Fig. 1From: Precision time protocol attack strategies and their resistance to existing security extensionsPTP Network with Attack and Attacker PositionsBack to article page