Next Article in Journal
Is the Privacy Paradox a Domain-Specific Phenomenon
Next Article in Special Issue
Deepfake Attacks: Generation, Detection, Datasets, Challenges, and Research Directions
Previous Article in Journal
Cooperative Vehicles versus Non-Cooperative Traffic Light: Safe and Efficient Passing
Previous Article in Special Issue
High-Capacity Reversible Data Hiding Based on Two-Layer Embedding Scheme for Encrypted Image Using Blockchain
 
 
Article

Article Versions Notes

Computers 2023, 12(8), 155; https://doi.org/10.3390/computers12080155
Action Date Notes Link
article xml file uploaded 2 August 2023 05:19 CEST Original file -
article xml uploaded. 2 August 2023 05:19 CEST Update https://www.mdpi.com/2073-431X/12/8/155/xml
article pdf uploaded. 2 August 2023 05:19 CEST Version of Record https://www.mdpi.com/2073-431X/12/8/155/pdf
article html file updated 2 August 2023 05:20 CEST Original file -
article html file updated 19 August 2023 20:19 CEST Update https://www.mdpi.com/2073-431X/12/8/155/html
Back to TopTop