Next Article in Journal
Secured Audio Framework Based on Chaotic-Steganography Algorithm for Internet of Things Systems
Previous Article in Journal
Detecting Zero-Day Web Attacks with an Ensemble of LSTM, GRU, and Stacked Autoencoders
Previous Article in Special Issue
Using Augmented Reality to Improve Touristic Efficacy
 
 
Article

Article Versions Notes

Computers 2025, 14(6), 206; https://doi.org/10.3390/computers14060206
Action Date Notes Link
article xml file uploaded 26 May 2025 11:21 CEST Original file -
article xml uploaded. 26 May 2025 11:21 CEST Update -
article pdf uploaded. 26 May 2025 11:21 CEST Version of Record -
article html file updated 26 May 2025 11:24 CEST Original file -
article xml file uploaded 26 May 2025 11:30 CEST Update -
article xml uploaded. 26 May 2025 11:30 CEST Update -
article pdf uploaded. 26 May 2025 11:30 CEST Updated version of record -
article html file updated 26 May 2025 11:32 CEST Update -
article xml file uploaded 26 May 2025 11:50 CEST Update -
article xml uploaded. 26 May 2025 11:50 CEST Update -
article pdf uploaded. 26 May 2025 11:50 CEST Updated version of record -
article html file updated 26 May 2025 11:52 CEST Update -
article xml file uploaded 26 May 2025 11:59 CEST Update -
article xml uploaded. 26 May 2025 11:59 CEST Update https://www.mdpi.com/2073-431X/14/6/206/xml
article pdf uploaded. 26 May 2025 11:59 CEST Updated version of record https://www.mdpi.com/2073-431X/14/6/206/pdf
article html file updated 26 May 2025 12:01 CEST Update https://www.mdpi.com/2073-431X/14/6/206/html
Back to TopTop