Next Article in Journal
Cyber Crime Investigation: Landscape, Challenges, and Future Research Directions
Next Article in Special Issue
Insights into Organizational Security Readiness: Lessons Learned from Cyber-Attack Case Studies
Previous Article in Journal
Assessing Competencies Using Scenario-Based Learning in Cybersecurity
Previous Article in Special Issue
An Empirical Assessment of Endpoint Detection and Response Systems against Advanced Persistent Threats Attack Vectors
 
 
Article

Article Versions Notes

J. Cybersecur. Priv. 2021, 1(4), 553-579; https://doi.org/10.3390/jcp1040028
Action Date Notes Link
article xml file uploaded 24 September 2021 17:27 CEST Original file -
article xml uploaded. 24 September 2021 17:27 CEST Update https://www.mdpi.com/2624-800X/1/4/28/xml
article pdf uploaded. 24 September 2021 17:27 CEST Version of Record https://www.mdpi.com/2624-800X/1/4/28/pdf
article html file updated 24 September 2021 17:28 CEST Original file -
article html file updated 30 July 2022 07:32 CEST Update https://www.mdpi.com/2624-800X/1/4/28/html
Back to TopTop