Fig. 2From: Precision time protocol attack strategies and their resistance to existing security extensionsSingle-path PTP Network Model with Attacker Type as listed in Table 1Back to article page