Fig. 5From: Precision time protocol attack strategies and their resistance to existing security extensionsImpact of packet content manipulation attackBack to article page