Next Article in Journal
A Comprehensive Literature Review on Volatile Memory Forensics
Next Article in Special Issue
A Smart Contract Vulnerability Detection Method Based on Heterogeneous Contract Semantic Graphs and Pre-Training Techniques
Previous Article in Journal
Investigating and Mitigating the Performance–Fairness Tradeoff via Protected-Category Sampling
Previous Article in Special Issue
Enhancing Cryptographic Primitives through Dynamic Cost Function Optimization in Heuristic Search
 
 
Due to scheduled maintenance work on our database systems, there may be short service disruptions on this website between 10:00 and 11:00 CEST on June 14th.
Article

Article Versions Notes

Electronics 2024, 13(15), 3025; https://doi.org/10.3390/electronics13153025
Action Date Notes Link
article pdf uploaded. 31 July 2024 16:05 CEST Version of Record https://www.mdpi.com/2079-9292/13/15/3025/pdf-vor
article xml file uploaded 1 August 2024 08:02 CEST Original file -
article xml uploaded. 1 August 2024 08:02 CEST Update https://www.mdpi.com/2079-9292/13/15/3025/xml
article pdf uploaded. 1 August 2024 08:02 CEST Updated version of record https://www.mdpi.com/2079-9292/13/15/3025/pdf
article html file updated 1 August 2024 08:04 CEST Original file https://www.mdpi.com/2079-9292/13/15/3025/html
Back to TopTop