Next Article in Journal
The State of Ethereum Smart Contracts Security: Vulnerabilities, Countermeasures, and Tool Support
Next Article in Special Issue
Checked and Approved? Human Resources Managers’ Uses of Social Media for Cybervetting
Previous Article in Journal
Defending against OS-Level Malware in Mobile Devices via Real-Time Malware Detection and Storage Restoration
Previous Article in Special Issue
Getting Rid of the Usability/Security Trade-Off: A Behavioral Approach
 
 
Systematic Review

Article Versions Notes

J. Cybersecur. Priv. 2022, 2(2), 329-357; https://doi.org/10.3390/jcp2020018
Action Date Notes Link
article pdf uploaded. 27 May 2022 12:28 CEST Version of Record https://www.mdpi.com/2624-800X/2/2/18/pdf-vor
article xml file uploaded 31 May 2022 05:28 CEST Original file -
article xml uploaded. 31 May 2022 05:28 CEST Update https://www.mdpi.com/2624-800X/2/2/18/xml
article pdf uploaded. 31 May 2022 05:28 CEST Updated version of record https://www.mdpi.com/2624-800X/2/2/18/pdf
article html file updated 31 May 2022 05:30 CEST Original file -
article html file updated 31 May 2022 09:59 CEST Update -
article html file updated 3 August 2022 02:09 CEST Update https://www.mdpi.com/2624-800X/2/2/18/html
Back to TopTop