Next Article in Journal
Insights into Organizational Security Readiness: Lessons Learned from Cyber-Attack Case Studies
Next Article in Special Issue
Comparison of Deepfake Detection Techniques through Deep Learning
Previous Article in Journal
A Security and Privacy Scoring System for Contact Tracing Apps
Previous Article in Special Issue
RSSI-Based MAC-Layer Spoofing Detection: Deep Learning Approach
 
 
Article

Article Versions Notes

J. Cybersecur. Priv. 2021, 1(4), 615-637; https://doi.org/10.3390/jcp1040031
Action Date Notes Link
article pdf uploaded. 4 November 2021 13:35 CET Version of Record https://www.mdpi.com/2624-800X/1/4/31/pdf-vor
article xml file uploaded 6 November 2021 02:45 CET Original file -
article xml uploaded. 6 November 2021 02:45 CET Update https://www.mdpi.com/2624-800X/1/4/31/xml
article pdf uploaded. 6 November 2021 02:45 CET Updated version of record https://www.mdpi.com/2624-800X/1/4/31/pdf
article html file updated 6 November 2021 02:46 CET Original file -
article html file updated 30 July 2022 14:56 CEST Update https://www.mdpi.com/2624-800X/1/4/31/html
Back to TopTop