{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,10,30]],"date-time":"2025-10-30T07:11:12Z","timestamp":1761808272844,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":32,"publisher":"ACM","license":[{"start":{"date-parts":[[2019,5,15]],"date-time":"2019-05-15T00:00:00Z","timestamp":1557878400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2019,5,15]]},"DOI":"10.1145\/3317549.3319719","type":"proceedings-article","created":{"date-parts":[[2019,5,17]],"date-time":"2019-05-17T12:52:21Z","timestamp":1558097541000},"page":"12-22","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":31,"title":["Drive me not: GPS spoofing detection via cellular network"],"prefix":"10.1145","author":[{"given":"Gabriele","family":"Oligeri","sequence":"first","affiliation":[{"name":"Hamad Bin Khalifa University, Doha, Qatar"}]},{"given":"Savio","family":"Sciancalepore","sequence":"additional","affiliation":[{"name":"Hamad Bin Khalifa University, Doha, Qatar"}]},{"given":"Omar Adel","family":"Ibrahim","sequence":"additional","affiliation":[{"name":"Hamad Bin Khalifa University, Doha, Qatar"}]},{"given":"Roberto","family":"Di Pietro","sequence":"additional","affiliation":[{"name":"Hamad Bin Khalifa University, Doha, Qatar"}]}],"member":"320","published-online":{"date-parts":[[2019,5,15]]},"reference":[{"key":"e_1_3_2_1_1_1","doi-asserted-by":"publisher","DOI":"10.1145\/3060403.3060455"},{"key":"e_1_3_2_1_2_1","unstructured":"Dataset. 2019. Link 1: https:\/\/cri-lab.net\/drive-me-not\/ Link 2: https:\/\/github.com\/cri-lab-hbku\/gps-spoofing-detection-cellular. (Mar. 2019).  Dataset. 2019. Link 1: https:\/\/cri-lab.net\/drive-me-not\/ Link 2: https:\/\/github.com\/cri-lab-hbku\/gps-spoofing-detection-cellular. (Mar. 2019)."},{"key":"e_1_3_2_1_3_1","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2015.2451997"},{"volume-title":"Proc. IEEE 11 (Nov. 2011)","author":"Fernandez-Prades C.","key":"e_1_3_2_1_4_1"},{"key":"e_1_3_2_1_5_1","unstructured":"GPS-SDR-SIM. 2018. https:\/\/github.com\/osqzss\/gps-sdr-sim. (December 2018).  GPS-SDR-SIM. 2018. https:\/\/github.com\/osqzss\/gps-sdr-sim. (December 2018)."},{"key":"e_1_3_2_1_6_1","doi-asserted-by":"publisher","DOI":"10.1109\/MCOM.2018.1700916"},{"key":"e_1_3_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.1109\/TITS.2014.2372000"},{"volume-title":"DEFCON '15","author":"Huang L.","key":"e_1_3_2_1_8_1"},{"key":"e_1_3_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.1145\/3052973.3055158"},{"volume":"00","volume-title":"2018 IEEE Symposium on Security and Privacy (SP)","author":"Jansen K.","key":"e_1_3_2_1_10_1"},{"key":"e_1_3_2_1_11_1","doi-asserted-by":"publisher","DOI":"10.1145\/2991079.2991092"},{"key":"e_1_3_2_1_12_1","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2018.2811762"},{"key":"e_1_3_2_1_13_1","doi-asserted-by":"publisher","DOI":"10.1109\/LCOMM.2018.2814983"},{"key":"e_1_3_2_1_14_1","doi-asserted-by":"publisher","DOI":"10.1109\/TAES.2015.140320"},{"key":"e_1_3_2_1_15_1","unstructured":"HackRF One. 2018. https:\/\/greatscottgadgets.com\/hackrf. (December 2018).  HackRF One. 2018. https:\/\/greatscottgadgets.com\/hackrf. (December 2018)."},{"key":"e_1_3_2_1_16_1","unstructured":"Opencellid. 2018. https:\/\/opencellid.com. (December 2018).  Opencellid. 2018. https:\/\/opencellid.com. (December 2018)."},{"key":"e_1_3_2_1_17_1","first-page":"2","article-title":"Potential Cyberattacks on Automated Vehicles","volume":"16","author":"Petit J.","year":"2015","journal-title":"IEEE Transactions on Intelligent Transportation Systems"},{"key":"e_1_3_2_1_18_1","unstructured":"Google Earth Pro. 2018. https:\/\/www.google.com\/earth. (December 2018).  Google Earth Pro. 2018. https:\/\/www.google.com\/earth. (December 2018)."},{"key":"e_1_3_2_1_19_1","doi-asserted-by":"publisher","DOI":"10.1109\/MSPEC.2016.7524168"},{"volume-title":"2017 13th International Conference on Computational Intelligence and Security (CIS). 312--316","author":"Qiao Y.","key":"e_1_3_2_1_20_1"},{"key":"e_1_3_2_1_21_1","doi-asserted-by":"publisher","DOI":"10.1145\/2973750.2973753"},{"key":"e_1_3_2_1_22_1","unstructured":"LabSat SatGen. 2018. https:\/\/www.labsat.co.uk\/index.php\/en\/products\/satgen-simulator-software. (December 2018).  LabSat SatGen. 2018. https:\/\/www.labsat.co.uk\/index.php\/en\/products\/satgen-simulator-software. (December 2018)."},{"volume-title":"2018 IEEE Conference on Communications and Network Security (CNS). 1--9.","author":"Sciancalepore S.","key":"e_1_3_2_1_23_1"},{"key":"e_1_3_2_1_24_1","doi-asserted-by":"crossref","unstructured":"B. Sheehan F. Murphy M. Mullins and C. Ryan. 2018. Connected and autonomous vehicles: A cyber-risk classification framework. Transportation Research Part A: Policy and Practice (2018).  B. Sheehan F. Murphy M. Mullins and C. Ryan. 2018. Connected and autonomous vehicles: A cyber-risk classification framework. Transportation Research Part A: Policy and Practice (2018).","DOI":"10.1016\/j.tra.2018.06.033"},{"key":"e_1_3_2_1_26_1","unstructured":"Statista. 2018. https:\/\/www.statista.com\/statistics\/697120\/car-trip-average-distance-europe-by-purpose. (December 2018).  Statista. 2018. https:\/\/www.statista.com\/statistics\/697120\/car-trip-average-distance-europe-by-purpose. (December 2018)."},{"key":"e_1_3_2_1_27_1","doi-asserted-by":"publisher","DOI":"10.1145\/2046707.2046719"},{"key":"e_1_3_2_1_28_1","unstructured":"G. De La Torre P. Rad and K.K. Raymond Choo. 2018. Driverless vehicle security: Challenges and future research opportunities. Future Generation Computer Systems (2018).  G. De La Torre P. Rad and K.K. Raymond Choo. 2018. Driverless vehicle security: Challenges and future research opportunities. Future Generation Computer Systems (2018)."},{"key":"e_1_3_2_1_29_1","unstructured":"Unwiredlabs. 2018. https:\/\/unwiredlabs.com. (December 2018).  Unwiredlabs. 2018. https:\/\/unwiredlabs.com. (December 2018)."},{"key":"e_1_3_2_1_30_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.comcom.2018.09.010"},{"key":"e_1_3_2_1_31_1","doi-asserted-by":"publisher","DOI":"10.1145\/3032970.3032983"},{"key":"e_1_3_2_1_32_1","doi-asserted-by":"publisher","DOI":"10.1109\/TII.2015.2389656"},{"volume-title":"MILCOM 2012 - 2012 IEEE Military Communications Conference. 1--6.","author":"Zhang Z.","key":"e_1_3_2_1_33_1"}],"event":{"name":"WiSec '19: 12th ACM Conference on Security and Privacy in Wireless and Mobile Networks","sponsor":["SIGSAC ACM Special Interest Group on Security, Audit, and Control","SIGMOBILE ACM Special Interest Group on Mobility of Systems, Users, Data and Computing"],"location":"Miami Florida","acronym":"WiSec '19"},"container-title":["Proceedings of the 12th Conference on Security and Privacy in Wireless and Mobile Networks"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3317549.3319719","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3317549.3319719","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T20:01:17Z","timestamp":1750276877000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3317549.3319719"}},"subtitle":["(architectures, models, and experiments)"],"short-title":[],"issued":{"date-parts":[[2019,5,15]]},"references-count":32,"alternative-id":["10.1145\/3317549.3319719","10.1145\/3317549"],"URL":"https:\/\/doi.org\/10.1145\/3317549.3319719","relation":{},"subject":[],"published":{"date-parts":[[2019,5,15]]},"assertion":[{"value":"2019-05-15","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}