Next Article in Journal / Special Issue
New Semi-Prime Factorization and Application in Large RSA Key Attacks
Previous Article in Journal
CyBERT: Cybersecurity Claim Classification by Fine-Tuning the BERT Language Model
Previous Article in Special Issue
Clone Node Detection Attacks and Mitigation Mechanisms in Static Wireless Sensor Networks
 
 
Review

Article Versions Notes

J. Cybersecur. Priv. 2021, 1(4), 638-659; https://doi.org/10.3390/jcp1040032
Action Date Notes Link
article xml file uploaded 11 November 2021 14:26 CET Original file -
article xml uploaded. 11 November 2021 14:26 CET Update -
article pdf uploaded. 11 November 2021 14:26 CET Version of Record https://www.mdpi.com/2624-800X/1/4/32/pdf-vor
article html file updated 11 November 2021 14:28 CET Original file -
article xml file uploaded 15 November 2021 11:13 CET Update -
article xml uploaded. 15 November 2021 11:13 CET Update -
article pdf uploaded. 15 November 2021 11:13 CET Updated version of record https://www.mdpi.com/2624-800X/1/4/32/pdf-vor
article html file updated 15 November 2021 11:15 CET Update -
article xml file uploaded 24 November 2021 09:28 CET Update -
article xml uploaded. 24 November 2021 09:28 CET Update https://www.mdpi.com/2624-800X/1/4/32/xml
article pdf uploaded. 24 November 2021 09:28 CET Updated version of record https://www.mdpi.com/2624-800X/1/4/32/pdf
article html file updated 24 November 2021 09:30 CET Update -
article html file updated 30 July 2022 16:09 CEST Update https://www.mdpi.com/2624-800X/1/4/32/html
Back to TopTop