Next Article in Journal
Behavioral Analysis of Android Riskware Families Using Clustering and Explainable Machine Learning
Next Article in Special Issue
Detection and Localization of Hidden IoT Devices in Unknown Environments Based on Channel Fingerprints
Previous Article in Journal
Investigating Offensive Language Detection in a Low-Resource Setting with a Robustness Perspective
Previous Article in Special Issue
Adaptive Management of Multi-Scenario Projects in Cybersecurity: Models and Algorithms for Decision-Making
 
 
Article

Article Versions Notes

Big Data Cogn. Comput. 2024, 8(12), 169; https://doi.org/10.3390/bdcc8120169
Action Date Notes Link
article xml file uploaded 25 November 2024 09:39 CET Original file -
article xml uploaded. 25 November 2024 09:39 CET Update -
article pdf uploaded. 25 November 2024 09:39 CET Version of Record -
article html file updated 25 November 2024 09:40 CET Original file -
article xml file uploaded 25 November 2024 12:59 CET Update -
article xml uploaded. 25 November 2024 12:59 CET Update https://www.mdpi.com/2504-2289/8/12/169/xml
article pdf uploaded. 25 November 2024 12:59 CET Updated version of record https://www.mdpi.com/2504-2289/8/12/169/pdf
article html file updated 25 November 2024 13:01 CET Update -
article html file updated 30 June 2025 16:35 CEST Update https://www.mdpi.com/2504-2289/8/12/169/html
Back to TopTop