Skip to main content
. 2021 May 6;7:e507. doi: 10.7717/peerj-cs.507

Figure 5. Taxonomy of GPS spoofing attacks.

Figure 5