Next Article in Journal
An Integrated Approach to Cyber Risk Management with Cyber Threat Intelligence Framework to Secure Critical Infrastructure
Next Article in Special Issue
Humans and Automation: Augmenting Security Operation Centers
Previous Article in Journal
Understanding and Classifying Permanent Denial-of-Service Attacks
Previous Article in Special Issue
Incidental Data: A Survey towards Awareness on Privacy-Compromising Data Incidentally Shared on Social Media
 
 
Article

Article Versions Notes

J. Cybersecur. Priv. 2024, 4(2), 340-356; https://doi.org/10.3390/jcp4020017
Action Date Notes Link
article xml file uploaded 6 June 2024 04:58 CEST Original file -
article xml uploaded. 6 June 2024 04:58 CEST Update https://www.mdpi.com/2624-800X/4/2/17/xml
article pdf uploaded. 6 June 2024 04:58 CEST Version of Record https://www.mdpi.com/2624-800X/4/2/17/pdf
article html file updated 6 June 2024 05:00 CEST Original file https://www.mdpi.com/2624-800X/4/2/17/html
Back to TopTop