Next Article in Journal
D2WFP: A Novel Protocol for Forensically Identifying, Extracting, and Analysing Deep and Dark Web Browsing Activities
Previous Article in Journal
Security in Cloud-Native Services: A Survey
Previous Article in Special Issue
Power-Based Side-Channel Attacks on Program Control Flow with Machine Learning Models
 
 
Article

Article Versions Notes

J. Cybersecur. Priv. 2023, 3(4), 794-807; https://doi.org/10.3390/jcp3040035
Action Date Notes Link
article xml file uploaded 6 November 2023 09:59 CET Original file -
article xml uploaded. 6 November 2023 09:59 CET Update -
article pdf uploaded. 6 November 2023 09:59 CET Version of Record https://www.mdpi.com/2624-800X/3/4/35/pdf-vor
article html file updated 6 November 2023 10:01 CET Original file -
article html file updated 6 November 2023 10:01 CET Update -
article xml file uploaded 21 December 2023 05:32 CET Update -
article xml uploaded. 21 December 2023 05:32 CET Update https://www.mdpi.com/2624-800X/3/4/35/xml
article pdf uploaded. 21 December 2023 05:32 CET Updated version of record https://www.mdpi.com/2624-800X/3/4/35/pdf
article html file updated 21 December 2023 05:34 CET Update https://www.mdpi.com/2624-800X/3/4/35/html
Back to TopTop