Next Article in Journal
Threats to the Digital Ecosystem: Can Information Security Management Frameworks, Guided by Criminological Literature, Effectively Prevent Cybercrime and Protect Public Data?
Previous Article in Journal
A Systematic Literature Review on Load-Balancing Techniques in Fog Computing: Architectures, Strategies, and Emerging Trends
Previous Article in Special Issue
Accounting Support Using Artificial Intelligence for Bank Statement Classification
 
 
Article

Article Versions Notes

Computers 2025, 14(6), 218; https://doi.org/10.3390/computers14060218
Action Date Notes Link
article xml file uploaded 3 June 2025 12:03 CEST Original file -
article xml uploaded. 3 June 2025 12:03 CEST Update -
article pdf uploaded. 3 June 2025 12:03 CEST Version of Record https://www.mdpi.com/2073-431X/14/6/218/pdf-vor
article html file updated 3 June 2025 12:06 CEST Original file -
article xml file uploaded 17 June 2025 03:04 CEST Update -
article xml uploaded. 17 June 2025 03:04 CEST Update https://www.mdpi.com/2073-431X/14/6/218/xml
article pdf uploaded. 17 June 2025 03:04 CEST Updated version of record https://www.mdpi.com/2073-431X/14/6/218/pdf
article html file updated 17 June 2025 03:06 CEST Update -
article html file updated 25 June 2025 07:59 CEST Update https://www.mdpi.com/2073-431X/14/6/218/html
Back to TopTop