Next Article in Journal
Secure Remote Storage of Logs with Search Capabilities
Next Article in Special Issue
An Empirical Assessment of Endpoint Detection and Response Systems against Advanced Persistent Threats Attack Vectors
Previous Article in Journal
Developing a Cybersecurity Framework for e-Government Project in the Kingdom of Saudi Arabia
Previous Article in Special Issue
Launching Adversarial Attacks against Network Intrusion Detection Systems for IoT
 
 
Article

Article Versions Notes

J. Cybersecur. Priv. 2021, 1(2), 319-339; https://doi.org/10.3390/jcp1020018
Action Date Notes Link
article xml file uploaded 25 May 2021 13:51 CEST Original file -
article xml uploaded. 25 May 2021 13:51 CEST Update -
article pdf uploaded. 25 May 2021 13:51 CEST Version of Record https://www.mdpi.com/2624-800X/1/2/18/pdf-vor
article html file updated 25 May 2021 13:52 CEST Original file -
article xml file uploaded 24 June 2021 12:01 CEST Update -
article xml uploaded. 24 June 2021 12:01 CEST Update https://www.mdpi.com/2624-800X/1/2/18/xml
article pdf uploaded. 24 June 2021 12:01 CEST Updated version of record https://www.mdpi.com/2624-800X/1/2/18/pdf
article html file updated 24 June 2021 12:02 CEST Update -
article html file updated 26 July 2022 21:14 CEST Update https://www.mdpi.com/2624-800X/1/2/18/html
Back to TopTop