Next Article in Journal
A Gap Analysis of the Adoption Maturity of Certificateless Cryptography in Cooperative Intelligent Transportation Systems
Next Article in Special Issue
Security in Cloud-Native Services: A Survey
Previous Article in Journal
Hybrid Machine Learning-Based Approaches for Feature and Overfitting Reduction to Model Intrusion Patterns
 
 
Systematic Review

Article Versions Notes

J. Cybersecur. Priv. 2023, 3(3), 558-590; https://doi.org/10.3390/jcp3030027
Action Date Notes Link
article xml file uploaded 1 September 2023 03:22 CEST Original file -
article xml uploaded. 1 September 2023 03:22 CEST Update -
article pdf uploaded. 1 September 2023 03:22 CEST Version of Record https://www.mdpi.com/2624-800X/3/3/27/pdf-vor
article html file updated 1 September 2023 03:24 CEST Original file -
article xml file uploaded 4 September 2023 12:06 CEST Update -
article xml uploaded. 4 September 2023 12:06 CEST Update https://www.mdpi.com/2624-800X/3/3/27/xml
article pdf uploaded. 4 September 2023 12:06 CEST Updated version of record https://www.mdpi.com/2624-800X/3/3/27/pdf
article html file updated 4 September 2023 12:08 CEST Update -
article html file updated 5 September 2023 12:03 CEST Update https://www.mdpi.com/2624-800X/3/3/27/html
Back to TopTop