Next Article in Journal
Image Encryption Algorithms: A Survey of Design and Evaluation Metrics
Next Article in Special Issue
Mapping Automated Cyber Attack Intelligence to Context-Based Impact on System-Level Goals
Previous Article in Journal
Experiential Transformation in Privacy Behavior: A New Framework for Privacy Behavior Enhancement
Previous Article in Special Issue
Evaluating Cluster-Based Synthetic Data Generation for Blood-Transfusion Analysis
 
 
Article

Article Versions Notes

J. Cybersecur. Priv. 2024, 4(1), 105-125; https://doi.org/10.3390/jcp4010006
Action Date Notes Link
article xml file uploaded 23 February 2024 10:54 CET Original file -
article xml uploaded. 23 February 2024 10:54 CET Update https://www.mdpi.com/2624-800X/4/1/6/xml
article pdf uploaded. 23 February 2024 10:54 CET Version of Record https://www.mdpi.com/2624-800X/4/1/6/pdf
article html file updated 23 February 2024 10:55 CET Original file https://www.mdpi.com/2624-800X/4/1/6/html
Back to TopTop