Next Article in Journal
Developing Resilient Cyber-Physical Systems: A Review of State-of-the-Art Malware Detection Approaches, Gaps, and Future Directions
Next Article in Special Issue
Continuous Authentication in the Digital Age: An Analysis of Reinforcement Learning and Behavioral Biometrics
Previous Article in Journal
Long-Term Effects of Perceived Friendship with Intelligent Voice Assistants on Usage Behavior, User Experience, and Social Perceptions
Previous Article in Special Issue
User Authentication and Authorization Framework in IoT Protocols
 
 
Article

Article Versions Notes

Action Date Notes Link
article xml file uploaded 13 April 2023 09:42 CEST Original file -
article xml uploaded. 13 April 2023 09:42 CEST Update https://www.mdpi.com/2073-431X/12/4/78/xml
article pdf uploaded. 13 April 2023 09:42 CEST Version of Record -
article html file updated 13 April 2023 09:43 CEST Original file -
article pdf uploaded. 13 April 2023 10:30 CEST Updated version of record https://www.mdpi.com/2073-431X/12/4/78/pdf
article html file updated 13 April 2023 10:32 CEST Update -
article html file updated 20 April 2023 22:07 CEST Update https://www.mdpi.com/2073-431X/12/4/78/html
Back to TopTop