Next Article in Journal
A Usable Encryption Solution for File-Based Geospatial Data within a Database File System
Next Article in Special Issue
Bridging the Gap: A Survey and Classification of Research-Informed Ethical Hacking Tools
Previous Article in Journal
Facilitating the Integrative Use of Security Knowledge Bases within a Modelling Environment
Previous Article in Special Issue
On Data Leakage Prevention Maturity: Adapting the C2M2 Framework
 
 
Article

Article Versions Notes

J. Cybersecur. Priv. 2024, 4(2), 278-297; https://doi.org/10.3390/jcp4020014
Action Date Notes Link
article xml file uploaded 1 May 2024 15:28 CEST Original file -
article xml uploaded. 1 May 2024 15:28 CEST Update https://www.mdpi.com/2624-800X/4/2/14/xml
article pdf uploaded. 1 May 2024 15:28 CEST Version of Record https://www.mdpi.com/2624-800X/4/2/14/pdf
article html file updated 1 May 2024 15:31 CEST Original file https://www.mdpi.com/2624-800X/4/2/14/html
Back to TopTop