Fig. 8From: Precision time protocol attack strategies and their resistance to existing security extensionsImpact of DoS attack/packet removal attackBack to article page