Next Article in Journal
Data Augmentation-Driven Improvements in Malignant Lymphoma Image Classification
Next Article in Special Issue
Electric Network Frequency as Environmental Fingerprint for Metaverse Security: A Comprehensive Survey
Previous Article in Journal
The Integration of the Internet of Things (IoT) Applications into 5G Networks: A Review and Analysis
Previous Article in Special Issue
Threats to the Digital Ecosystem: Can Information Security Management Frameworks, Guided by Criminological Literature, Effectively Prevent Cybercrime and Protect Public Data?
 
 
Review

Article Versions Notes

Computers 2025, 14(7), 251; https://doi.org/10.3390/computers14070251
Action Date Notes Link
article pdf uploaded. 25 June 2025 14:18 CEST Version of Record https://www.mdpi.com/2073-431X/14/7/251/pdf-vor
article xml file uploaded 26 June 2025 08:35 CEST Original file -
article xml uploaded. 26 June 2025 08:35 CEST Update https://www.mdpi.com/2073-431X/14/7/251/xml
article pdf uploaded. 26 June 2025 08:35 CEST Updated version of record https://www.mdpi.com/2073-431X/14/7/251/pdf
article html file updated 26 June 2025 08:38 CEST Original file https://www.mdpi.com/2073-431X/14/7/251/html
Back to TopTop