Next Article in Journal
ConGraph: Advanced Persistent Threat Detection Method Based on Provenance Graph Combined with Process Context in Cyber-Physical System Environment
Next Article in Special Issue
Robustness Assessment of AI-Based 2D Object Detection Systems: A Method and Lessons Learned from Two Industrial Cases
Previous Article in Journal
Online Joint Optimization of Virtual Network Function Deployment and Trajectory Planning for Virtualized Service Provision in Multiple-Unmanned-Aerial-Vehicle Mobile-Edge Networks
 
 
Article

Article Versions Notes

Electronics 2024, 13(5), 939; https://doi.org/10.3390/electronics13050939
Action Date Notes Link
article xml file uploaded 29 February 2024 14:42 CET Original file -
article xml uploaded. 29 February 2024 14:42 CET Update -
article pdf uploaded. 29 February 2024 14:42 CET Version of Record https://www.mdpi.com/2079-9292/13/5/939/pdf-vor
article html file updated 29 February 2024 14:44 CET Original file -
article xml file uploaded 1 March 2024 07:49 CET Update -
article xml uploaded. 1 March 2024 07:49 CET Update https://www.mdpi.com/2079-9292/13/5/939/xml
article pdf uploaded. 1 March 2024 07:49 CET Updated version of record https://www.mdpi.com/2079-9292/13/5/939/pdf
article html file updated 1 March 2024 07:51 CET Update https://www.mdpi.com/2079-9292/13/5/939/html
Back to TopTop