{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,10,22]],"date-time":"2024-10-22T21:55:44Z","timestamp":1729634144914,"version":"3.28.0"},"reference-count":31,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2013,6]]},"DOI":"10.1109\/icl-gnss.2013.6577266","type":"proceedings-article","created":{"date-parts":[[2013,8,28]],"date-time":"2013-08-28T22:17:47Z","timestamp":1377728267000},"page":"1-6","source":"Crossref","is-referenced-by-count":2,"title":["Frequency-domain code replica detection for a GNSS receiver"],"prefix":"10.1109","author":[{"given":"Juan M.","family":"Parro-Jimenez","sequence":"first","affiliation":[]},{"given":"Jose A.","family":"Lopez-Salcedo","sequence":"additional","affiliation":[]},{"given":"Rigas T.","family":"Ioannides","sequence":"additional","affiliation":[]},{"given":"Massimo","family":"Crisci","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"journal-title":"Weak Signal Digital GNSS Tracking","year":"2010","author":"curran","key":"19"},{"key":"17","first-page":"48","article-title":"Keeping the spoofs out: Signal authentication for future GNSS","volume":"59","author":"pozzobon","year":"2011","journal-title":"InsideGNSS"},{"key":"18","doi-asserted-by":"publisher","DOI":"10.1109\/NAVITEC.2012.6423121"},{"key":"15","article-title":"Anti-spoofing & authenticated signal architectures for civil navigation systems","author":"scott","year":"2003","journal-title":"ION GPS\/GNSS 2003 9-12 September 2003 Portland OR"},{"key":"16","doi-asserted-by":"crossref","first-page":"239","DOI":"10.1007\/978-3-540-30114-1_17","article-title":"An asymmetric security mechanism for navigation signals","author":"kuhn","year":"2004","journal-title":"In Proceedings of the Information Hiding Workshop"},{"key":"13","article-title":"GNSS spoofing analysis by VIAS","author":"juang","year":"2011","journal-title":"Coordinates Magazine"},{"journal-title":"Understanding GPS - Principles and Applications","year":"2005","author":"kaplan","key":"14"},{"key":"11","doi-asserted-by":"publisher","DOI":"10.1109\/NAVITEC.2010.5708016"},{"key":"12","article-title":"Receiver-autonomous spoofing detection: Experimental results of a multi-antenna receiver defense against a portable civil GPS spoofer","author":"montgomery","year":"0","journal-title":"Proceedings of the 2009 International Technical Meeting of the ION 2009"},{"journal-title":"Statistical Digital Signal Processing and Modeling","year":"1996","author":"hayes","key":"21"},{"key":"20","doi-asserted-by":"publisher","DOI":"10.1109\/7.784064"},{"key":"22","doi-asserted-by":"publisher","DOI":"10.1109\/TAP.1986.1143830"},{"key":"23","doi-asserted-by":"publisher","DOI":"10.1109\/TASSP.1982.1163915"},{"key":"24","doi-asserted-by":"publisher","DOI":"10.1111\/j.1365-246X.1973.tb03424.x"},{"key":"25","first-page":"1","article-title":"Enhanced code acquisition in global positioning radio systems","author":"benedetto","year":"0","journal-title":"Proc of the 3rd Workshop on Positioning Navigation and Communication (WPNC'06) 2006"},{"key":"26","doi-asserted-by":"publisher","DOI":"10.1109\/PROC.1981.12184"},{"key":"27","doi-asserted-by":"publisher","DOI":"10.1109\/ICASSP.1985.1168444"},{"key":"28","doi-asserted-by":"publisher","DOI":"10.1109\/TASSP.1982.1163905"},{"key":"29","doi-asserted-by":"publisher","DOI":"10.1109\/TSP.2004.823473"},{"key":"3","doi-asserted-by":"publisher","DOI":"10.1109\/PLANS.2012.6236916"},{"key":"2","article-title":"GPS signal simulation using open source gps receiver platform","author":"brown","year":"0","journal-title":"Proceedings of the 21st Virginia Tech Symposium on Wireless Personal Communications Blacksburg Virginia 2011"},{"key":"10","doi-asserted-by":"publisher","DOI":"10.1002\/j.2161-4296.2011.tb02590.x"},{"journal-title":"Vulnerabilty Assessment of the Transportation Infrastructure Relying on the Global Positioning System","year":"2011","key":"1"},{"key":"30","article-title":"Detection Theory","volume":"2","author":"kay","year":"2009","journal-title":"Fundamentals of Statistical Processing"},{"key":"7","doi-asserted-by":"publisher","DOI":"10.1109\/MILCOM.2008.4753512"},{"journal-title":"GPS spoofing countermeasures","year":"2003","author":"warner","key":"6"},{"key":"5","first-page":"38","article-title":"Detecting false signals with Automatic Gain Control","volume":"april","author":"borowski","year":"2012","journal-title":"GPS World"},{"key":"31","doi-asserted-by":"publisher","DOI":"10.1016\/j.patrec.2005.10.010"},{"key":"4","article-title":"Countermeasures for GPS signal spoofing","author":"wen","year":"0","journal-title":"Proceedings of the 18th International Technical Meeting of the Satellite Division of the ION 2005"},{"key":"9","article-title":"An in-line anti-spoofing device for legacy civil GPS receivers","author":"ledvina","year":"0","journal-title":"Proceedings of the 2010 International Technical Meeting of the ION 2010"},{"key":"8","doi-asserted-by":"publisher","DOI":"10.1155\/2012\/127072"}],"event":{"name":"2013 International Conference on Localization and GNSS (ICL-GNSS)","start":{"date-parts":[[2013,6,25]]},"location":"TURIN, Italy","end":{"date-parts":[[2013,6,27]]}},"container-title":["2013 International Conference on Localization and GNSS (ICL-GNSS)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/6573225\/6577248\/06577266.pdf?arnumber=6577266","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,7,22]],"date-time":"2019-07-22T13:32:18Z","timestamp":1563802338000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/6577266\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2013,6]]},"references-count":31,"URL":"https:\/\/doi.org\/10.1109\/icl-gnss.2013.6577266","relation":{},"subject":[],"published":{"date-parts":[[2013,6]]}}}