Next Article in Journal
Extending the Quality of Secure Service Model to Multi-Hop Networks
Next Article in Special Issue
HEAD Access Control Metamodel: Distinct Design, Advanced Features, and New Opportunities
Previous Article in Journal
Users’ Privacy Attitudes towards the Use of Behavioral Biometrics Continuous Authentication (BBCA) Technologies: A Protection Motivation Theory Approach
Previous Article in Special Issue
Modeling Correlation between Android Permissions Based on Threat and Protection Level Using Exploratory Factor Plane Analysis
 
 
Article

Article Versions Notes

J. Cybersecur. Priv. 2021, 1(4), 767-792; https://doi.org/10.3390/jcp1040037
Action Date Notes Link
article pdf uploaded. 12 December 2021 09:13 CET Version of Record https://www.mdpi.com/2624-800X/1/4/37/pdf-vor
article pdf uploaded. 12 December 2021 09:17 CET Updated version of record https://www.mdpi.com/2624-800X/1/4/37/pdf-vor
article xml file uploaded 15 December 2021 11:02 CET Original file -
article xml uploaded. 15 December 2021 11:02 CET Update -
article pdf uploaded. 15 December 2021 11:02 CET Updated version of record https://www.mdpi.com/2624-800X/1/4/37/pdf-vor
article html file updated 15 December 2021 11:03 CET Original file -
article xml file uploaded 16 December 2021 11:01 CET Update -
article xml uploaded. 16 December 2021 11:01 CET Update https://www.mdpi.com/2624-800X/1/4/37/xml
article pdf uploaded. 16 December 2021 11:01 CET Updated version of record https://www.mdpi.com/2624-800X/1/4/37/pdf
article html file updated 16 December 2021 11:02 CET Update -
article html file updated 30 July 2022 21:49 CEST Update https://www.mdpi.com/2624-800X/1/4/37/html
Back to TopTop