Next Article in Journal
A Methodological Approach to Evaluate Security Requirements Engineering Methodologies: Application to the IREHDO2 Project Context
Next Article in Special Issue
Clone Node Detection Attacks and Mitigation Mechanisms in Static Wireless Sensor Networks
Previous Article in Journal
CLAP: A Cross-Layer Analytic Platform for the Correlation of Cyber and Physical Security Events Affecting Water Critical Infrastructures
Previous Article in Special Issue
Ontology for Cross-Site-Scripting (XSS) Attack in Cybersecurity
 
 
Article

Article Versions Notes

J. Cybersecur. Priv. 2021, 1(3), 387-421; https://doi.org/10.3390/jcp1030021
Action Date Notes Link
article xml file uploaded 9 July 2021 14:16 CEST Original file -
article xml uploaded. 9 July 2021 14:16 CEST Update https://www.mdpi.com/2624-800X/1/3/21/xml
article pdf uploaded. 9 July 2021 14:16 CEST Version of Record https://www.mdpi.com/2624-800X/1/3/21/pdf
article html file updated 9 July 2021 14:18 CEST Original file -
article html file updated 27 July 2022 04:11 CEST Update https://www.mdpi.com/2624-800X/1/3/21/html
Back to TopTop