Next Article in Journal
PUFGuard: Vehicle-to-Everything Authentication Protocol for Secure Multihop Mobile Communication
Next Article in Special Issue
Credit Risk Prediction Based on Psychometric Data
Previous Article in Journal
Utilizing an Attention-Based LSTM Model for Detecting Sarcasm and Irony in Social Media
Previous Article in Special Issue
Moving towards a Mutant-Based Testing Tool for Verifying Behavior Maintenance in Test Code Refactorings
 
 
Article

Article Versions Notes

Computers 2023, 12(11), 232; https://doi.org/10.3390/computers12110232
Action Date Notes Link
article xml file uploaded 14 November 2023 08:27 CET Original file -
article xml uploaded. 14 November 2023 08:27 CET Update -
article pdf uploaded. 14 November 2023 08:27 CET Version of Record https://mdpi.longhoe.net/2073-431X/12/11/232/pdf-vor
article html file updated 14 November 2023 08:29 CET Original file -
article xml file uploaded 16 November 2023 08:25 CET Update -
article xml uploaded. 16 November 2023 08:25 CET Update https://mdpi.longhoe.net/2073-431X/12/11/232/xml
article pdf uploaded. 16 November 2023 08:25 CET Updated version of record https://mdpi.longhoe.net/2073-431X/12/11/232/pdf
article html file updated 16 November 2023 08:26 CET Update https://mdpi.longhoe.net/2073-431X/12/11/232/html
Back to TopTop