Next Article in Journal
Combating Fake News with Cryptography in Quantum Era with Post-Quantum Verifiable Image Proofs
Next Article in Special Issue
Evaluating End-User Defensive Approaches Against Phishing Using Education and Simulated Attacks in a Croatian University
Previous Article in Journal / Special Issue
Steganalysis of Adaptive Multi-Rate Speech with Unknown Embedding Rates Using Multi-Scale Transformer and Multi-Task Learning Mechanism
 
 
Article

Article Versions Notes

J. Cybersecur. Priv. 2025, 5(2), 30; https://doi.org/10.3390/jcp5020030
Action Date Notes Link
article xml file uploaded 4 June 2025 08:07 CEST Original file -
article xml uploaded. 4 June 2025 08:07 CEST Update -
article pdf uploaded. 4 June 2025 08:07 CEST Version of Record https://www.mdpi.com/2624-800X/5/2/30/pdf-vor
article html file updated 4 June 2025 08:10 CEST Original file -
article xml file uploaded 17 June 2025 02:33 CEST Update -
article xml uploaded. 17 June 2025 02:34 CEST Update https://www.mdpi.com/2624-800X/5/2/30/xml
article pdf uploaded. 17 June 2025 02:34 CEST Updated version of record https://www.mdpi.com/2624-800X/5/2/30/pdf
article html file updated 17 June 2025 02:37 CEST Update -
article html file updated 25 June 2025 08:06 CEST Update https://www.mdpi.com/2624-800X/5/2/30/html
Back to TopTop