Next Article in Journal
A Quantum Key Distribution Routing Scheme for a Zero-Trust QKD Network System: A Moving Target Defense Approach
Next Article in Special Issue
Efficient Trajectory Prediction Using Check-In Patterns in Location-Based Social Network
Previous Article in Journal
A Data Mining Approach to Identify NBA Player Quarter-by-Quarter Performance Patterns
Previous Article in Special Issue
Defining, Detecting, and Characterizing Power Users in Threads
 
 
Article

Article Versions Notes

Big Data Cogn. Comput. 2025, 9(4), 75; https://doi.org/10.3390/bdcc9040075
Action Date Notes Link
article xml file uploaded 25 March 2025 11:49 CET Original file -
article xml uploaded. 25 March 2025 11:49 CET Update -
article pdf uploaded. 25 March 2025 11:49 CET Version of Record https://www.mdpi.com/2504-2289/9/4/75/pdf-vor
article html file updated 25 March 2025 11:51 CET Original file -
article xml file uploaded 26 March 2025 10:00 CET Update -
article xml uploaded. 26 March 2025 10:00 CET Update https://www.mdpi.com/2504-2289/9/4/75/xml
article pdf uploaded. 26 March 2025 10:00 CET Updated version of record https://www.mdpi.com/2504-2289/9/4/75/pdf
article html file updated 26 March 2025 10:01 CET Update -
article html file updated 24 June 2025 21:37 CEST Update https://www.mdpi.com/2504-2289/9/4/75/html
Back to TopTop