Next Article in Journal
NLP Models for Military Terminology Analysis and Detection of Information Operations on Social Media
Previous Article in Journal
trustSense: Measuring Human Oversight Maturity for Trustworthy AI
Previous Article in Special Issue
Implementation of Ring Learning-with-Errors Encryption and Brakerski–Fan–Vercauteren Fully Homomorphic Encryption Using ChatGPT
 
 
Article

Article Versions Notes

Computers 2025, 14(11), 484; https://doi.org/10.3390/computers14110484
Action Date Notes Link
article pdf uploaded. 6 November 2025 15:11 CET Version of Record https://www.mdpi.com/2073-431X/14/11/484/pdf-vor
article xml file uploaded 7 November 2025 07:17 CET Original file -
article xml uploaded. 7 November 2025 07:17 CET Update https://www.mdpi.com/2073-431X/14/11/484/xml
article pdf uploaded. 7 November 2025 07:17 CET Updated version of record https://www.mdpi.com/2073-431X/14/11/484/pdf
article html file updated 7 November 2025 07:20 CET Original file https://www.mdpi.com/2073-431X/14/11/484/html
Back to TopTop