Next Article in Journal
Ads and Fraud: A Comprehensive Survey of Fraud in Online Advertising
Next Article in Special Issue
A Trust-Based Intrusion Detection System for RPL Networks: Detecting a Combination of Rank and Blackhole Attacks
Previous Article in Journal
Polymorphic Adversarial Cyberattacks Using WGAN
Previous Article in Special Issue
A Methodological Approach to Evaluate Security Requirements Engineering Methodologies: Application to the IREHDO2 Project Context
 
 
Article

Article Versions Notes

J. Cybersecur. Priv. 2021, 1(4), 793-803; https://0-doi-org.brum.beds.ac.uk/10.3390/jcp1040038
Action Date Notes Link
article pdf uploaded. 15 December 2021 16:36 CET Version of Record https://0-www-mdpi-com.brum.beds.ac.uk/2624-800X/1/4/38/pdf-vor
article xml file uploaded 17 December 2021 03:26 CET Original file -
article xml uploaded. 17 December 2021 03:26 CET Update https://0-www-mdpi-com.brum.beds.ac.uk/2624-800X/1/4/38/xml
article pdf uploaded. 17 December 2021 03:26 CET Updated version of record https://0-www-mdpi-com.brum.beds.ac.uk/2624-800X/1/4/38/pdf
article html file updated 17 December 2021 03:28 CET Original file -
article html file updated 17 December 2021 10:04 CET Update -
article html file updated 30 July 2022 22:33 CEST Update https://0-www-mdpi-com.brum.beds.ac.uk/2624-800X/1/4/38/html
Back to TopTop