Next Article in Journal
Security Operations Centers: Use Case Best Practices, Coverage, and Gap Analysis Based on MITRE Adversarial Tactics, Techniques, and Common Knowledge
Previous Article in Journal
Protection of Personal Data in the Context of E-Commerce
 
 
Article

Article Versions Notes

J. Cybersecur. Priv. 2024, 4(3), 762-776; https://doi.org/10.3390/jcp4030035
Action Date Notes Link
article xml file uploaded 20 September 2024 11:17 CEST Original file -
article xml uploaded. 20 September 2024 11:17 CEST Update https://www.mdpi.com/2624-800X/4/3/35/xml
article pdf uploaded. 20 September 2024 11:17 CEST Version of Record https://www.mdpi.com/2624-800X/4/3/35/pdf
article html file updated 20 September 2024 11:20 CEST Original file https://www.mdpi.com/2624-800X/4/3/35/html
Back to TopTop