Next Article in Journal
Understanding Social Engineering Victimisation on Social Networking Sites: A Comprehensive Review of Factors Influencing User Susceptibility to Cyber-Attacks
Next Article in Special Issue
From Pixels to Diagnosis: Implementing and Evaluating a CNN Model for Tomato Leaf Disease Detection
Previous Article in Journal
Popularity Bias in Recommender Systems: The Search for Fairness in the Long Tail
Previous Article in Special Issue
A Method for Maintaining a Unique Kurume Kasuri Pattern of Woven Textile Classified by EfficientNet by Means of LightGBM-Based Prediction of Misalignments
 
 
Article

Article Versions Notes

Information 2025, 16(2), 152; https://doi.org/10.3390/info16020152
Action Date Notes Link
article xml file uploaded 19 February 2025 10:50 CET Original file -
article xml uploaded. 19 February 2025 10:50 CET Update https://www.mdpi.com/2078-2489/16/2/152/xml
article pdf uploaded. 19 February 2025 10:50 CET Version of Record https://www.mdpi.com/2078-2489/16/2/152/pdf
article html file updated 19 February 2025 10:54 CET Original file https://www.mdpi.com/2078-2489/16/2/152/html
Back to TopTop