Next Article in Journal
A Comprehensive Review of Tunnel Detection on Multilayer Protocols: From Traditional to Machine Learning Approaches
Next Article in Special Issue
Video-Based Recognition of Human Activity Using Novel Feature Extraction Techniques
Previous Article in Journal
Features Engineering to Differentiate between Malware and Legitimate Software
Previous Article in Special Issue
An Authentication Method for AMBTC Compressed Images Using Dual Embedding Strategies
 
 
Article

Article Versions Notes

Appl. Sci. 2023, 13(3), 1973; https://doi.org/10.3390/app13031973
Action Date Notes Link
article xml file uploaded 3 February 2023 03:41 CET Original file -
article xml uploaded. 3 February 2023 03:41 CET Update -
article pdf uploaded. 3 February 2023 03:41 CET Version of Record -
article html file updated 3 February 2023 03:42 CET Original file -
article xml file uploaded 3 February 2023 05:16 CET Update -
article xml uploaded. 3 February 2023 05:16 CET Update https://www.mdpi.com/2076-3417/13/3/1973/xml
article pdf uploaded. 3 February 2023 05:16 CET Updated version of record https://www.mdpi.com/2076-3417/13/3/1973/pdf
article html file updated 3 February 2023 05:17 CET Update https://www.mdpi.com/2076-3417/13/3/1973/html
Back to TopTop