Next Article in Journal
On the Number of Customer Classes in a Single-Period Inventory System
Next Article in Special Issue
Research on Virus Propagation Network Intrusion Detection Based on Graph Neural Network
Previous Article in Journal
Optimizing Insulator Defect Detection with Improved DETR Models
Previous Article in Special Issue
IPAttributor: Cyber Attacker Attribution with Threat Intelligence-Enriched Intrusion Data
 
 
Article

Article Versions Notes

Mathematics 2024, 12(10), 1508; https://doi.org/10.3390/math12101508
Action Date Notes Link
article pdf uploaded. 11 May 2024 16:23 CEST Version of Record https://www.mdpi.com/2227-7390/12/10/1508/pdf-vor
article xml file uploaded 16 May 2024 07:33 CEST Original file -
article xml uploaded. 16 May 2024 07:33 CEST Update https://www.mdpi.com/2227-7390/12/10/1508/xml
article pdf uploaded. 16 May 2024 07:33 CEST Updated version of record https://www.mdpi.com/2227-7390/12/10/1508/pdf
article html file updated 16 May 2024 07:35 CEST Original file https://www.mdpi.com/2227-7390/12/10/1508/html
Back to TopTop