Next Article in Journal
A Hybrid Dimensionality Reduction for Network Intrusion Detection
Next Article in Special Issue
On Data Leakage Prevention Maturity: Adapting the C2M2 Framework
Previous Article in Journal
Towards a Near-Real-Time Protocol Tunneling Detector Based on Machine Learning Techniques
Previous Article in Special Issue
VEDRANDO: A Novel Way to Reveal Stealthy Attack Steps on Android through Memory Forensics
 
 
Article

Article Versions Notes

J. Cybersecur. Priv. 2023, 3(4), 808-829; https://doi.org/10.3390/jcp3040036
Action Date Notes Link
article xml file uploaded 15 November 2023 07:32 CET Original file -
article xml uploaded. 15 November 2023 07:32 CET Update -
article pdf uploaded. 15 November 2023 07:32 CET Version of Record https://www.mdpi.com/2624-800X/3/4/36/pdf-vor
article html file updated 15 November 2023 07:34 CET Original file -
article xml file uploaded 16 November 2023 03:39 CET Update -
article xml uploaded. 16 November 2023 03:39 CET Update https://www.mdpi.com/2624-800X/3/4/36/xml
article pdf uploaded. 16 November 2023 03:39 CET Updated version of record https://www.mdpi.com/2624-800X/3/4/36/pdf
article html file updated 16 November 2023 03:40 CET Update https://www.mdpi.com/2624-800X/3/4/36/html
Back to TopTop