Next Article in Journal
Leveraging Image Representation of Network Traffic Data and Transfer Learning in Botnet Detection
Previous Article in Journal
The Next Generation Cognitive Security Operations Center: Network Flow Forensics Using Cybersecurity Intelligence
 
 
Article

Article Versions Notes

Big Data Cogn. Comput. 2018, 2(4), 36; https://doi.org/10.3390/bdcc2040036
Action Date Notes Link
article xml file uploaded 22 November 2018 10:53 CET Original file -
article xml uploaded. 22 November 2018 10:53 CET Update -
article pdf uploaded. 22 November 2018 10:53 CET Version of Record https://www.mdpi.com/2504-2289/2/4/36/pdf
article html file updated 22 November 2018 10:54 CET Original file -
article html file updated 2 April 2019 00:49 CEST Update -
article html file updated 14 April 2019 00:57 CEST Update -
article html file updated 28 April 2019 04:49 CEST Update -
article html file updated 10 October 2019 20:12 CEST Update -
article html file updated 10 February 2020 22:45 CET Update -
article xml uploaded. 2 December 2020 08:15 CET Update -
article xml uploaded. 2 December 2020 08:15 CET Update https://www.mdpi.com/2504-2289/2/4/36/xml
article html file updated 2 December 2020 08:16 CET Update -
article html file updated 17 July 2022 10:34 CEST Update https://www.mdpi.com/2504-2289/2/4/36/html
Back to TopTop