Next Article in Journal
Improved Detection and Response via Optimized Alerts: Usability Study
Next Article in Special Issue
Cybersecurity Threats and Their Mitigation Approaches Using Machine Learning—A Review
Previous Article in Journal
SoK: An Evaluation of the Secure End User Experience on the Dark Net through Systematic Literature Review
Previous Article in Special Issue
HEAD Access Control Metamodel: Distinct Design, Advanced Features, and New Opportunities
 
 
Review

Article Versions Notes

J. Cybersecur. Priv. 2022, 2(2), 358-378; https://doi.org/10.3390/jcp2020019
Action Date Notes Link
article pdf uploaded. 27 May 2022 12:44 CEST Version of Record https://www.mdpi.com/2624-800X/2/2/19/pdf-vor
article xml file uploaded 5 June 2022 16:10 CEST Original file -
article xml uploaded. 5 June 2022 16:10 CEST Update https://www.mdpi.com/2624-800X/2/2/19/xml
article pdf uploaded. 5 June 2022 16:10 CEST Updated version of record https://www.mdpi.com/2624-800X/2/2/19/pdf
article html file updated 5 June 2022 16:11 CEST Original file -
article html file updated 6 June 2022 09:58 CEST Update -
article html file updated 3 August 2022 02:10 CEST Update https://www.mdpi.com/2624-800X/2/2/19/html
Back to TopTop