Next Article in Journal
Functionality-Preserving Adversarial Machine Learning for Robust Classification in Cybersecurity and Intrusion Detection Domains: A Survey
Next Article in Special Issue
A Synopsis of “The Impact of Motivation, Price, and Habit on Intention to Use IoT-Enabled Technology: A Correlational Study”
Previous Article in Journal
Distributed Authentication and Authorization Models in Cloud Computing Systems: A Literature Review
Previous Article in Special Issue
Extending the Quality of Secure Service Model to Multi-Hop Networks
 
 
Article

Article Versions Notes

J. Cybersecur. Priv. 2022, 2(1), 124-153; https://doi.org/10.3390/jcp2010009
Action Date Notes Link
article pdf uploaded. 9 March 2022 14:04 CET Version of Record https://www.mdpi.com/2624-800X/2/1/9/pdf-vor
article xml file uploaded 10 March 2022 07:24 CET Original file -
article xml uploaded. 10 March 2022 07:24 CET Update https://www.mdpi.com/2624-800X/2/1/9/xml
article pdf uploaded. 10 March 2022 07:24 CET Updated version of record https://www.mdpi.com/2624-800X/2/1/9/pdf
article html file updated 10 March 2022 07:25 CET Original file -
article html file updated 10 March 2022 10:05 CET Update -
article html file updated 1 August 2022 04:52 CEST Update https://www.mdpi.com/2624-800X/2/1/9/html
Back to TopTop