Next Article in Journal
Design and Analysis of an Effective Multi-Barriers Model Based on Non-Stationary Gaussian Random Fields
Next Article in Special Issue
A New Optimal Method for the Secure Design of Combinational Circuits against Hardware Trojans Using Interference Logic Locking
Previous Article in Journal
Swarm Optimization and Machine Learning Applied to PE Malware Detection towards Cyber Threat Intelligence
Previous Article in Special Issue
Forensic Analysis of TikTok Alternatives on Android and iOS Devices: Byte, Dubsmash, and Triller
 
 
Article

Article Versions Notes

Electronics 2023, 12(2), 344; https://doi.org/10.3390/electronics12020344
Action Date Notes Link
article html file updated 3 September 2025 22:14 CEST Update https://www.mdpi.com/2079-9292/12/2/344/html
article html file updated 7 March 2023 21:45 CET Update -
article html file updated 17 January 2023 12:10 CET Original file -
article pdf uploaded. 17 January 2023 12:08 CET Updated version of record https://www.mdpi.com/2079-9292/12/2/344/pdf
article xml uploaded. 17 January 2023 12:08 CET Update https://www.mdpi.com/2079-9292/12/2/344/xml
article xml file uploaded 17 January 2023 12:08 CET Original file -
article pdf uploaded. 9 January 2023 14:30 CET Version of Record https://www.mdpi.com/2079-9292/12/2/344/pdf-vor
Back to TopTop