no code implementations • 18 May 2020 • Mahsa Foruhandeh, Abdullah Z. Mohammed, Gregor Kildow, Paul Berges, Ryan Gerdes
Furthermore, in this paper we demonstrate that this solution detects all known spoofing attacks, that it does so while being fast, cheap, and simpler than previous solutions, and that it is highly robust with respect to environmental factors.