Next Article in Journal
Improving the Precision of Image Search Engines with the Psychological Intention Diagram
Next Article in Special Issue
ConGraph: Advanced Persistent Threat Detection Method Based on Provenance Graph Combined with Process Context in Cyber-Physical System Environment
Previous Article in Journal
Risk-Based System-Call Sequence Grouping Method for Malware Intrusion Detection
Previous Article in Special Issue
Instantiation and Implementation of HEAD Metamodel in an Industrial Environment: Non-IoT and IoT Case Studies
 
 
Article

Article Versions Notes

Electronics 2024, 13(1), 207; https://doi.org/10.3390/electronics13010207
Action Date Notes Link
article xml file uploaded 2 January 2024 12:23 CET Original file -
article xml uploaded. 2 January 2024 12:23 CET Update https://www.mdpi.com/2079-9292/13/1/207/xml
article pdf uploaded. 2 January 2024 12:23 CET Version of Record https://www.mdpi.com/2079-9292/13/1/207/pdf
article html file updated 2 January 2024 12:25 CET Original file https://www.mdpi.com/2079-9292/13/1/207/html
Back to TopTop