Next Article in Journal
Genetic Approach to Improve Cryptographic Properties of Balanced Boolean Functions Using Bent Functions
Previous Article in Journal
Joining Federated Learning to Blockchain for Digital Forensics in IoT
Previous Article in Special Issue
Application of GNS3 to Study the Security of Data Exchange between Power Electronic Devices and Control Center
 
 
Article

Article Versions Notes

Computers 2023, 12(8), 158; https://doi.org/10.3390/computers12080158
Action Date Notes Link
article xml file uploaded 3 August 2023 08:46 CEST Original file -
article xml uploaded. 3 August 2023 08:46 CEST Update -
article pdf uploaded. 3 August 2023 08:46 CEST Version of Record -
article html file updated 3 August 2023 08:48 CEST Original file -
article html file updated 3 August 2023 08:49 CEST Update -
article html file updated 3 August 2023 08:50 CEST Update -
article xml file uploaded 3 August 2023 08:52 CEST Update -
article xml uploaded. 3 August 2023 08:52 CEST Update -
article pdf uploaded. 3 August 2023 08:52 CEST Updated version of record -
article html file updated 3 August 2023 08:54 CEST Update -
article xml file uploaded 3 August 2023 10:08 CEST Update -
article xml uploaded. 3 August 2023 10:08 CEST Update https://www.mdpi.com/2073-431X/12/8/158/xml
article pdf uploaded. 3 August 2023 10:08 CEST Updated version of record https://www.mdpi.com/2073-431X/12/8/158/pdf
article html file updated 3 August 2023 10:10 CEST Update -
article html file updated 3 August 2023 10:12 CEST Update -
article html file updated 20 August 2023 20:21 CEST Update https://www.mdpi.com/2073-431X/12/8/158/html
Back to TopTop