Login / Signup
On the requirements for successful GPS spoofing attacks.
Nils Ole Tippenhauer
Christina Pöpper
Kasper Bonne Rasmussen
Srdjan Capkun
Published in:
CCS (2011)
Keyphrases
</>
user requirements
countermeasures
identity theft
software engineering
watermarking scheme
requirements engineering
denial of service attacks
face recognition
urban environments
functional requirements
traffic analysis