Next Article in Journal
Steel Surface Defect Detection Algorithm Based on YOLOv8
Next Article in Special Issue
Decentralized Exchange Transaction Analysis and Maximal Extractable Value Attack Identification: Focusing on Uniswap USDC3
Previous Article in Journal
Reinforcement Learning-Based Event-Triggered Active-Battery-Cell-Balancing Control for Electric Vehicle Range Extension
Previous Article in Special Issue
ConGraph: Advanced Persistent Threat Detection Method Based on Provenance Graph Combined with Process Context in Cyber-Physical System Environment
 
 
Article

Article Versions Notes

Electronics 2024, 13(5), 991; https://doi.org/10.3390/electronics13050991
Action Date Notes Link
article xml file uploaded 5 March 2024 14:01 CET Original file -
article xml uploaded. 5 March 2024 14:01 CET Update -
article pdf uploaded. 5 March 2024 14:01 CET Version of Record https://www.mdpi.com/2079-9292/13/5/991/pdf-vor
article html file updated 5 March 2024 14:05 CET Original file -
article xml file uploaded 6 March 2024 07:14 CET Update -
article xml uploaded. 6 March 2024 07:14 CET Update https://www.mdpi.com/2079-9292/13/5/991/xml
article pdf uploaded. 6 March 2024 07:14 CET Updated version of record https://www.mdpi.com/2079-9292/13/5/991/pdf
article html file updated 6 March 2024 07:15 CET Update https://www.mdpi.com/2079-9292/13/5/991/html
Back to TopTop