Upload Code
loading-left
loading loading loading
loading-right

Loading

Profile
No self-introduction
codes (2)
Simulator of Liping Ji's
no vote
Simulator of Liping Ji's "A Novel Covert Channel Based on Length of Messages" Recently, data hiding by modifying network parameters like packet header, payload, and packet length has become popular among researchers. Different algorithms have been proposed during the last few years which have altered the network packets in different ways to embed the data bits. Some of these algorithms modify the network packet length for embedding. In Liping Ji's paper, a novel covert channel based on packet length is proposed. This is a simulation written in Java language.
super2lao
2016-08-23
0
1
BellmanFord
no vote
Adata communication network such as the Internet consists of routers connectedby physical (optical) cables or links. Routers always use some routingprotocols, such as the Border Gateway Protocol (BGP) which is mostly used in CISCOrouters, to build their routing tables and exchange routing information amongeach other. TheBGP routing protocol uses the Bellman-Ford algorithm to populate the routingtable. The algorithm calculates the shortest path to all nodes in the graph froma single source and save the information in the routing table. Each router usesits routing table to decide to which next router to forward a packet that isgoing a certain destination. More info about the Bellman-Ford algorithm and thepseudo-code can be found at: http://en.wik
super2lao
2016-08-23
0
1
No more~