[
Anderson, M. (2025). GPS Spoofing Attacks Are Dangerously Misleading Airliners. IEEE Spectrum. https://areios.ca/gps-spoofing-attacks-are-dangerously-misleading-airliners/
]Search in Google Scholar
[
Anil, A. M. (2025, January 13). Technology Convergence is Leading Us to the Fifth Industrial Revolution. World Economic Forum. https://www.weforum.org/stories/2025/01/technology-convergence-is-leading-theway-for-accelerated-innovation-in-emerging-technology-areas/
]Search in Google Scholar
[
Burbank, J., Greene, T., & Kaabouch, N. (2024). Detecting and mitigating attacks on GPS devices. Sensors, 24(17), 5529. https://doi.org/10.3390/s24175529
]Search in Google Scholar
[
Burton, S. L. (2024). Advancements in AI-Driven Education: Transforming Learning and Training withIntelligent Technologies. World Journal of Business Research, 4(1). World Journal of Business Research, 4(1), 9.
]Search in Google Scholar
[
Cyber Protection Magazine. (2024, July 16). The crucial role of regulatory frameworks in ensuring robust cyber security. Cyber Protection Magazine. https://cyberprotection-magazine.com/the-crucial-role-of-regulatory-frameworks-in-ensuring-robust-cyber-security
]Search in Google Scholar
[
Dey, N. S., Deepika, R., Tekuri, K., & Sanjana, U. (2024). Advancements in machine learning for anomaly detection in cyber security. In: Patil, M., Vyawahare, V., Birajdar, G. (eds) Intelligent Computing and Big Data Analytics. ICICBDA 2024. Communications in Computer and Information Science, 2234. Springer, Cham. https://doi.org/10.1007/978-3-031-74682-6_11
]Search in Google Scholar
[
Dodla, T. R., & Jones, L. A. (2023). Mitigating Knowledge Management Internal and External Risk Factors: A Literature Review of Best Practices. Scientific Bulletin, 28(1), 44-54.
]Search in Google Scholar
[
Durbha, S.S., Sanyal, J., Yang, L., S Chaudhari, S., Bhangale, U., Bharambe, U., & Kurte, K. (2023). Advances in scalable and intelligent geospatial analytics: Challenges and applications (1st ed.). CRC Press. https://doi.org/10.1201/978100327092
]Search in Google Scholar
[
Easterly, J. (2025, January 25). Strengthening America’s Resilience Against the PRC Cyber Threats. Cybersecurity and Infrastructure Security Agency (CISA). https://www.cisa.gov/news-events/news/strengthening-americas-resilience-against-prc-cyber-threats
]Search in Google Scholar
[
ElMarady, A. A., & Rahouma, K. (2022). High Accuracy Next Generation Air Traffic Surveillance System with Potential Cyber-Attacks. Journal of Aerospace Engineering and Technology. doi:10.21608/jaet.2022.137284.1162.
]Search in Google Scholar
[
Insider. (2025, March/April). GPS spoofing: Should operators be concerned? Insider. https://nbaa.org/news/business-aviation-insider/2024-03/gps-spoofing-should-operators-be-concerned/
]Search in Google Scholar
[
Fox, J. (2023, December 8). Top cybersecurity statistics for 2024. Cobalt. https://www.cobalt.io/blog/cybersecurity-statistics-2024
]Search in Google Scholar
[
GPS Spoofing WorkGroup. (2024, September 6). GPS spoofing: Final report of the GSP spoofing Workgroup. GPS Spoofing WorkGroup. https://ops.group/dashboard/wp-content/uploads/2024/09/GPS-Spoofing-Final-Report-OPSGROUP-WG-OG24.pdf
]Search in Google Scholar
[
Gartner. (2021, January 5). Predicts 2021: Analytics, BI and data science solutions — Pervasive, democratized and composable. Gartner. https://www.gartner.com/en/documents/3995129
]Search in Google Scholar
[
Ghanbarzadeh, A., Soleimani, M., & Soleimani, H. (2025). GNSS/GPS spoofing and jamming identification using machine learning and deep learning. Cornell University. arXiv.
]Search in Google Scholar
[
Imkampe, J. J. (2023). Maritime navigation under threat: GNSS spoofing raises security concerns. RiskIntelligence. https://www.riskintelligence.eu/analyst-briefings/maritime-navigation-under-threat
]Search in Google Scholar
[
Jones, L. A. (2020). Reputation risk and potential profitability: Best practices to predict and mitigate risk through amalgamated factors. Capitol Technology University.
]Search in Google Scholar
[
Jones, L. A., & McAndrew, I. (2024). Investigating a Marginalized Business Asset: Opportunity Risk. In Innovations, Securities, and Case Studies Across Healthcare, Business, and Technology (pp. 26-49). IGI Global.
]Search in Google Scholar
[
Kerdvibulvech, C. (2024). Big data and AI-driven evidence analysis: a global perspective on citation trends, accessibility, and future research in legal applications. Journal of Big Data, 11, 180. https://doi.org/10.1186/s40537-024-01046-w
]Search in Google Scholar
[
Mebert, L., Barnes, R., Dalley, J., Gawarecki, L., Ghazi-Nezami, F., Shafer, G., Slater, J., & Yezbick, E. (2020). Fostering student engagement through a real-world, collaborative project across disciplines and institutions. Higher Education Pedagogies, 5(1), 30-51, DOI: 10.1080/23752696.2020.1750306
]Search in Google Scholar
[
Military Sphere. (2024). Safeguarding GPS systems: The intersection of GPS and cybersecurity. Military Sphere. https://militarysphere.com/gps-and-cybersecurity/
]Search in Google Scholar
[
Nazarzadeh Zare, M. and Parvin, E. (2024). The reasons for the gap between academic education and the required skills of the labor market in Iran, Journal of Applied Research in Higher Education, 16(3), pp. 831-842. https://doi.org/10.1108/JARHE-02-2023-0052
]Search in Google Scholar
[
National Institute of Standards and Technology (NIST). (2019). Economic benefits of the global positioning system (GPS). NIST. https://www.gps.gov/governance/advisory/recommendations/2024-01-ESG-response-to-PNTAB.pdf
]Search in Google Scholar
[
Nobles, C., Burrell, D. N., Burton, S. L., & Waller, T. (2023). Driving into cybersecurity trouble with autonomous vehicles. In Handbook of Research on Cybersecurity Risk in Contemporary Business Systems (pp. 255-273). IGI Global. DOI: 10.4018/978-1-6684-7207-1.ch005
]Search in Google Scholar
[
Novikara, A. (2024, December 9). Cybersecurity statistics 2024: Key insights and numbers. Nordlayer. https://nordlayer.com/blog/cybersecurity-statistics-of-2024/
]Search in Google Scholar
[
Ogborigbo, J. C., Sobowale, O. S., Amienwalen, E. I., Owoade, Y., Samson, A. T., & Egerson, J. (2024). Strategic integration of cyber security in business intelligence systems for data protection and competitive advantage. World Journal of Advanced Research and Reviews, 23(1), 081-096. https://wjarr.com/
]Search in Google Scholar
[
OpsGroup. (2023, October 9). The serious threat of GPS spoofing: an analysis. Aviation Week. https://aviationweek.com/business-aviation/safety-ops-regulation/serious-threat-gps-spoofing-analysis
]Search in Google Scholar
[
Pearson, A., & Deters, J. (2023). Questioning Implicit Assumptions–Proactively fostering inclusion in engineering activity design. The University of Melbourne. https://findanexpert.unimelb.edu.au/profile/991019-ashlee-pearson
]Search in Google Scholar
[
Rothenberger, L. (2023). Perspective description and delimitation of object and knowledge range. In Terrorism as Communication: Stocktaking, Explanations and Challenges (pp. 11-62). Wiesbaden: Springer Fachmedien Wiesbaden.
]Search in Google Scholar
[
Tariq, U., & Tariq, B. (2025). Signal characteristic analysis and anomaly detection for GPS spoofing mitigation. Ubiquitous Technology Journal, 1(1), 10-22. DOI: https://doi.org/10.71346/utj.v1i1.7
]Search in Google Scholar
[
Updyke, E. (2025, January 8). How GPS spoofing endangers flights worldwide. Forbes. https://www.forbes.com/councils/forbestechcouncil/2025/01/08/aviations-hidden-threat-how-gps-spoofing-endangers-flights-worldwide/
]Search in Google Scholar
[
Umer, M., Ashraf, I., & Park, Y. (2024). Enhanced Machine Learning Ensemble Approach for Securing Small Unmanned Aerial Vehicles from GPS Spoofing Attacks. IEEE Access. 10.1109/ACCESS.2024.3359700
]Search in Google Scholar
[
Westbrook, T. (2024). Aircraft vulnerability to politically motivated Radio Frequency Interference (RFI) in Eastern Europe. Security and Defence Quarterly, 46(2), 104–117. doi:10.35467/sdq/178249.
]Search in Google Scholar
[
Zhou, T., Zhao, X., Xu, X., & Ren, S. (2024, October 29). Bileve: Securing text provenance in large language models against spoofing with bi-level signature. Cornell University. https://arxiv.org/abs/2406.01946
]Search in Google Scholar