Skip to search formSkip to main contentSkip to account menu

Ping flood

Known as: Ping Bomb, Ping flood attack 
A ping flood is a simple denial-of-service attack where the attacker overwhelms the victim with ICMP Echo Request (ping) packets. This is most… 
Wikipedia (opens in a new tab)

Papers overview

Semantic Scholar uses AI to extract papers important to this topic.
Highly Cited
2018
Highly Cited
2018
Increasing Earth’s surface air temperature yields an intensification of its hydrological cycle1. As a consequence, the risk of… 
2018
2018
Imperviousness has increased due to urbanization, as has the frequency of extreme rainfall events by climate change. Various… 
2014
2014
The growing spread of malware on Android OS requires new approaches for the detection and recognition of malicious applications… 
Highly Cited
2014
Highly Cited
2014
The flood seasonality of catchments in Switzerland is likely to change under climate change because of anticipated alterations of… 
Highly Cited
2013
Highly Cited
2013
Slum dwellers are often exposed to natural hazards. While their high vulnerability seems to leave them unpro tected to face these… 
Review
2012
Review
2012
This paper revisits flooding problems in Ibadan Metropolis, in the past fifty years, especially the most recent flood of August… 
Highly Cited
2012
Highly Cited
2012
In Europe in recent years, there has been recognition of the need to better understand the risk from groundwater flooding. This… 
Review
2010
Review
2010
In the United States, mitigating the adverse impacts of flooding has increasingly become the responsibility of local decision… 
Review
2008
Review
2008
Author Posting. © Annual Reviews, 2007. This is the author's version of the work. It is posted here by permission of Annual… 
Highly Cited
2005
Highly Cited
2005
Survivable routing protocols are able to provide service in the presence of attacks and failures. The strongest attacks that…