Next Article in Journal
A New Model of Emergency Supply Management for Swift Transition from Peacetime to Emergency Considering Demand Urgency and Supplier Evaluation
Next Article in Special Issue
A Generalized Framework for Adversarial Attack Detection and Prevention Using Grad-CAM and Clustering Techniques
Previous Article in Journal
Forecasting Renewable Energy Consumption Using a Novel Fractional Grey Reverse Accumulation Model
Previous Article in Special Issue
Enhancing Cybersecurity: Hybrid Deep Learning Approaches to Smishing Attack Detection
 
 
Systematic Review

Article Versions Notes

Action Date Notes Link
article xml file uploaded 15 January 2025 15:09 CET Original file -
article xml uploaded. 15 January 2025 15:09 CET Update -
article pdf uploaded. 15 January 2025 15:09 CET Version of Record https://www.mdpi.com/2079-8954/13/1/52/pdf-vor
article html file updated 15 January 2025 15:11 CET Original file -
article xml file uploaded 16 January 2025 02:44 CET Update -
article xml uploaded. 16 January 2025 02:44 CET Update https://www.mdpi.com/2079-8954/13/1/52/xml
article pdf uploaded. 16 January 2025 02:44 CET Updated version of record https://www.mdpi.com/2079-8954/13/1/52/pdf
article html file updated 16 January 2025 02:46 CET Update https://www.mdpi.com/2079-8954/13/1/52/html
Back to TopTop