Next Article in Journal
Business Email Compromise (BEC) Attacks: Threats, Vulnerabilities and Countermeasures—A Perspective on the Greek Landscape
Previous Article in Journal
Abuse of Cloud-Based and Public Legitimate Services as Command-and-Control (C&C) Infrastructure: A Systematic Literature Review
 
 
Article

Article Versions Notes

J. Cybersecur. Priv. 2023, 3(3), 591-609; https://doi.org/10.3390/jcp3030028
Action Date Notes Link
article xml file uploaded 1 September 2023 05:47 CEST Original file -
article xml uploaded. 1 September 2023 05:47 CEST Update https://www.mdpi.com/2624-800X/3/3/28/xml
article pdf uploaded. 1 September 2023 05:47 CEST Version of Record https://www.mdpi.com/2624-800X/3/3/28/pdf
article html file updated 1 September 2023 05:49 CEST Original file -
article html file updated 1 September 2023 05:50 CEST Update https://www.mdpi.com/2624-800X/3/3/28/html
Back to TopTop