Next Article in Journal
Towards Securing Smart Homes: A Systematic Literature Review of Malware Detection Techniques and Recommended Prevention Approach
Next Article in Special Issue
Digital Transformation in Energy Sector: Cybersecurity Challenges and Implications
Previous Article in Journal
Using 3D Hand Pose Data in Recognizing Human–Object Interaction and User Identification for Extended Reality Systems
Previous Article in Special Issue
Improving the Cybersecurity Awareness of Young Adults through a Game-Based Informal Learning Strategy
 
 
Article

Article Versions Notes

Information 2024, 15(10), 630; https://doi.org/10.3390/info15100630
Action Date Notes Link
article xml file uploaded 12 October 2024 11:20 CEST Original file -
article xml uploaded. 12 October 2024 11:20 CEST Update https://www.mdpi.com/2078-2489/15/10/630/xml
article pdf uploaded. 12 October 2024 11:20 CEST Version of Record https://www.mdpi.com/2078-2489/15/10/630/pdf
article html file updated 12 October 2024 11:23 CEST Original file https://www.mdpi.com/2078-2489/15/10/630/html
Back to TopTop