Next Article in Journal
Design and Implement an Accurate Automated Static Analysis Checker to Detect Insecure Use of SecurityManager
Next Article in Special Issue
Performance Comparison of Directed Acyclic Graph-Based Distributed Ledgers and Blockchain Platforms
Previous Article in Journal
Optimizing Intrusion Detection Systems in Three Phases on the CSE-CIC-IDS-2018 Dataset
Previous Article in Special Issue
Securing Financial Transactions with a Robust Algorithm: Preventing Double-Spending Attacks
 
 
Article

Article Versions Notes

Computers 2023, 12(12), 246; https://doi.org/10.3390/computers12120246
Action Date Notes Link
article xml file uploaded 24 November 2023 15:36 CET Original file -
article xml uploaded. 24 November 2023 15:36 CET Update https://www.mdpi.com/2073-431X/12/12/246/xml
article pdf uploaded. 24 November 2023 15:36 CET Version of Record https://www.mdpi.com/2073-431X/12/12/246/pdf
article html file updated 24 November 2023 15:38 CET Original file https://www.mdpi.com/2073-431X/12/12/246/html
Back to TopTop