[4] SHEPARD D P, HUMPHREYS T E. Characterization of receiver response to spoofing attacks[C]//The 24th International Technical Meeting of the Satellite Division of The Institute of Navigation, Portland OR, 2011:2608-2618.
[5] HUMPHREYS T E, LEDVINA B M, PSIAKI M L, et al. Assessing the spoofing threat: development of a portable gps civilian spoofer[C]//ION GNSS 21st International Technical Meeting of the Satellite Division, 2008:2314-2325.
[6] SHEPARD D P, BHATTI J A, HUMPHREYS T E. Drone hack:spoofing attack demonstration on a civilian unmanned aerial vehicle[DB/OL]. [2015-09-07]. http://gpsword. com/drone. hack.
[7] KERNS A J, SHEPARD D P, BHATTI J A, et al. Unmanned aircraft capture and control via GPS spoofing[J]. Journal of Field Robotics, 2014, 31(4):617-636.
[8] HUMPHREYS T E. Statement on the vulnerability of civil unmanned aerial vehicles and other systems to civil GPS spoofing[DB/OL]. (2012-07-18)[2015-09-07]. http://radionavlab. ae. utexas. edu/images/stories/files/papers/Testimory-Humphreys. pdf.
[9] TIPPENHAUER N O. On the requirements for successful GPS spoofing attacks[DB/OL]. [2005-09-07]. http://www. cs. ox. ac. uk/files/6489/gps. pdf.
[10] KUHN M G. An asymmetric security mechanism for na-vigation signals[DB/OL]. [2015-09-07]. http://www. cl. cam. ac. uk/mgk25/ih2004-navsec. pdf.