Next Article in Journal
An Empirical Assessment of Endpoint Detection and Response Systems against Advanced Persistent Threats Attack Vectors
Next Article in Special Issue
A Methodological Approach to Evaluate Security Requirements Engineering Methodologies: Application to the IREHDO2 Project Context
Previous Article in Journal
Secure Remote Storage of Logs with Search Capabilities
 
 
Due to scheduled maintenance work on our database systems, there may be short service disruptions on this website between 10:00 and 11:00 CEST on June 14th.
Article

Article Versions Notes

J. Cybersecur. Priv. 2021, 1(2), 365-386; https://doi.org/10.3390/jcp1020020
Action Date Notes Link
article xml file uploaded 9 June 2021 10:13 CEST Original file -
article xml uploaded. 9 June 2021 10:13 CEST Update https://www.mdpi.com/2624-800X/1/2/20/xml
article pdf uploaded. 9 June 2021 10:13 CEST Version of Record https://www.mdpi.com/2624-800X/1/2/20/pdf
article html file updated 9 June 2021 10:14 CEST Original file -
article html file updated 26 July 2022 23:30 CEST Update https://www.mdpi.com/2624-800X/1/2/20/html
Back to TopTop