Next Article in Journal
Securing IoT: Mitigating Sybil Flood Attacks with Bloom Filters and Hash Chains
Next Article in Special Issue
Utilizing TGAN and ConSinGAN for Improved Tool Wear Prediction: A Comparative Study with ED-LSTM, GRU, and CNN Models
Previous Article in Journal
Rapid CU Partitioning and Joint Intra-Frame Mode Decision Algorithm
Previous Article in Special Issue
False Data Injection Attack Detection, Isolation, and Identification in Industrial Control Systems Based on Machine Learning: Application in Load Frequency Control
 
 
Article

Article Versions Notes

Electronics 2024, 13(17), 3466; https://doi.org/10.3390/electronics13173466
Action Date Notes Link
article pdf uploaded. 31 August 2024 09:59 CEST Version of Record https://www.mdpi.com/2079-9292/13/17/3466/pdf-vor
article xml file uploaded 3 September 2024 05:42 CEST Original file -
article xml uploaded. 3 September 2024 05:42 CEST Update https://www.mdpi.com/2079-9292/13/17/3466/xml
article pdf uploaded. 3 September 2024 05:42 CEST Updated version of record https://www.mdpi.com/2079-9292/13/17/3466/pdf
article html file updated 3 September 2024 05:45 CEST Original file https://www.mdpi.com/2079-9292/13/17/3466/html
Back to TopTop