Next Article in Journal
Design and Analysis of an Effective Multi-Barriers Model Based on Non-Stationary Gaussian Random Fields
Next Article in Special Issue
A New Optimal Method for the Secure Design of Combinational Circuits against Hardware Trojans Using Interference Logic Locking
Previous Article in Journal
Swarm Optimization and Machine Learning Applied to PE Malware Detection towards Cyber Threat Intelligence
Previous Article in Special Issue
Forensic Analysis of TikTok Alternatives on Android and iOS Devices: Byte, Dubsmash, and Triller
 
 
Article

Article Versions Notes

Electronics 2023, 12(2), 344; https://doi.org/10.3390/electronics12020344
Action Date Notes Link
article pdf uploaded. 9 January 2023 14:30 CET Version of Record https://www.mdpi.com/2079-9292/12/2/344/pdf-vor
article xml file uploaded 17 January 2023 12:08 CET Original file -
article xml uploaded. 17 January 2023 12:08 CET Update https://www.mdpi.com/2079-9292/12/2/344/xml
article pdf uploaded. 17 January 2023 12:08 CET Updated version of record https://www.mdpi.com/2079-9292/12/2/344/pdf
article html file updated 17 January 2023 12:10 CET Original file -
article html file updated 7 March 2023 21:45 CET Update https://www.mdpi.com/2079-9292/12/2/344/html
Back to TopTop