Next Article in Journal
Cybersecurity in a Large-Scale Research Facility—One Institution’s Approach
Next Article in Special Issue
Power-Based Side-Channel Attacks on Program Control Flow with Machine Learning Models
Previous Article in Journal
Investigating the Privacy and Security of the SimpliSafe Security System on Android and iOS
Previous Article in Special Issue
Characterizing the Impact of Data-Damaged Models on Generalization Strength in Intrusion Detection
 
 
Review

Article Versions Notes

J. Cybersecur. Priv. 2023, 3(2), 166-190; https://doi.org/10.3390/jcp3020010
Action Date Notes Link
article xml file uploaded 4 May 2023 10:49 CEST Original file -
article xml uploaded. 4 May 2023 10:49 CEST Update https://www.mdpi.com/2624-800X/3/2/10/xml
article pdf uploaded. 4 May 2023 10:49 CEST Version of Record https://www.mdpi.com/2624-800X/3/2/10/pdf
article html file updated 4 May 2023 10:51 CEST Original file https://www.mdpi.com/2624-800X/3/2/10/html
Back to TopTop