Next Article in Journal
Generalized, Complete and Accurate Modeling of Non-Ideal Push–Pull Converters for Power System Analysis and Control
Next Article in Special Issue
Malicious Office Macro Detection: Combined Features with Obfuscation and Suspicious Keywords
Previous Article in Journal
Viscoelastic Strains of Palaeozoic Shales under the Burger’s Model Description
Previous Article in Special Issue
AIM Triad: A Prioritization Strategy for Public Institutions to Improve Information Security Maturity
 
 
Article

Article Versions Notes

Appl. Sci. 2023, 13(19), 10980; https://doi.org/10.3390/app131910980
Action Date Notes Link
article xml file uploaded 5 October 2023 13:25 CEST Original file -
article xml uploaded. 5 October 2023 13:25 CEST Update https://www.mdpi.com/2076-3417/13/19/10980/xml
article pdf uploaded. 5 October 2023 13:25 CEST Version of Record https://www.mdpi.com/2076-3417/13/19/10980/pdf
article html file updated 5 October 2023 13:26 CEST Original file https://www.mdpi.com/2076-3417/13/19/10980/html
Back to TopTop