Skip to search form
Skip to main content
Skip to account menu
Semantic Scholar
Semantic Scholar's Logo
Search 218,036,019 papers from all fields of science
Search
Sign In
Create Free Account
Ping flood
Known as:
Ping Bomb
, Ping flood attack
A ping flood is a simple denial-of-service attack where the attacker overwhelms the victim with ICMP Echo Request (ping) packets. This is most…
Expand
Wikipedia
(opens in a new tab)
Create Alert
Alert
Related topics
Related topics
12 relations
Attack (computing)
Comparison of operating system kernels
Denial-of-service attack
INVITE of Death
Expand
Papers overview
Semantic Scholar uses AI to extract papers important to this topic.
Highly Cited
2018
Highly Cited
2018
Global economic response to river floods
S. Willner
,
Christian Otto
,
A. Levermann
Nature Climate Change
2018
Corpus ID: 44109114
Increasing Earth’s surface air temperature yields an intensification of its hydrological cycle1. As a consequence, the risk of…
Expand
2018
2018
Application of Flood Nomograph for Flood Forecasting in Urban Areas
E. Lee
,
Joon-Hoon Kim
,
Y. Choo
,
D. Jo
2018
Corpus ID: 46388615
Imperviousness has increased due to urbanization, as has the frequency of extreme rainfall events by climate change. Various…
Expand
2014
2014
On energy-based profiling of malware in Android
A. Merlo
,
M. Migliardi
,
Paolo Fontanelli
International Symposium on High Performance…
2014
Corpus ID: 16739795
The growing spread of malware on Android OS requires new approaches for the detection and recognition of malicious applications…
Expand
Highly Cited
2014
Highly Cited
2014
Seasonality and magnitude of floods in Switzerland under future climate change
N. Köplin
,
B. Schädler
,
D. Viviroli
,
R. Weingartner
2014
Corpus ID: 128669335
The flood seasonality of catchments in Switzerland is likely to change under climate change because of anticipated alterations of…
Expand
Highly Cited
2013
Highly Cited
2013
Coping with the impacts of severe flood events in Dhaka’s slums – the role of social capital
T. Aßheuer
,
I. Thiele-Eich
,
B. Braun
2013
Corpus ID: 131252920
Slum dwellers are often exposed to natural hazards. While their high vulnerability seems to leave them unpro tected to face these…
Expand
Review
2012
Review
2012
Flood Management in an Urban Setting: A Case Study of Ibadan Metropolis
O. Ajayi
,
S. B. Agbola
,
+10 authors
N. Abiola
2012
Corpus ID: 128859542
This paper revisits flooding problems in Ibadan Metropolis, in the past fifty years, especially the most recent flood of August…
Expand
Highly Cited
2012
Highly Cited
2012
Groundwater flooding within an urbanised flood plain
D E Macdonald
,
A. Dixon
,
A. Newell
,
A. Hallaways
2012
Corpus ID: 129073236
In Europe in recent years, there has been recognition of the need to better understand the risk from groundwater flooding. This…
Expand
Review
2010
Review
2010
Identifying factors influencing flood mitigation at the local level in Texas and Florida: the role of organizational capacity
S. Brody
,
J. Kang
,
S. Bernhardt
2010
Corpus ID: 30595842
In the United States, mitigating the adverse impacts of flooding has increasingly become the responsibility of local decision…
Expand
Review
2008
Review
2008
Coastal Impacts Due to Sea-Level Rise
D. FitzGerald
,
M. Fenster
,
Brittina A. Argow
,
I. Buynevich
2008
Corpus ID: 53621681
Author Posting. © Annual Reviews, 2007. This is the author's version of the work. It is posted here by permission of Annual…
Expand
Highly Cited
2005
Highly Cited
2005
On the Survivability of Routing Protocols in Ad Hoc Wireless Networks
B. Awerbuch
,
Reza Curtmola
,
D. Holmer
,
H. Rubens
,
C. Nita-Rotaru
Security and Privacy in Communication Networks
2005
Corpus ID: 8281883
Survivable routing protocols are able to provide service in the presence of attacks and failures. The strongest attacks that…
Expand
By clicking accept or continuing to use the site, you agree to the terms outlined in our
Privacy Policy
(opens in a new tab)
,
Terms of Service
(opens in a new tab)
, and
Dataset License
(opens in a new tab)
ACCEPT & CONTINUE