Next Article in Journal
Privacy-Enhanced AKMA for Multi-Access Edge Computing Mobility
Next Article in Special Issue
Explainable AI-Based DDOS Attack Identification Method for IoT Networks
Previous Article in Journal
A Survey on Security Attacks and Intrusion Detection Mechanisms in Named Data Networking
Previous Article in Special Issue
Learning Explainable Disentangled Representations of E-Commerce Data by Aligning Their Visual and Textual Attributes
 
 
Article

Article Versions Notes

Action Date Notes Link
article pdf uploaded. 20 December 2022 09:19 CET Version of Record https://www.mdpi.com/2073-431X/12/1/1/pdf-vor
article pdf uploaded. 20 December 2022 09:27 CET Updated version of record https://www.mdpi.com/2073-431X/12/1/1/pdf-vor
article pdf uploaded. 20 December 2022 09:38 CET Updated version of record https://www.mdpi.com/2073-431X/12/1/1/pdf-vor
article xml file uploaded 28 December 2022 10:37 CET Original file -
article xml uploaded. 28 December 2022 10:37 CET Update https://www.mdpi.com/2073-431X/12/1/1/xml
article pdf uploaded. 28 December 2022 10:37 CET Updated version of record https://www.mdpi.com/2073-431X/12/1/1/pdf
article html file updated 28 December 2022 10:39 CET Original file -
article html file updated 4 March 2023 22:59 CET Update https://www.mdpi.com/2073-431X/12/1/1/html
Back to TopTop