Next Article in Journal
An Appearance Defect Detection Method for Cigarettes Based on C-CenterNet
Previous Article in Journal
Using Deep Learning Networks to Identify Cyber Attacks on Intrusion Detection for In-Vehicle Networks
Previous Article in Special Issue
Secure Token–Key Implications in an Enterprise Multi-Tenancy Environment Using BGV–EHC Hybrid Homomorphic Encryption
 
 
Review

Article Versions Notes

Electronics 2022, 11(14), 2181; https://doi.org/10.3390/electronics11142181
Action Date Notes Link
article xml file uploaded 12 July 2022 12:23 CEST Original file -
article xml uploaded. 12 July 2022 12:23 CEST Update https://www.mdpi.com/2079-9292/11/14/2181/xml
article pdf uploaded. 12 July 2022 12:23 CEST Version of Record https://www.mdpi.com/2079-9292/11/14/2181/pdf
article html file updated 12 July 2022 12:24 CEST Original file -
article html file updated 13 August 2022 01:21 CEST Update https://www.mdpi.com/2079-9292/11/14/2181/html
Back to TopTop