Next Article in Journal
Polymorphic Adversarial Cyberattacks Using WGAN
Previous Article in Journal
Modeling Correlation between Android Permissions Based on Threat and Protection Level Using Exploratory Factor Plane Analysis
 
 
Article

Article Versions Notes

J. Cybersecur. Priv. 2021, 1(4), 743-766; https://doi.org/10.3390/jcp1040036
Action Date Notes Link
article pdf uploaded. 3 December 2021 14:14 CET Version of Record https://www.mdpi.com/2624-800X/1/4/36/pdf-vor
article xml file uploaded 7 December 2021 10:45 CET Original file -
article xml uploaded. 7 December 2021 10:45 CET Update https://www.mdpi.com/2624-800X/1/4/36/xml
article pdf uploaded. 7 December 2021 10:45 CET Updated version of record https://www.mdpi.com/2624-800X/1/4/36/pdf
article html file updated 7 December 2021 10:46 CET Original file -
article html file updated 8 December 2021 09:58 CET Update -
article html file updated 30 July 2022 20:24 CEST Update https://www.mdpi.com/2624-800X/1/4/36/html
Back to TopTop