Next Article in Journal
How to Influence Privacy Behavior Using Cognitive Theory and Respective Determinant Factors
Next Article in Special Issue
D2WFP: A Novel Protocol for Forensically Identifying, Extracting, and Analysing Deep and Dark Web Browsing Activities
Previous Article in Journal
Power-Based Side-Channel Attacks on Program Control Flow with Machine Learning Models
Previous Article in Special Issue
Investigating the Privacy and Security of the SimpliSafe Security System on Android and iOS
 
 
Article

Article Versions Notes

J. Cybersecur. Priv. 2023, 3(3), 364-395; https://0-doi-org.brum.beds.ac.uk/10.3390/jcp3030019
Action Date Notes Link
article xml file uploaded 10 July 2023 14:21 CEST Original file -
article xml uploaded. 10 July 2023 14:21 CEST Update https://0-www-mdpi-com.brum.beds.ac.uk/2624-800X/3/3/19/xml
article pdf uploaded. 10 July 2023 14:21 CEST Version of Record https://0-www-mdpi-com.brum.beds.ac.uk/2624-800X/3/3/19/pdf
article html file updated 10 July 2023 14:22 CEST Original file -
article html file updated 20 July 2023 21:31 CEST Update https://0-www-mdpi-com.brum.beds.ac.uk/2624-800X/3/3/19/html
Back to TopTop