Next Article in Journal
Optimizing Loss Functions for You Only Look Once Models: Improving Object Detection in Agricultural Datasets
Next Article in Special Issue
Hybrid CNN–BiLSTM–DNN Approach for Detecting Cybersecurity Threats in IoT Networks
Previous Article in Journal
Redefining Event Detection and Information Dissemination: Lessons from X (Twitter) Data Streams and Beyond
Previous Article in Special Issue
Hacking Exposed: Leveraging Google Dorks, Shodan, and Censys for Cyber Attacks and the Defense Against Them
 
 
Article

Article Versions Notes

Action Date Notes Link
article pdf uploaded. 29 January 2025 17:09 CET Version of Record https://www.mdpi.com/2073-431X/14/2/43/pdf-vor
article xml file uploaded 11 February 2025 09:57 CET Original file -
article xml uploaded. 11 February 2025 09:57 CET Update https://www.mdpi.com/2073-431X/14/2/43/xml
article pdf uploaded. 11 February 2025 09:58 CET Updated version of record https://www.mdpi.com/2073-431X/14/2/43/pdf
article html file updated 11 February 2025 10:01 CET Original file https://www.mdpi.com/2073-431X/14/2/43/html
Back to TopTop