Next Article in Journal
Blockchain-Based Evidence Trustworthiness System in Certification
Previous Article in Journal
An Android-Based Internet of Medical Things Adaptive User Authentication and Authorization Model for the Elderly
Previous Article in Special Issue
Machine Learning Detection of Cloud Services Abuse as C&C Infrastructure
 
 
Systematic Review

Article Versions Notes

J. Cybersecur. Priv. 2024, 4(4), 1018-1043; https://doi.org/10.3390/jcp4040047
Action Date Notes Link
article xml file uploaded 2 December 2024 11:04 CET Original file -
article xml uploaded. 2 December 2024 11:04 CET Update https://www.mdpi.com/2624-800X/4/4/47/xml
article pdf uploaded. 2 December 2024 11:04 CET Version of Record https://www.mdpi.com/2624-800X/4/4/47/pdf
article html file updated 2 December 2024 11:06 CET Original file -
article html file updated 1 July 2025 15:05 CEST Update https://www.mdpi.com/2624-800X/4/4/47/html
Back to TopTop