Next Article in Journal
Enhancing Ransomware Threat Detection: Risk-Aware Classification via Windows API Call Analysis and Hybrid ML/DL Models
Previous Article in Journal
Anomaly Detection Against Fake Base Station Threats Using Machine Learning
 
 
Systematic Review

Article Versions Notes

J. Cybersecur. Priv. 2025, 5(4), 95; https://doi.org/10.3390/jcp5040095
Action Date Notes Link
article xml file uploaded 5 November 2025 11:19 CET Original file -
article xml uploaded. 5 November 2025 11:19 CET Update -
article pdf uploaded. 5 November 2025 11:19 CET Version of Record -
article supplementary file uploaded. 5 November 2025 11:19 CET - https://www.mdpi.com/2624-800X/5/4/95#supplementary
article html file updated 5 November 2025 11:21 CET Original file -
article xml file uploaded 5 November 2025 11:36 CET Update -
article xml uploaded. 5 November 2025 11:36 CET Update -
article pdf uploaded. 5 November 2025 11:36 CET Updated version of record -
article html file updated 5 November 2025 11:38 CET Update -
article xml file uploaded 5 November 2025 11:38 CET Update -
article xml uploaded. 5 November 2025 11:38 CET Update https://www.mdpi.com/2624-800X/5/4/95/xml
article pdf uploaded. 5 November 2025 11:38 CET Updated version of record https://www.mdpi.com/2624-800X/5/4/95/pdf
article html file updated 5 November 2025 11:41 CET Update https://www.mdpi.com/2624-800X/5/4/95/html
Back to TopTop