Next Article in Journal
Re-Evaluating Deep Learning Attacks and Defenses in Cybersecurity Systems
Previous Article in Journal
An Intelligent Self-Validated Sensor System Using Neural Network Technologies and Fuzzy Logic Under Operating Implementation Conditions
 
 
Article

Article Versions Notes

Big Data Cogn. Comput. 2024, 8(12), 190; https://doi.org/10.3390/bdcc8120190
Action Date Notes Link
article pdf uploaded. 16 December 2024 15:58 CET Version of Record https://www.mdpi.com/2504-2289/8/12/190/pdf-vor
article xml file uploaded 17 December 2024 11:30 CET Original file -
article xml uploaded. 17 December 2024 11:30 CET Update -
article pdf uploaded. 17 December 2024 11:30 CET Updated version of record https://www.mdpi.com/2504-2289/8/12/190/pdf
article html file updated 17 December 2024 11:32 CET Original file -
article xml file uploaded 19 December 2024 11:45 CET Update -
article xml uploaded. 19 December 2024 11:45 CET Update -
article html file updated 19 December 2024 11:47 CET Update -
article html file updated 19 December 2024 23:36 CET Update -
article xml file uploaded 20 December 2024 05:14 CET Update -
article xml uploaded. 20 December 2024 05:14 CET Update https://www.mdpi.com/2504-2289/8/12/190/xml
article html file updated 20 December 2024 05:18 CET Update -
article html file updated 3 July 2025 08:39 CEST Update https://www.mdpi.com/2504-2289/8/12/190/html
Back to TopTop