Next Article in Journal
Effective One-Class Classifier Model for Memory Dump Malware Detection
Next Article in Special Issue
Implementation of Elliptic Curves in the Polynomial Blom Key Pre-Distribution Scheme for Wireless Sensor Networks and Distributed Ledger Technology
Previous Article in Journal
A Hierarchical Deep Learning-Based Intrusion Detection Architecture for Clustered Internet of Things
Previous Article in Special Issue
Homoglyph Attack Detection Model Using Machine Learning and Hash Function
 
 
Review

Article Versions Notes

J. Sens. Actuator Netw. 2023, 12(1), 4; https://doi.org/10.3390/jsan12010004
Action Date Notes Link
article pdf uploaded. 31 December 2022 09:36 CET Version of Record https://www.mdpi.com/2224-2708/12/1/4/pdf-vor
article xml file uploaded 11 January 2023 11:16 CET Original file -
article xml uploaded. 11 January 2023 11:16 CET Update https://www.mdpi.com/2224-2708/12/1/4/xml
article pdf uploaded. 11 January 2023 11:16 CET Updated version of record https://www.mdpi.com/2224-2708/12/1/4/pdf
article html file updated 11 January 2023 11:17 CET Original file -
article html file updated 1 March 2023 07:09 CET Update -
article html file updated 5 March 2023 02:07 CET Update https://www.mdpi.com/2224-2708/12/1/4/html
Back to TopTop