Next Article in Journal
Utilizing Virtual Worlds for Training Professionals: The Case of Soft Skills Training of Smart City Engineers and Technicians
Next Article in Special Issue
Threats to the Digital Ecosystem: Can Information Security Management Frameworks, Guided by Criminological Literature, Effectively Prevent Cybercrime and Protect Public Data?
Previous Article in Journal
A Systematic Review of Mind Maps, STEM Education, Algorithmic and Procedural Learning
Previous Article in Special Issue
A Hybrid Deep Learning Approach for Secure Biometric Authentication Using Fingerprint Data
 
 
Article

Article Versions Notes

Computers 2025, 14(6), 205; https://doi.org/10.3390/computers14060205
Action Date Notes Link
article xml file uploaded 26 May 2025 10:11 CEST Original file -
article xml uploaded. 26 May 2025 10:11 CEST Update -
article pdf uploaded. 26 May 2025 10:11 CEST Version of Record https://www.mdpi.com/2073-431X/14/6/205/pdf-vor
article html file updated 26 May 2025 10:13 CEST Original file -
article xml file uploaded 10 June 2025 12:17 CEST Update -
article xml uploaded. 10 June 2025 12:17 CEST Update https://www.mdpi.com/2073-431X/14/6/205/xml
article pdf uploaded. 10 June 2025 12:17 CEST Updated version of record https://www.mdpi.com/2073-431X/14/6/205/pdf
article html file updated 10 June 2025 12:20 CEST Update -
article html file updated 25 June 2025 06:04 CEST Update https://www.mdpi.com/2073-431X/14/6/205/html
Back to TopTop