Fig. 3From: Precision time protocol attack strategies and their resistance to existing security extensionsTestbedBack to article page