Next Article in Journal
Formal Analysis of Bakery-Based Mutual Exclusion Algorithms
Previous Article in Journal
Lightweight Encryption Algorithms for IoT
Previous Article in Special Issue
Enhancing Cyberattack Prevention Through Anomaly Detection Ensembles and Diverse Training Sets
 
 
Article

Article Versions Notes

Computers 2025, 14(12), 506; https://doi.org/10.3390/computers14120506 (registering DOI)
Action Date Notes Link
article xml file uploaded 23 November 2025 06:40 CET Original file -
article xml uploaded. 23 November 2025 06:40 CET Update -
article pdf uploaded. 23 November 2025 06:40 CET Version of Record -
article html file updated 23 November 2025 06:42 CET Original file -
article xml file uploaded 23 November 2025 07:07 CET Update -
article xml uploaded. 23 November 2025 07:07 CET Update https://www.mdpi.com/2073-431X/14/12/506/xml
article pdf uploaded. 23 November 2025 07:07 CET Updated version of record https://www.mdpi.com/2073-431X/14/12/506/pdf
article html file updated 23 November 2025 07:09 CET Update https://www.mdpi.com/2073-431X/14/12/506/html
Back to TopTop