1 (Case Based Learning) of CBR (Case Based Reasoning) in NS-2?
05 May 2014 523 1 View
Can someone tell me if we can simulate intrusion detection architecture based MAS with CBR (Case Based Reasoning) on NS2? NS2 may be connected with a database.
04 April 2014 8,854 2 View
I want to test a new architecture for intrusion detection that uses multi-agent systems, and a CBR agent (Case Based Reasoning). Is there any suitable and easy platform for me to implement my...
04 April 2014 7,235 4 View
What is the most appropriate methodology for intrusion detection architecture based on MAS : MAS CommonKADS MaSE Gaia OMaSE
03 March 2014 3,188 1 View
I need to model SMA with StarUML. An AML plugin is required. Currently the only platform offering this modeling language is an extension of StarUML proposed by the company Whitestein...
03 March 2014 7,339 9 View
Can someone describe the steps to follow to simulate an architecture of intrusion detection based in MAS with Madkit platform?
02 February 2014 2,231 4 View
How can we model the agents in architecture, what is good practice to secure the goals and objectives of an agent? Do you have any examples?
12 December 2013 5,365 1 View
What is the best tool for system modeling in a multi-agent architecture for security and intrusion detection?
12 December 2013 4,754 0 View
Which network software design, for example network architecture, can incorporate agents, host databases?
11 November 2013 325 7 View