Skip to search form
Skip to main content
Skip to account menu
Semantic Scholar
Semantic Scholar's Logo
Search 225,348,541 papers from all fields of science
Search
Sign In
Create Free Account
Ping flood
Known as:
Ping Bomb
, Ping flood attack
A ping flood is a simple denial-of-service attack where the attacker overwhelms the victim with ICMP Echo Request (ping) packets. This is most…
Expand
Wikipedia
(opens in a new tab)
Create Alert
Alert
Related topics
Related topics
12 relations
Attack (computing)
Comparison of operating system kernels
Denial-of-service attack
INVITE of Death
Expand
Papers overview
Semantic Scholar uses AI to extract papers important to this topic.
2016
2016
Assessment of Climate and Land Use Change Projections and their Impacts on Flooding
Emmanuel Rukundo
,
A. Doğan
2016
Corpus ID: 55728371
The increase in extreme flooding in urban areas has sparked research interest in the quantitative impact of climate and land use…
Expand
Review
2015
Review
2015
An agent-based framework for modeling the effectiveness of hurricane mitigation incentives
Bin Pei
,
W. Pang
,
F. Testik
,
N. Ravichandran
2015
Corpus ID: 54940426
To evaluate the effectiveness of different incentives for mitigating regional hurricane hazards, an agent-based hurricane…
Expand
2014
2014
On energy-based profiling of malware in Android
A. Merlo
,
M. Migliardi
,
Paolo Fontanelli
International Symposium on High Performance…
2014
Corpus ID: 16739795
The growing spread of malware on Android OS requires new approaches for the detection and recognition of malicious applications…
Expand
2013
2013
Application of rainstorm and flood inundation model in flood disaster economic loss evaluation
Shi Rui-qi
2013
Corpus ID: 133367648
To evaluate rainstorm and flood disaster objectively and quantitatively,in this study we discuss the operational procedure for…
Expand
2012
2012
An ontology-based system to identify complex network attacks
Lisa M. Frye
,
Liang Cheng
,
J. Heflin
IEEE International Conference on Communications…
2012
Corpus ID: 1891919
Intrusion Detection Systems are tools used to detect attacks against networks. Many of these attacks are a sequence of multiple…
Expand
2011
2011
Experimental Evaluation of Juniper Network's Netscreen-5GT Security Device against Layer4 Flood Attacks
Sanjeev Kumar
,
Raja Sekhar Reddy Gade
J. Information Security
2011
Corpus ID: 14913752
Cyber attacks are continuing to hamper working of Internet services despite increased use of network secu-rity systems such as…
Expand
2010
2010
Packet Filtering using IP Tables in Linux
B. Sharma
,
S. Bhatia
2010
Corpus ID: 63166639
Firewalls are core elements in network security. However, managing firewall rules, especially for enterprise networks, has become…
Expand
2007
2007
Detailed DoS attacks in wireless networks and countermeasures
L. A. Mohammed
,
B. Issac
International Journal of Ad Hoc and Ubiquitous…
2007
Corpus ID: 9494132
IEEE 802.11 wireless networks have fuzzy boundaries, making it easy for an attacker to capture the transmitted packets. Also the…
Expand
Review
1991
Review
1991
Fishes in the forested flood plain of the Ochlockonee River, Florida, during flood and drought conditions
H. M. Leitman
,
M. Darst
,
J. J. Nordhaus
1991
Corpus ID: 126600112
A study of hydrologic conditions, vegetation, and fishes was made in the Ochlockonee River and flood plain in northwest Florida…
Expand
1963
1963
Fertilizing Tobosa on Flood Plains in the Semidesert Grassland.
C. H. Herbel
1963
Corpus ID: 56157773
Tobosa (Hilaria mutica (Buckl.) Benth.), a drought resistant grass of the arid Southwest, occurs primarily on heavier textured…
Expand
By clicking accept or continuing to use the site, you agree to the terms outlined in our
Privacy Policy
(opens in a new tab)
,
Terms of Service
(opens in a new tab)
, and
Dataset License
(opens in a new tab)
ACCEPT & CONTINUE