Fig. 4From: Time sensitive networking security: issues of precision time protocol and its implementationPTP Exploitation Framework demonstration; the reconnaissance module displays the information got from the running PTP daemonsBack to article page