Review Article

GPS Vulnerability to Spoofing Threats and a Review of Antispoofing Techniques

Figure 4

Vulnerability region comparison of versus absolute power monitoring techniques [12].
127072.fig.004