Next Article in Journal
BTH: Behavior-Based Structured Threat Hunting Framework to Analyze and Detect Advanced Adversaries
Previous Article in Journal
An Empirical Comparison of Pen-Testing Tools for Detecting Web App Vulnerabilities
 
 
Article

Article Versions Notes

Electronics 2022, 11(19), 2993; https://doi.org/10.3390/electronics11192993
Action Date Notes Link
article pdf uploaded. 21 September 2022 13:24 CEST Version of Record https://www.mdpi.com/2079-9292/11/19/2993/pdf-vor
article xml file uploaded 10 October 2022 03:45 CEST Original file -
article xml uploaded. 10 October 2022 03:45 CEST Update https://www.mdpi.com/2079-9292/11/19/2993/xml
article pdf uploaded. 10 October 2022 03:45 CEST Updated version of record https://www.mdpi.com/2079-9292/11/19/2993/pdf
article html file updated 10 October 2022 03:46 CEST Original file -
article html file updated 10 October 2022 09:58 CEST Update -
article html file updated 28 February 2023 14:36 CET Update https://www.mdpi.com/2079-9292/11/19/2993/html
Back to TopTop