Next Article in Journal
Reliability Techniques in Industrial Design
Next Article in Special Issue
Development of Fingerprint Identification Based on Device Flow in Industrial Control System
Previous Article in Journal
Detection of Primary User Emulation Attack Using the Differential Evolution Algorithm in Cognitive Radio Networks
Previous Article in Special Issue
FF-MR: A DoH-Encrypted DNS Covert Channel Detection Method Based on Feature Fusion
 
 
Article

Article Versions Notes

Appl. Sci. 2023, 13(1), 575; https://doi.org/10.3390/app13010575
Action Date Notes Link
article pdf uploaded. 31 December 2022 10:47 CET Version of Record https://www.mdpi.com/2076-3417/13/1/575/pdf-vor
article xml file uploaded 5 January 2023 10:41 CET Original file -
article xml uploaded. 5 January 2023 10:41 CET Update -
article pdf uploaded. 5 January 2023 10:41 CET Updated version of record https://www.mdpi.com/2076-3417/13/1/575/pdf-vor
article html file updated 5 January 2023 10:43 CET Original file -
article xml file uploaded 6 January 2023 03:11 CET Update -
article xml uploaded. 6 January 2023 03:11 CET Update https://www.mdpi.com/2076-3417/13/1/575/xml
article pdf uploaded. 6 January 2023 03:11 CET Updated version of record https://www.mdpi.com/2076-3417/13/1/575/pdf
article html file updated 6 January 2023 03:12 CET Update -
article html file updated 5 March 2023 02:10 CET Update https://www.mdpi.com/2076-3417/13/1/575/html
Back to TopTop