Next Article in Journal
Cybersecurity Practices for Social Media Users: A Systematic Literature Review
Next Article in Special Issue
Requirements for Crafting Virtual Network Packet Captures
Previous Article in Journal
Extending the Quality of Secure Service Model to Multi-Hop Networks
 
 
Article

Article Versions Notes

J. Cybersecur. Priv. 2021, 1(4), 804-832; https://doi.org/10.3390/jcp1040039
Action Date Notes Link
article xml uploaded. 16 December 2021 12:01 CET Original file -
article xml file uploaded 16 December 2021 12:01 CET Update -
article pdf uploaded. 16 December 2021 12:01 CET Version of Record https://www.mdpi.com/2624-800X/1/4/39/pdf-vor
article html file updated 16 December 2021 12:02 CET Original file -
article xml file uploaded 16 December 2021 12:34 CET Update -
article xml uploaded. 16 December 2021 12:34 CET Update -
article pdf uploaded. 16 December 2021 12:34 CET Updated version of record https://www.mdpi.com/2624-800X/1/4/39/pdf-vor
article xml uploaded. 16 December 2021 12:35 CET Update -
article xml file uploaded 16 December 2021 12:35 CET Update -
article pdf uploaded. 16 December 2021 12:35 CET Updated version of record https://www.mdpi.com/2624-800X/1/4/39/pdf-vor
article html file updated 16 December 2021 12:35 CET Update -
article html file updated 16 December 2021 12:36 CET Update -
article xml file uploaded 17 December 2021 02:15 CET Update -
article xml uploaded. 17 December 2021 02:15 CET Update https://www.mdpi.com/2624-800X/1/4/39/xml
article pdf uploaded. 17 December 2021 02:15 CET Updated version of record https://www.mdpi.com/2624-800X/1/4/39/pdf
article html file updated 17 December 2021 02:17 CET Update -
article html file updated 30 July 2022 22:41 CEST Update https://www.mdpi.com/2624-800X/1/4/39/html
Back to TopTop