Next Article in Journal
A Spiking LSTM Accelerator for Automatic Speech Recognition Application Based on FPGA
Previous Article in Journal
Machine Learning Techniques for Cyberattack Prevention in IoT Systems: A Comparative Perspective of Cybersecurity and Cyberdefense in Colombia
Previous Article in Special Issue
EBR: Routing Protocol to Detect Blackhole Attacks in Mobile Ad Hoc Networks
 
 
Due to scheduled maintenance work on our database systems, there may be short service disruptions on this website between 10:00 and 11:00 CEST on June 14th.
Article

Article Versions Notes

Electronics 2024, 13(5), 828; https://doi.org/10.3390/electronics13050828
Action Date Notes Link
article xml file uploaded 21 February 2024 07:59 CET Original file -
article xml uploaded. 21 February 2024 07:59 CET Update https://www.mdpi.com/2079-9292/13/5/828/xml
article pdf uploaded. 21 February 2024 07:59 CET Version of Record https://www.mdpi.com/2079-9292/13/5/828/pdf
article html file updated 21 February 2024 08:00 CET Original file -
article html file updated 21 February 2024 08:01 CET Update https://www.mdpi.com/2079-9292/13/5/828/html
Back to TopTop