Next Article in Journal
CLDTLog: System Log Anomaly Detection Method Based on Contrastive Learning and Dual Objective Tasks
Next Article in Special Issue
On the Security of a PUF-Based Authentication and Key Exchange Protocol for IoT Devices
Previous Article in Journal
Tendon Stress Estimation from Strain Data of a Bridge Girder Using Machine Learning-Based Surrogate Model
Previous Article in Special Issue
Detection and Mitigation of SYN Flooding Attacks through SYN/ACK Packets and Black/White Lists
 
 
Article

Article Versions Notes

Sensors 2023, 23(11), 5033; https://doi.org/10.3390/s23115033
Action Date Notes Link
article xml file uploaded 24 May 2023 15:09 CEST Original file -
article xml uploaded. 24 May 2023 15:09 CEST Update -
article pdf uploaded. 24 May 2023 15:09 CEST Version of Record https://mdpi.longhoe.net/1424-8220/23/11/5033/pdf-vor
article html file updated 24 May 2023 15:11 CEST Original file -
article html file updated 24 May 2023 15:12 CEST Update -
article xml file uploaded 25 May 2023 08:29 CEST Update -
article xml uploaded. 25 May 2023 08:29 CEST Update https://mdpi.longhoe.net/1424-8220/23/11/5033/xml
article pdf uploaded. 25 May 2023 08:29 CEST Updated version of record https://mdpi.longhoe.net/1424-8220/23/11/5033/pdf
article html file updated 25 May 2023 08:31 CEST Update https://mdpi.longhoe.net/1424-8220/23/11/5033/html
Back to TopTop