Next Article in Journal
A Trust-Aware Incentive Mechanism for Federated Learning with Heterogeneous Clients in Edge Computing
Next Article in Special Issue
Triple-Shield Privacy in Healthcare: Federated Learning, p-ABCs, and Distributed Ledger Authentication
Previous Article in Journal
Collateral Damage from Offensive Cyber Operations—A Systematic Literature Review
Previous Article in Special Issue
Protection of Personal Data in the Context of E-Commerce
 
 
Article

Article Versions Notes

J. Cybersecur. Priv. 2025, 5(3), 36; https://doi.org/10.3390/jcp5030036
Action Date Notes Link
article xml file uploaded 22 June 2025 11:13 CEST Original file -
article xml uploaded. 22 June 2025 11:13 CEST Update https://www.mdpi.com/2624-800X/5/3/36/xml
article pdf uploaded. 22 June 2025 11:13 CEST Version of Record https://www.mdpi.com/2624-800X/5/3/36/pdf
article html file updated 22 June 2025 11:15 CEST Original file -
article html file updated 25 June 2025 10:53 CEST Update https://www.mdpi.com/2624-800X/5/3/36/html
Back to TopTop