Next Article in Journal
AI-Driven Attack Detection and Cryptographic Privacy Protection for Cyber-Resilient Industrial Control Systems
Previous Article in Journal
Extending WSN Lifetime via Optimized Mobile Sink Trajectories: Linear Programming and Cuckoo Search Approaches with Overhearing-Aware Energy Models
 
 
Article

Article Versions Notes

Action Date Notes Link
article xml file uploaded 16 September 2025 09:15 CEST Original file -
article xml uploaded. 16 September 2025 09:15 CEST Update -
article pdf uploaded. 16 September 2025 09:15 CEST Version of Record -
article html file updated 16 September 2025 09:18 CEST Original file -
article xml file uploaded 16 September 2025 13:11 CEST Update -
article xml uploaded. 16 September 2025 13:11 CEST Update https://www.mdpi.com/2624-831X/6/3/55/xml
article pdf uploaded. 16 September 2025 13:11 CEST Updated version of record https://www.mdpi.com/2624-831X/6/3/55/pdf
article html file updated 16 September 2025 13:13 CEST Update -
article html file updated 24 September 2025 20:28 CEST Update https://www.mdpi.com/2624-831X/6/3/55/html
Back to TopTop