Next Article in Journal
An Empirical Assessment of Endpoint Detection and Response Systems against Advanced Persistent Threats Attack Vectors
Next Article in Special Issue
A Methodological Approach to Evaluate Security Requirements Engineering Methodologies: Application to the IREHDO2 Project Context
Previous Article in Journal
Secure Remote Storage of Logs with Search Capabilities
 
 
Article

Article Versions Notes

J. Cybersecur. Priv. 2021, 1(2), 365-386; https://0-doi-org.brum.beds.ac.uk/10.3390/jcp1020020
Action Date Notes Link
article xml file uploaded 9 June 2021 10:13 CEST Original file -
article xml uploaded. 9 June 2021 10:13 CEST Update https://0-www-mdpi-com.brum.beds.ac.uk/2624-800X/1/2/20/xml
article pdf uploaded. 9 June 2021 10:13 CEST Version of Record https://0-www-mdpi-com.brum.beds.ac.uk/2624-800X/1/2/20/pdf
article html file updated 9 June 2021 10:14 CEST Original file -
article html file updated 26 July 2022 23:30 CEST Update https://0-www-mdpi-com.brum.beds.ac.uk/2624-800X/1/2/20/html
Back to TopTop