1. S. Jeon, C. Kim, G. Kim, O. Kim, and C. Kee, “Optimal signal tracking algorithm for GNSS signal using moving set-point LQG system,” International Journal of Control, Automation, and Systems, vol. 11, no. 6, pp. 1214–1222, December 2013.
2. N. O. Tippenhauer, C. Pöpper, K. B. Rasmussen, and S. Capkun, “On the requirements for successful GPS spoofing attacks,” Proc. of the 18th ACM Conference on Computer and Communications Security, pp. 75–86, 2011.
3. Y. Bardout, “Authentication of GNSS position: an assessment of spoofing detection method,” Proc. of the 24th International Technical Meeting of the Satellite Division of the Institute of Navigation, pp. 436–446, September 2011.
4. S. L. Cho, M. Y. Shin, S. J. Lee, and C. Park, “Performance comparison of anti-spoofing methods using pseudorange Measurements,” The Korea Institute of Military Science and Technology, vol. 13, no. 5, pp. 793–800, October 2010.
5. F. Dovis, X. Chen, A. Cavaleri, K. Ali, and M. Pini, “Detection of spoofing threats by means of signal parameters estimation,” Proc. of the 24th International Technical Meeting of the Satellite Division of The Institute of Navigation, pp 416–421, September 2011.