Next Article in Journal
Trustworthiness of Situational Awareness: Significance and Quantification
Next Article in Special Issue
Data-Driven Network Anomaly Detection with Cyber Attack and Defense Visualization
Previous Article in Journal
On Data Leakage Prevention Maturity: Adapting the C2M2 Framework
Previous Article in Special Issue
ScriptBlock Smuggling: Uncovering Stealthy Evasion Techniques in PowerShell and .NET Environments
 
 
Article

Article Versions Notes

J. Cybersecur. Priv. 2024, 4(2), 196-222; https://doi.org/10.3390/jcp4020010
Action Date Notes Link
article xml file uploaded 31 March 2024 10:56 CEST Original file -
article xml uploaded. 31 March 2024 10:56 CEST Update https://www.mdpi.com/2624-800X/4/2/10/xml
article pdf uploaded. 31 March 2024 10:56 CEST Version of Record https://www.mdpi.com/2624-800X/4/2/10/pdf
article html file updated 31 March 2024 10:58 CEST Original file https://www.mdpi.com/2624-800X/4/2/10/html
Back to TopTop