Research Article

Protecting Clock Synchronization: Adversary Detection through Network Monitoring

Figure 5

Scenario for the network, —an adversary.