Next Article in Journal
Generic Patterns for Intrusion Detection Systems in Service-Oriented Automotive and Medical Architectures
Next Article in Special Issue
Detection of SQL Injection Attack Using Machine Learning Techniques: A Systematic Literature Review
Previous Article in Journal
Exploiting Online Services to Enable Anonymous and Confidential Messaging
Previous Article in Special Issue
Improved Detection and Response via Optimized Alerts: Usability Study
 
 
Review

Article Versions Notes

J. Cybersecur. Priv. 2022, 2(3), 714-730; https://doi.org/10.3390/jcp2030036
Action Date Notes Link
article xml file uploaded 8 September 2022 10:24 CEST Original file -
article xml uploaded. 8 September 2022 10:24 CEST Update https://www.mdpi.com/2624-800X/2/3/36/xml
article pdf uploaded. 8 September 2022 10:24 CEST Version of Record https://www.mdpi.com/2624-800X/2/3/36/pdf
article html file updated 8 September 2022 10:25 CEST Original file -
article html file updated 28 February 2023 12:47 CET Update https://www.mdpi.com/2624-800X/2/3/36/html
Back to TopTop