Next Article in Journal
A Comprehensive Analysis of Evolving Permission Usage in Android Apps: Trends, Threats, and Ecosystem Insights
Previous Article in Journal
When Things Heat Up: Detecting Malicious Activity Using CPU Thermal Sensors
Previous Article in Special Issue
Triple-Shield Privacy in Healthcare: Federated Learning, p-ABCs, and Distributed Ledger Authentication
 
 
Article

Article Versions Notes

J. Cybersecur. Priv. 2025, 5(3), 57; https://doi.org/10.3390/jcp5030057
Action Date Notes Link
article xml file uploaded 12 August 2025 03:35 CEST Original file -
article xml uploaded. 12 August 2025 03:35 CEST Update https://www.mdpi.com/2624-800X/5/3/57/xml
article pdf uploaded. 12 August 2025 03:35 CEST Version of Record https://www.mdpi.com/2624-800X/5/3/57/pdf
article html file updated 12 August 2025 03:37 CEST Original file https://www.mdpi.com/2624-800X/5/3/57/html
Back to TopTop