2
I Use This!
Inactive
Analyzed about 2 hours ago. based on code collected about 2 hours ago.

Project Summary

Direct Code Execution is a way to use existing code running on real system (i.e., currently Linux userspace applications and kernel network stack) on top of network simulators, such as ns-3.

Tags

ns_3 simulator

In a Nutshell, ns-3 Direct Code Execution...

Quick Reference

Public Domain / GPL When Compiled
Permitted
Forbidden
Required

These details are provided for information only. No information here is legal advice and should not be used as such.

Project Security

Vulnerabilities per Version ( last 10 releases )

There are no reported vulnerabilities

Project Vulnerability Report

Security Confidence Index

Poor security track-record
Favorable security track-record

Vulnerability Exposure Index

Many reported vulnerabilities
Few reported vulnerabilities

Did You Know...

  • ...
    in 2016, 47% of companies did not have formal process in place to track OS code
  • ...
    check out hot projects on the Open Hub
  • ...
    65% of companies leverage OSS to speed application development in 2016
  • ...
    anyone with an Open Hub account can update a project's tags
About Project Security

Languages

Languages?height=75&width=75
C++
70%
Perl
15%
Python
9%
8 Other
6%

30 Day Summary

May 3 2020 — Jun 2 2020

12 Month Summary

Jun 2 2019 — Jun 2 2020