Skip to search formSkip to main content
You are currently offline. Some features of the site may not work correctly.

Ping flood

Known as: Ping Bomb, Ping flood attack 
A ping flood is a simple denial-of-service attack where the attacker overwhelms the victim with ICMP Echo Request (ping) packets. This is most… Expand
Wikipedia

Papers overview

Semantic Scholar uses AI to extract papers important to this topic.
Highly Cited
2018
Highly Cited
2018
Increasing Earth’s surface air temperature yields an intensification of its hydrological cycle1. As a consequence, the risk of… Expand
  • figure 1
  • figure 2
  • figure 3
  • figure 4
2018
2018
Imperviousness has increased due to urbanization, as has the frequency of extreme rainfall events by climate change. Various… Expand
  • figure 1
  • figure 2
  • figure 3
  • figure 4
  • figure 5
2014
2014
The growing spread of malware on Android OS requires new approaches for the detection and recognition of malicious applications… Expand
  • figure 1
  • figure 2
  • figure 3
  • figure 4
  • figure 5
Highly Cited
2014
Highly Cited
2014
The flood seasonality of catchments in Switzerland is likely to change under climate change because of anticipated alterations of… Expand
  • table I
  • figure 3
  • figure 6
Highly Cited
2013
Highly Cited
2013
Palaeoflood hydrology is an expanding field as the damage potential of flood and flood-related processes are increasing with the… Expand
  • figure 1
  • figure 2
  • figure 3
  • figure 4
  • figure 5
2013
2013
Slum dwellers are often exposed to natural hazards. While their high vulnerability seems to leave them unpro tected to face these… Expand
  • figure 1
  • figure 2
  • figure 3
  • figure 4
2012
2012
Intrusion Detection Systems are tools used to detect attacks against networks. Many of these attacks are a sequence of multiple… Expand
  • figure 1
  • figure 2
  • figure 3
  • figure 4
2007
2007
IEEE 802.11 wireless networks have fuzzy boundaries, making it easy for an attacker to capture the transmitted packets. Also the… Expand
  • table 1
  • table 2
  • table 3
  • figure 1
  • figure 2
Highly Cited
2007
Highly Cited
2007
Existing methods of evaluating the hazard posed by moraine-dammed lakes are unsystematic, subjective, and depend on the expertise… Expand
  • figure 1
  • figure 2
  • table 1
  • figure 3
  • table 2
Highly Cited
2005
Highly Cited
2005
Survivable routing protocols are able to provide service in the presence of attacks and failures. The strongest attacks that… Expand
  • figure 1
  • figure 3
  • figure 2
  • figure 4
  • figure 5