Next Article in Journal
Detection of Malicious Office Open Documents (OOXML) Using Large Language Models: A Static Analysis Approach
Previous Article in Journal
Security Hardening and Compliance Assessment of Kubernetes Control Plane and Workloads
 
 
Article

Article Versions Notes

J. Cybersecur. Priv. 2025, 5(2), 31; https://doi.org/10.3390/jcp5020031
Action Date Notes Link
article xml file uploaded 5 June 2025 05:05 CEST Original file -
article xml uploaded. 5 June 2025 05:05 CEST Update -
article pdf uploaded. 5 June 2025 05:06 CEST Version of Record -
article html file updated 5 June 2025 05:08 CEST Original file -
article xml file uploaded 5 June 2025 10:13 CEST Update -
article xml uploaded. 5 June 2025 10:13 CEST Update https://www.mdpi.com/2624-800X/5/2/31/xml
article pdf uploaded. 5 June 2025 10:13 CEST Updated version of record https://www.mdpi.com/2624-800X/5/2/31/pdf
article html file updated 5 June 2025 10:15 CEST Update -
article html file updated 25 June 2025 08:15 CEST Update https://www.mdpi.com/2624-800X/5/2/31/html
Back to TopTop