Next Article in Journal
Feature Extraction Methods for Underwater Acoustic Target Recognition of Divers
Next Article in Special Issue
Revolutionizing SIEM Security: An Innovative Correlation Engine Design for Multi-Layered Attack Detection
Previous Article in Journal
A Method for Real-Time Recognition of Safflower Filaments in Unstructured Environments Using the YOLO-SaFi Model
Previous Article in Special Issue
BEC Defender: QR Code-Based Methodology for Prevention of Business Email Compromise (BEC) Attacks
 
 
Review

Article Versions Notes

Sensors 2024, 24(13), 4411; https://doi.org/10.3390/s24134411
Action Date Notes Link
article xml file uploaded 8 July 2024 11:07 CEST Original file -
article xml uploaded. 8 July 2024 11:07 CEST Update https://www.mdpi.com/1424-8220/24/13/4411/xml
article pdf uploaded. 8 July 2024 11:07 CEST Version of Record https://www.mdpi.com/1424-8220/24/13/4411/pdf
article html file updated 8 July 2024 11:09 CEST Original file https://www.mdpi.com/1424-8220/24/13/4411/html
Back to TopTop