Next Article in Journal
RSSI-Based MAC-Layer Spoofing Detection: Deep Learning Approach
Next Article in Special Issue
Extending the Quality of Secure Service Model to Multi-Hop Networks
Previous Article in Journal
An Empirical Assessment of Endpoint Detection and Response Systems against Advanced Persistent Threats Attack Vectors
Previous Article in Special Issue
CLAP: A Cross-Layer Analytic Platform for the Correlation of Cyber and Physical Security Events Affecting Water Critical Infrastructures
 
 
Due to scheduled maintenance work on our database systems, there may be short service disruptions on this website between 10:00 and 11:00 CEST on June 14th.
Article

Article Versions Notes

J. Cybersecur. Priv. 2021, 1(3), 422-452; https://doi.org/10.3390/jcp1030022
Action Date Notes Link
article pdf uploaded. 13 July 2021 16:47 CEST Version of Record https://www.mdpi.com/2624-800X/1/3/22/pdf-vor
article xml file uploaded 15 July 2021 05:06 CEST Original file -
article xml uploaded. 15 July 2021 05:06 CEST Update https://www.mdpi.com/2624-800X/1/3/22/xml
article pdf uploaded. 15 July 2021 05:06 CEST Updated version of record https://www.mdpi.com/2624-800X/1/3/22/pdf
article html file updated 15 July 2021 05:08 CEST Original file -
article html file updated 15 July 2021 10:03 CEST Update -
article html file updated 27 July 2022 04:42 CEST Update https://www.mdpi.com/2624-800X/1/3/22/html
Back to TopTop