Next Article in Journal
An Automatic Near-Duplicate Video Data Cleaning Method Based on a Consistent Feature Hash Ring
Next Article in Special Issue
Digital Forensics for Analyzing Cyber Threats in the XR Technology Ecosystem within Digital Twins
Previous Article in Journal
GvdsSQL: Heterogeneous Database Unified Access Technology for Wide-Area Environments
Previous Article in Special Issue
Bridging the Cybersecurity Gap: A Comprehensive Analysis of Threats to Power Systems, Water Storage, and Gas Network Industrial Control and Automation Systems
 
 
Due to scheduled maintenance work on our database systems, there may be short service disruptions on this website between 10:00 and 11:00 CEST on June 14th.
Article

Article Versions Notes

Electronics 2024, 13(8), 1520; https://doi.org/10.3390/electronics13081520
Action Date Notes Link
article xml file uploaded 17 April 2024 10:39 CEST Original file -
article xml uploaded. 17 April 2024 10:39 CEST Update https://www.mdpi.com/2079-9292/13/8/1520/xml
article pdf uploaded. 17 April 2024 10:39 CEST Version of Record https://www.mdpi.com/2079-9292/13/8/1520/pdf
article html file updated 17 April 2024 10:41 CEST Original file https://www.mdpi.com/2079-9292/13/8/1520/html
Back to TopTop