Fig. 9From: Precision time protocol attack strategies and their resistance to existing security extensionsTrusted Supervisor NodeBack to article page