Next Article in Journal
Challenging Assumptions of Normality in AES s-Box Configurations under Side-Channel Analysis
Next Article in Special Issue
Anomaly Detection for Modbus over TCP in Control Systems Using Entropy and Classification-Based Analysis
Previous Article in Journal
D2WFP: A Novel Protocol for Forensically Identifying, Extracting, and Analysing Deep and Dark Web Browsing Activities
Previous Article in Special Issue
Studying Imbalanced Learning for Anomaly-Based Intelligent IDS for Mission-Critical Internet of Things
 
 
Article

Article Versions Notes

J. Cybersecur. Priv. 2023, 3(4), 830-843; https://doi.org/10.3390/jcp3040037
Action Date Notes Link
article xml file uploaded 16 November 2023 09:35 CET Original file -
article xml uploaded. 16 November 2023 09:35 CET Update https://www.mdpi.com/2624-800X/3/4/37/xml
article pdf uploaded. 16 November 2023 09:35 CET Version of Record https://www.mdpi.com/2624-800X/3/4/37/pdf
article html file updated 16 November 2023 09:36 CET Original file https://www.mdpi.com/2624-800X/3/4/37/html
Back to TopTop