Next Article in Journal
A Distributed Model for Privacy Preserving V2I Communication with Strong Unframeability and Efficient Revocation
Next Article in Special Issue
ReMouse Dataset: On the Efficacy of Measuring the Similarity of Human-Generated Trajectories for the Detection of Session-Replay Bots
Previous Article in Journal
Exploratory Study on Kali NetHunter Lite: A Digital Forensics Approach
Previous Article in Special Issue
Contactless Fingerprint Recognition Using Deep Learning—A Systematic Review
 
 
Article

Article Versions Notes

J. Cybersecur. Priv. 2022, 2(4), 764-777; https://doi.org/10.3390/jcp2040039
Action Date Notes Link
article xml file uploaded 20 September 2022 04:27 CEST Original file -
article xml uploaded. 20 September 2022 04:27 CEST Update https://www.mdpi.com/2624-800X/2/4/39/xml
article pdf uploaded. 20 September 2022 04:27 CEST Version of Record https://www.mdpi.com/2624-800X/2/4/39/pdf
article html file updated 20 September 2022 04:28 CEST Original file -
article html file updated 21 September 2022 10:37 CEST Update https://www.mdpi.com/2624-800X/2/4/39/html
Back to TopTop