Next Article in Journal
Users’ Privacy Attitudes towards the Use of Behavioral Biometrics Continuous Authentication (BBCA) Technologies: A Protection Motivation Theory Approach
Next Article in Special Issue
Polymorphic Adversarial Cyberattacks Using WGAN
Previous Article in Journal
The Effect of Countermeasure Readability on Security Intentions
Previous Article in Special Issue
New Semi-Prime Factorization and Application in Large RSA Key Attacks
 
 
Article

Article Versions Notes

J. Cybersecur. Priv. 2021, 1(4), 704-742; https://doi.org/10.3390/jcp1040035
Action Date Notes Link
article pdf uploaded. 30 November 2021 15:10 CET Version of Record https://www.mdpi.com/2624-800X/1/4/35/pdf-vor
article xml file uploaded 2 December 2021 04:20 CET Original file -
article xml uploaded. 2 December 2021 04:20 CET Update https://www.mdpi.com/2624-800X/1/4/35/xml
article pdf uploaded. 2 December 2021 04:20 CET Updated version of record https://www.mdpi.com/2624-800X/1/4/35/pdf
article html file updated 2 December 2021 04:22 CET Original file -
article html file updated 2 December 2021 10:13 CET Update -
article html file updated 30 July 2022 19:47 CEST Update https://www.mdpi.com/2624-800X/1/4/35/html
Back to TopTop