1 |
E. D. Kaplan, Understanding GPS : Principles and Applications, 2nd ed. Norwood, MA: Artech House, 2005.
|
2 |
F. Dovis, GNSS Interference Threats and Countermeasures, Norwood, MA: Artech House, 2015.
|
3 |
S. Peterson, and P. Faramarzi, "Exclusive: Iran hijacked US drone, says Iranian engineer," Csmonitor.com, Retrieved 15 December 2011.
|
4 |
T. E. Humphreys, "Statement on the vulnerability of civil unmanned aerial vehicles and other systems to civil GPS spoofing," [Internet]. Available: http://homeland.house.gov/sites/homeland.house.gov/files/Testimony-Humphreys.pdf, July 2012.
|
5 |
Anon. "Vulnerability assessment of the transportation infrastructure relying on the Global Positioning System Technology Report," John A. Volpe National Transportation Systems Center, 2001.
|
6 |
B. Hofmann-Wellenhof, H. Lichtenegger, and J. Collins, Global Positioning System Theory and Practice, 5th ed. New York, NY: Springer, 2001.
|
7 |
S. Lo, D. E. Lorenzo, P. Enge, D. Akos, and P. Bradley, "Signal authentication: A secure civil GNSS for today," Inside GNSS, Sept/Oct 2009.
|
8 |
M. L. Psiaki, B. W. O'Hanlon, J. A. Bhatti, D. P. Shepard, and T. E. Humphreys, "Civilian GPS spoofing detection based on dual-receiver correlation of military signals," in Proceedings of the 24th ITM of The Institute of Navigation 2011, Portland: OR, Sept. 2011.
|
9 |
H. So, J. Jang, K. Lee, K. Song and J. Park, "GNSS spoofing detection scheme based on the combined use of a single authentic ranging signal and RAIM," in Proceedings of 2015 International Association of Institutes of Navigation World Congress, Prague: Czech, Oct. 2015.
|
10 |
R. G. Brown, "A baseline GPS RAIM scheme and a note on the equivalence of three RAIM methods," Navigation, Vol. 39, No. 3, pp. 301-316, 1992.
DOI
|
11 |
G. X. Gao, A. Chen, S. Lo, D. D. Lorenzon, T. Walter and P. Enge, "Compass-M1 broadcast codes in E2, E5b, and E6 frequency bands," IEEE Journal of Selected Topics in Signal Processing, Vol. 3, No. 4, Aug. 2009.
|