Next Article in Journal
Facial Age Estimation Using Machine Learning Techniques: An Overview
Next Article in Special Issue
Ensuring SDN Resilience under the Influence of Cyber Attacks: Combining Methods of Topological Transformation of Stochastic Networks, Markov Processes, and Neural Networks
Previous Article in Journal
Explaining Intrusion Detection-Based Convolutional Neural Networks Using Shapley Additive Explanations (SHAP)
Previous Article in Special Issue
Revisiting Gradient Boosting-Based Approaches for Learning Imbalanced Data: A Case of Anomaly Detection on Power Grids
 
 
Review

Article Versions Notes

Big Data Cogn. Comput. 2022, 6(4), 127; https://doi.org/10.3390/bdcc6040127
Action Date Notes Link
article pdf uploaded. 26 October 2022 10:23 CEST Version of Record https://www.mdpi.com/2504-2289/6/4/127/pdf-vor
article xml file uploaded 3 November 2022 02:03 CET Original file -
article xml uploaded. 3 November 2022 02:03 CET Update -
article pdf uploaded. 3 November 2022 02:03 CET Updated version of record https://www.mdpi.com/2504-2289/6/4/127/pdf-vor
article html file updated 3 November 2022 02:04 CET Original file -
article html file updated 3 November 2022 10:31 CET Update -
article xml file uploaded 4 November 2022 03:07 CET Update -
article xml uploaded. 4 November 2022 03:07 CET Update https://www.mdpi.com/2504-2289/6/4/127/xml
article pdf uploaded. 4 November 2022 03:07 CET Updated version of record https://www.mdpi.com/2504-2289/6/4/127/pdf
article html file updated 4 November 2022 03:08 CET Update -
article html file updated 2 March 2023 00:29 CET Update https://www.mdpi.com/2504-2289/6/4/127/html
Back to TopTop