Skip to search formSkip to main content
You are currently offline. Some features of the site may not work correctly.

Ping flood

Known as: Ping Bomb, Ping flood attack 
A ping flood is a simple denial-of-service attack where the attacker overwhelms the victim with ICMP Echo Request (ping) packets. This is most… Expand
Wikipedia

Papers overview

Semantic Scholar uses AI to extract papers important to this topic.
2018
2018
Imperviousness has increased due to urbanization, as has the frequency of extreme rainfall events by climate change. Various… Expand
  • figure 1
  • figure 2
  • figure 3
  • figure 4
  • figure 5
Is this relevant?
2014
2014
The flood seasonality of catchments in Switzerland is likely to change under climate change because of anticipated alterations of… Expand
  • table I
  • figure 3
  • figure 6
Is this relevant?
2013
2013
Palaeoflood hydrology is an expanding field as the damage potential of flood and flood-related processes are increasing with the… Expand
  • figure 1
  • figure 2
  • figure 3
  • figure 4
  • figure 5
Is this relevant?
2013
2013
Slum dwellers are often exposed to natural hazards. While their high vulnerability seems to leave them unpro tected to face these… Expand
  • figure 1
  • figure 2
  • figure 3
  • figure 4
Is this relevant?
2013
2013
Risk transfer, including insurance, is widely recognized as a tool for increasing financial resilience to severe weather events… Expand
  • figure 1
  • figure 2
  • table 2
Is this relevant?
2012
2012
Floods are the result of a complex interaction between meteorological event characteristics and pre-event catchment conditions… Expand
  • figure 1
  • table 1
  • figure 2
  • figure 3
  • figure 4
Is this relevant?
Highly Cited
2008
Highly Cited
2008
The Intergovernmental Panel on Climate Change (2007) recently estimated that global sea level will rise from 0.18 to 0.59 m by… Expand
  • figure 1
  • figure 2
  • figure 3
  • figure 5
  • table 2
Is this relevant?
2007
2007
Existing methods of evaluating the hazard posed by moraine-dammed lakes are unsystematic, subjective, and depend on the expertise… Expand
  • figure 1
  • figure 2
  • table 1
  • figure 3
  • table 2
Is this relevant?
Highly Cited
2005
Highly Cited
2005
Survivable routing protocols are able to provide service in the presence of attacks and failures. The strongest attacks that… Expand
  • figure 1
  • figure 3
  • figure 2
  • figure 4
  • figure 5
Is this relevant?
1963
1963
Tobosa (Hilaria mutica (Buckl.) Benth.), a drought resistant grass of the arid Southwest, occurs primarily on heavier textured… Expand
  • table 2
  • table 3
Is this relevant?