Next Article in Journal
Cybersecurity Threats in Saudi Healthcare: Exploring Email Communication Practices to Enhance Cybersecurity Among Healthcare Employees in Saudi Arabia
Previous Article in Journal
Digital Twin-Enhanced Programming Education: An Empirical Study on Learning Engagement and Skill Acquisition
Previous Article in Special Issue
Lexicon-Based Random Substitute and Word-Variant Voting Models for Detecting Textual Adversarial Attacks
 
 
Article

Article Versions Notes

Computers 2025, 14(8), 323; https://doi.org/10.3390/computers14080323
Action Date Notes Link
article pdf uploaded. 11 August 2025 14:32 CEST Version of Record https://www.mdpi.com/2073-431X/14/8/323/pdf-vor
article xml file uploaded 13 August 2025 13:38 CEST Original file -
article xml uploaded. 13 August 2025 13:38 CEST Update https://www.mdpi.com/2073-431X/14/8/323/xml
article pdf uploaded. 13 August 2025 13:38 CEST Updated version of record https://www.mdpi.com/2073-431X/14/8/323/pdf
article html file updated 13 August 2025 13:39 CEST Original file https://www.mdpi.com/2073-431X/14/8/323/html
Back to TopTop