Next Article in Journal
Checked and Approved? Human Resources Managers’ Uses of Social Media for Cybervetting
Next Article in Special Issue
Contactless Fingerprint Recognition Using Deep Learning—A Systematic Review
Previous Article in Journal
The State of Ethereum Smart Contracts Security: Vulnerabilities, Countermeasures, and Tool Support
Previous Article in Special Issue
Unsupervised Machine Learning Techniques for Detecting PLC Process Control Anomalies
 
 
Article

Article Versions Notes

J. Cybersecur. Priv. 2022, 2(2), 379-401; https://doi.org/10.3390/jcp2020020
Action Date Notes Link
article xml file uploaded 31 May 2022 10:12 CEST Original file -
article xml uploaded. 31 May 2022 10:12 CEST Update https://www.mdpi.com/2624-800X/2/2/20/xml
article pdf uploaded. 31 May 2022 10:12 CEST Version of Record https://www.mdpi.com/2624-800X/2/2/20/pdf
article html file updated 31 May 2022 10:17 CEST Original file -
article html file updated 3 August 2022 02:48 CEST Update https://www.mdpi.com/2624-800X/2/2/20/html
Back to TopTop