Next Article in Journal
NLP Models for Military Terminology Analysis and Detection of Information Operations on Social Media
Next Article in Special Issue
Secure DNA Cryptosystem for Data Protection in Cloud Storage and Retrieval
Previous Article in Journal
trustSense: Measuring Human Oversight Maturity for Trustworthy AI
Previous Article in Special Issue
Implementation of Ring Learning-with-Errors Encryption and Brakerski–Fan–Vercauteren Fully Homomorphic Encryption Using ChatGPT
 
 
Article

Article Versions Notes

Computers 2025, 14(11), 484; https://doi.org/10.3390/computers14110484
Action Date Notes Link
article html file updated 7 November 2025 07:20 CET Original file https://www.mdpi.com/2073-431X/14/11/484/html
article pdf uploaded. 7 November 2025 07:17 CET Updated version of record https://www.mdpi.com/2073-431X/14/11/484/pdf
article xml uploaded. 7 November 2025 07:17 CET Update https://www.mdpi.com/2073-431X/14/11/484/xml
article xml file uploaded 7 November 2025 07:17 CET Original file -
article pdf uploaded. 6 November 2025 15:11 CET Version of Record https://www.mdpi.com/2073-431X/14/11/484/pdf-vor
Back to TopTop