Next Article in Journal
Calibrating the Attack to Sensitivity in Differentially Private Mechanisms
Next Article in Special Issue
An Investigation to Detect Banking Malware Network Communication Traffic Using Machine Learning Techniques
Previous Article in Journal
A Distributed Model for Privacy Preserving V2I Communication with Strong Unframeability and Efficient Revocation
Previous Article in Special Issue
Defending against OS-Level Malware in Mobile Devices via Real-Time Malware Detection and Storage Restoration
 
 
Review

Article Versions Notes

J. Cybersecur. Priv. 2022, 2(4), 800-829; https://doi.org/10.3390/jcp2040041
Action Date Notes Link
article xml file uploaded 28 September 2022 16:43 CEST Original file -
article xml uploaded. 28 September 2022 16:43 CEST Update -
article pdf uploaded. 28 September 2022 16:43 CEST Version of Record https://www.mdpi.com/2624-800X/2/4/41/pdf-vor
article html file updated 28 September 2022 16:45 CEST Original file -
article xml file uploaded 13 October 2022 17:23 CEST Update -
article xml uploaded. 13 October 2022 17:23 CEST Update https://www.mdpi.com/2624-800X/2/4/41/xml
article pdf uploaded. 13 October 2022 17:23 CEST Updated version of record https://www.mdpi.com/2624-800X/2/4/41/pdf
article html file updated 13 October 2022 17:25 CEST Update -
article html file updated 28 February 2023 15:50 CET Update https://www.mdpi.com/2624-800X/2/4/41/html
Back to TopTop