Next Article in Journal
Using Blockchain for Data Collection in the Automotive Industry Sector: A Literature Review
Next Article in Special Issue
SoK: An Evaluation of the Secure End User Experience on the Dark Net through Systematic Literature Review
Previous Article in Journal
Unsupervised Machine Learning Techniques for Detecting PLC Process Control Anomalies
Previous Article in Special Issue
Cybersecurity Practices for Social Media Users: A Systematic Literature Review
 
 
Viewpoint

Article Versions Notes

J. Cybersecur. Priv. 2022, 2(2), 245-256; https://doi.org/10.3390/jcp2020013
Action Date Notes Link
article xml file uploaded 28 March 2022 05:46 CEST Original file -
article xml uploaded. 28 March 2022 05:46 CEST Update -
article pdf uploaded. 28 March 2022 05:46 CEST Version of Record https://www.mdpi.com/2624-800X/2/2/13/pdf-vor
article html file updated 28 March 2022 05:47 CEST Original file -
article xml file uploaded 30 March 2022 07:34 CEST Update -
article xml uploaded. 30 March 2022 07:34 CEST Update https://www.mdpi.com/2624-800X/2/2/13/xml
article pdf uploaded. 30 March 2022 07:34 CEST Updated version of record https://www.mdpi.com/2624-800X/2/2/13/pdf
article html file updated 30 March 2022 07:35 CEST Update -
article html file updated 2 August 2022 15:57 CEST Update https://www.mdpi.com/2624-800X/2/2/13/html
Back to TopTop