Next Article in Journal
Attribute-Centric and Synthetic Data Based Privacy Preserving Methods: A Systematic Review
Next Article in Special Issue
Security Operations Centers: Use Case Best Practices, Coverage, and Gap Analysis Based on MITRE Adversarial Tactics, Techniques, and Common Knowledge
Previous Article in Journal
A Gap Analysis of the Adoption Maturity of Certificateless Cryptography in Cooperative Intelligent Transportation Systems
Previous Article in Special Issue
Autonomous Vehicles: Sophisticated Attacks, Safety Issues, Challenges, Open Topics, Blockchain, and Future Directions
 
 
Article

Article Versions Notes

J. Cybersecur. Priv. 2023, 3(3), 610-637; https://doi.org/10.3390/jcp3030029
Action Date Notes Link
article xml file uploaded 2 September 2023 04:35 CEST Original file -
article xml uploaded. 2 September 2023 04:36 CEST Update https://www.mdpi.com/2624-800X/3/3/29/xml
article pdf uploaded. 2 September 2023 04:36 CEST Version of Record https://www.mdpi.com/2624-800X/3/3/29/pdf
article html file updated 2 September 2023 04:37 CEST Original file https://www.mdpi.com/2624-800X/3/3/29/html
Back to TopTop