Next Article in Journal
Proactive Ransomware Detection Using Extremely Fast Decision Tree (EFDT) Algorithm: A Case Study
Next Article in Special Issue
A Comprehensive Approach to Image Protection in Digital Environments
Previous Article in Journal
A Query Expansion Benchmark on Social Media Information Retrieval: Which Methodology Performs Best and Aligns with Semantics?
 
 
Article

Article Versions Notes

Computers 2023, 12(6), 120; https://doi.org/10.3390/computers12060120
Action Date Notes Link
article xml file uploaded 12 June 2023 11:29 CEST Original file -
article xml uploaded. 12 June 2023 11:29 CEST Update -
article pdf uploaded. 12 June 2023 11:29 CEST Version of Record https://www.mdpi.com/2073-431X/12/6/120/pdf-vor
article html file updated 12 June 2023 11:31 CEST Original file -
article xml file uploaded 13 June 2023 03:26 CEST Update -
article xml uploaded. 13 June 2023 03:26 CEST Update -
article pdf uploaded. 13 June 2023 03:27 CEST Updated version of record https://www.mdpi.com/2073-431X/12/6/120/pdf-vor
article html file updated 13 June 2023 03:28 CEST Update -
article html file updated 20 June 2023 22:00 CEST Update -
article xml file uploaded 21 June 2023 04:00 CEST Update -
article xml uploaded. 21 June 2023 04:00 CEST Update https://www.mdpi.com/2073-431X/12/6/120/xml
article pdf uploaded. 21 June 2023 04:00 CEST Updated version of record https://www.mdpi.com/2073-431X/12/6/120/pdf
article html file updated 21 June 2023 04:03 CEST Update https://www.mdpi.com/2073-431X/12/6/120/html
Back to TopTop