On the Requirements for Successful GPS Spoofing Attacks

Publication
Proceedings of the ACM Conference on Computer and Communications Security (CCS)