Next Article in Journal
Bridging the Gap: A Survey and Classification of Research-Informed Ethical Hacking Tools
Previous Article in Journal
Diverse Intrusion and Malware Detection: AI-Based and Non-AI-Based Solutions
Previous Article in Special Issue
Mapping Automated Cyber Attack Intelligence to Context-Based Impact on System-Level Goals
 
 
Systematic Review

Article Versions Notes

J. Cybersecur. Priv. 2024, 4(3), 388-409; https://doi.org/10.3390/jcp4030020
Action Date Notes Link
article xml file uploaded 1 July 2024 15:20 CEST Original file -
article xml uploaded. 1 July 2024 15:20 CEST Update https://www.mdpi.com/2624-800X/4/3/20/xml
article pdf uploaded. 1 July 2024 15:20 CEST Version of Record https://www.mdpi.com/2624-800X/4/3/20/pdf
article supplementary file uploaded. 1 July 2024 15:20 CEST - https://www.mdpi.com/2624-800X/4/3/20#supplementary
article html file updated 1 July 2024 15:21 CEST Original file https://www.mdpi.com/2624-800X/4/3/20/html
Back to TopTop