Next Article in Journal
Biometric Systems De-Identification: Current Advancements and Future Directions
Next Article in Special Issue
CyBERT: Cybersecurity Claim Classification by Fine-Tuning the BERT Language Model
Previous Article in Journal
A Methodological Approach to Evaluate Security Requirements Engineering Methodologies: Application to the IREHDO2 Project Context
Previous Article in Special Issue
Model for Quantifying the Quality of Secure Service
 
 
Article

Article Versions Notes

J. Cybersecur. Priv. 2021, 1(3), 453-469; https://doi.org/10.3390/jcp1030023
Action Date Notes Link
article xml file uploaded 12 August 2021 10:31 CEST Original file -
article xml uploaded. 12 August 2021 10:31 CEST Update https://www.mdpi.com/2624-800X/1/3/23/xml
article pdf uploaded. 12 August 2021 10:31 CEST Version of Record https://www.mdpi.com/2624-800X/1/3/23/pdf
article html file updated 12 August 2021 10:33 CEST Original file -
article html file updated 28 July 2022 05:39 CEST Update https://www.mdpi.com/2624-800X/1/3/23/html
Back to TopTop