Next Article in Journal
Usable Privacy and Security in Mobile Applications: Perception of Mobile End Users in Saudi Arabia
Next Article in Special Issue
Labeling Network Intrusion Detection System (NIDS) Rules with MITRE ATT&CK Techniques: Machine Learning vs. Large Language Models
Previous Article in Journal
Explainable Pre-Trained Language Models for Sentiment Analysis in Low-Resourced Languages
Previous Article in Special Issue
Health Use Cases of AI Chatbots: Identification and Analysis of ChatGPT Prompts in Social Media Discourses
 
 
Review

Article Versions Notes

Big Data Cogn. Comput. 2024, 8(11), 161; https://doi.org/10.3390/bdcc8110161
Action Date Notes Link
article xml file uploaded 18 November 2024 07:49 CET Original file -
article xml uploaded. 18 November 2024 07:49 CET Update https://www.mdpi.com/2504-2289/8/11/161/xml
article pdf uploaded. 18 November 2024 07:49 CET Version of Record https://www.mdpi.com/2504-2289/8/11/161/pdf
article html file updated 18 November 2024 07:51 CET Original file https://www.mdpi.com/2504-2289/8/11/161/html
Back to TopTop