Next Article in Journal
A Bug Triage Technique Using Developer-Based Feature Selection and CNN-LSTM Algorithm
Next Article in Special Issue
Malicious File Detection Method Using Machine Learning and Interworking with MITRE ATT&CK Framework
Previous Article in Journal
Passive Array-Invariant-Based Localization for a Small Horizontal Array Using Two-Dimensional Deconvolution
Previous Article in Special Issue
Evolutionary-Based Deep Stacked Autoencoder for Intrusion Detection in a Cloud-Based Cyber-Physical System
 
 
Article

Article Versions Notes

Appl. Sci. 2022, 12(18), 9357; https://doi.org/10.3390/app12189357
Action Date Notes Link
article pdf uploaded. 18 September 2022 15:09 CEST Version of Record https://www.mdpi.com/2076-3417/12/18/9357/pdf-vor
article xml file uploaded 21 September 2022 04:46 CEST Original file -
article xml uploaded. 21 September 2022 04:46 CEST Update https://www.mdpi.com/2076-3417/12/18/9357/xml
article pdf uploaded. 21 September 2022 04:46 CEST Updated version of record https://www.mdpi.com/2076-3417/12/18/9357/pdf
article html file updated 21 September 2022 04:47 CEST Original file https://www.mdpi.com/2076-3417/12/18/9357/html
Back to TopTop