2
I Use This!
Inactive
Analyzed 3 days ago. based on code collected 3 days ago.

Project Summary

Direct Code Execution is a way to use existing code running on real system (i.e., currently Linux userspace applications and kernel network stack) on top of network simulators, such as ns-3.

Tags

ns_3 simulator

In a Nutshell, ns-3 Direct Code Execution...

Quick Reference

Public Domain / GPL When Compiled
Permitted
Forbidden
Required

These details are provided for information only. No information here is legal advice and should not be used as such.

Project Security

Vulnerabilities per Version ( last 10 releases )

There are no reported vulnerabilities

Project Vulnerability Report

Security Confidence Index

Poor security track-record
Favorable security track-record

Vulnerability Exposure Index

Many reported vulnerabilities
Few reported vulnerabilities

Did You Know...

  • ...
    use of OSS increased in 65% of companies in 2016
  • ...
    you can embed statistics from Open Hub on your site
  • ...
    in 2016, 47% of companies did not have formal process in place to track OS code
  • ...
    search using multiple tags to find exactly what you need
About Project Security

Languages

Languages?height=75&width=75
C++
70%
Perl
15%
Python
9%
8 Other
6%

30 Day Summary

Sep 25 2021 — Oct 25 2021

12 Month Summary

Oct 25 2020 — Oct 25 2021