Next Article in Journal
Hybrid Machine Learning-Based Approaches for Feature and Overfitting Reduction to Model Intrusion Patterns
Next Article in Special Issue
Business Email Compromise (BEC) Attacks: Threats, Vulnerabilities and Countermeasures—A Perspective on the Greek Landscape
Previous Article in Journal
Deploying Secure Distributed Systems: Comparative Analysis of GNS3 and SEED Internet Emulator
 
 
Review

Article Versions Notes

J. Cybersecur. Priv. 2023, 3(3), 493-543; https://doi.org/10.3390/jcp3030025
Action Date Notes Link
article xml file uploaded 5 August 2023 14:28 CEST Original file -
article xml uploaded. 5 August 2023 14:28 CEST Update -
article pdf uploaded. 5 August 2023 14:28 CEST Version of Record https://www.mdpi.com/2624-800X/3/3/25/pdf-vor
article html file updated 5 August 2023 14:30 CEST Original file -
article xml file uploaded 7 August 2023 01:51 CEST Update -
article xml uploaded. 7 August 2023 01:51 CEST Update -
article pdf uploaded. 7 August 2023 01:51 CEST Updated version of record https://www.mdpi.com/2624-800X/3/3/25/pdf-vor
article html file updated 7 August 2023 01:53 CEST Update -
article xml file uploaded 7 August 2023 04:25 CEST Update -
article xml uploaded. 7 August 2023 04:25 CEST Update https://www.mdpi.com/2624-800X/3/3/25/xml
article pdf uploaded. 7 August 2023 04:25 CEST Updated version of record https://www.mdpi.com/2624-800X/3/3/25/pdf
article html file updated 7 August 2023 04:26 CEST Update -
article html file updated 20 August 2023 20:42 CEST Update https://www.mdpi.com/2624-800X/3/3/25/html
Back to TopTop