Next Article in Journal
Modeling Correlation between Android Permissions Based on Threat and Protection Level Using Exploratory Factor Plane Analysis
Next Article in Special Issue
Cybersecurity Practices for Social Media Users: A Systematic Literature Review
Previous Article in Journal
New Semi-Prime Factorization and Application in Large RSA Key Attacks
Previous Article in Special Issue
Augmented Reality and the Digital Twin: State-of-the-Art and Perspectives for Cybersecurity
 
 
Article

Article Versions Notes

J. Cybersecur. Priv. 2021, 1(4), 675-703; https://doi.org/10.3390/jcp1040034
Action Date Notes Link
article pdf uploaded. 19 November 2021 16:34 CET Version of Record https://www.mdpi.com/2624-800X/1/4/34/pdf-vor
article xml file uploaded 26 November 2021 05:23 CET Original file -
article xml uploaded. 26 November 2021 05:23 CET Update https://www.mdpi.com/2624-800X/1/4/34/xml
article pdf uploaded. 26 November 2021 05:23 CET Updated version of record https://www.mdpi.com/2624-800X/1/4/34/pdf
article html file updated 26 November 2021 05:25 CET Original file -
article html file updated 26 November 2021 09:58 CET Update -
article html file updated 30 July 2022 17:41 CEST Update https://www.mdpi.com/2624-800X/1/4/34/html
Back to TopTop