Review Article

GPS Vulnerability to Spoofing Threats and a Review of Antispoofing Techniques

Figure 3

Received SNR versus TSP for authentic and spoofing correlation peaks [12].
127072.fig.003