-
We need attacks for the medium access control layer researched and developed. As a reference here is a list of some possible attacks in this layer that we have researched thus far:
1. **Jamming Att…
-
User Story
As an extension developer who writes code in languages other than JS/TS, I want to be able to quickly and easily be able to write an extension so that I don't have to learn a new programmin…
-
I have a Wyze Cam v3 on my local network running wz_mini_hacks with a static IP address, currently using the 4.61.0.1 RTSP firmware. Normally, when I block the camera from having internet access, it w…
-
This is meant for discussion if and how we want to modernize our network stack (likely *after* 0.17).
Once upon a time, we used [Netty](https://netty.io/) and had only blocking I/O. Then, Matt Cora…
-
Hello everyone,
I'm currently working on a project involving two LoRa-E5 Mini modules, and I need to transmit data directly from one module to the other. My goal is to establish a peer-to-peer (P2P) …
-
Post questions here for:
Borgatti, Stephen P. 2005. [“Centrality and Network Flow.”](https://www.sciencedirect.com/science/article/pii/S0378873304000693) _Social networks_ 27(1): 55-71.
-
Post questions here for:
Bail, Christopher A. 2012. [“The fringe effect: Civil society organizations and the evolution of media discourse about Islam since the September 11th attacks.”](https://jo…
-
Post questions here for:
Fortunato, Santo. 2010. [“Community Detection in Graphs.”](https://www.sciencedirect.com/science/article/pii/S0370157309002841) _Physics reports_ 486(3-5): 75-174.
-
**Is your enhancement related to a problem? Please describe.**
customer topology:
VM enp1s0 10.18.82.162/22(vlan 423)---------vm-network-b0------------10.18.80.1 vlan.423 EXTERNAL SWITCH vlan.420 …
-
Programming Historian in English has received a proposal for a lesson, "Simulations in historical research: How to create an agent-based model of communication networks" by @merrygin and @maltevogl.
…
hawc2 updated
12 hours ago