Next Article in Journal
Using an Evidence-Based Approach for Policy-Making Based on Big Data Analysis and Applying Detection Techniques on Twitter
Next Article in Special Issue
On the Way to Automatic Exploitation of Vulnerabilities and Validation of Systems Security through Security Chaos Engineering
Previous Article in Journal
What Is (Not) Big Data Based on Its 7Vs Challenges: A Survey
Previous Article in Special Issue
Security and Privacy Threats and Requirements for the Centralized Contact Tracing System in Korea
 
 
Article

Article Versions Notes

Big Data Cogn. Comput. 2022, 6(4), 159; https://doi.org/10.3390/bdcc6040159
Action Date Notes Link
article xml file uploaded 19 December 2022 07:55 CET Original file -
article xml uploaded. 19 December 2022 07:55 CET Update -
article pdf uploaded. 19 December 2022 07:55 CET Version of Record -
article html file updated 19 December 2022 07:57 CET Original file -
article xml file uploaded 19 December 2022 08:33 CET Update -
article xml uploaded. 19 December 2022 08:33 CET Update https://www.mdpi.com/2504-2289/6/4/159/xml
article pdf uploaded. 19 December 2022 08:33 CET Updated version of record https://www.mdpi.com/2504-2289/6/4/159/pdf
article html file updated 19 December 2022 08:34 CET Update -
article html file updated 4 March 2023 22:43 CET Update https://www.mdpi.com/2504-2289/6/4/159/html
Back to TopTop