Next Article in Journal
Driver Behavior Analysis via Two-Stream Deep Convolutional Neural Network
Next Article in Special Issue
Investigation of Dual-Flow Deep Learning Models LSTM-FCN and GRU-FCN Efficiency against Single-Flow CNN Models for the Host-Based Intrusion and Malware Detection Task on Univariate Times Series Data
Previous Article in Journal
On the Use of Neuro-Swarm System to Forecast the Pile Settlement
Previous Article in Special Issue
Towards a Reliable Comparison and Evaluation of Network Intrusion Detection Systems Based on Machine Learning Approaches
 
 
Article

Article Versions Notes

Appl. Sci. 2020, 10(6), 1909; https://doi.org/10.3390/app10061909
Action Date Notes Link
article xml file uploaded 11 March 2020 11:42 CET Original file -
article pdf uploaded. 11 March 2020 11:42 CET Version of Record https://www.mdpi.com/2076-3417/10/6/1909/pdf-vor
article xml file uploaded 16 March 2020 05:19 CET Update -
article xml uploaded. 16 March 2020 05:19 CET Update -
article pdf uploaded. 16 March 2020 05:19 CET Updated version of record https://www.mdpi.com/2076-3417/10/6/1909/pdf-vor
article html file updated 16 March 2020 05:20 CET Original file -
article xml file uploaded 17 March 2020 04:39 CET Update -
article xml uploaded. 17 March 2020 04:39 CET Update https://www.mdpi.com/2076-3417/10/6/1909/xml
article pdf uploaded. 17 March 2020 04:39 CET Updated version of record https://www.mdpi.com/2076-3417/10/6/1909/pdf
article html file updated 17 March 2020 04:41 CET Update -
article html file updated 2 April 2020 07:51 CEST Update -
article html file updated 8 October 2020 18:15 CEST Update -
article html file updated 20 July 2022 22:35 CEST Update https://www.mdpi.com/2076-3417/10/6/1909/html
Back to TopTop