Next Article in Journal
The Rise of Hacking in Integrated EHR Systems: A Trend Analysis of U.S. Healthcare Data Breaches
Previous Article in Journal
Novel Actionable Counterfactual Explanations for Intrusion Detection Using Diffusion Models
 
 
Article

Article Versions Notes

J. Cybersecur. Priv. 2025, 5(3), 69; https://doi.org/10.3390/jcp5030069
Action Date Notes Link
article xml file uploaded 5 September 2025 13:29 CEST Original file -
article xml uploaded. 5 September 2025 13:29 CEST Update -
article pdf uploaded. 5 September 2025 13:29 CEST Version of Record -
article html file updated 5 September 2025 13:31 CEST Original file -
article xml file uploaded 5 September 2025 15:11 CEST Update -
article xml uploaded. 5 September 2025 15:11 CEST Update https://www.mdpi.com/2624-800X/5/3/69/xml
article pdf uploaded. 5 September 2025 15:11 CEST Updated version of record https://www.mdpi.com/2624-800X/5/3/69/pdf
article html file updated 5 September 2025 15:13 CEST Update https://www.mdpi.com/2624-800X/5/3/69/html
Back to TopTop