Next Article in Journal
A Study on Countermeasures against Neutralizing Technology: Encoding Algorithm-Based Ransomware Detection Methods Using Machine Learning
Next Article in Special Issue
A Malicious Program Behavior Detection Model Based on API Call Sequences
Previous Article in Journal
EPFed: Achieving Optimal Balance between Privacy and Efficiency in Federated Learning
Previous Article in Special Issue
Secure Device-to-Device Communication in IoT: Fuzzy Identity from Wireless Channel State Information for Identity-Based Encryption
 
 
Article

Article Versions Notes

Electronics 2024, 13(6), 1029; https://doi.org/10.3390/electronics13061029
Action Date Notes Link
article xml file uploaded 9 March 2024 07:26 CET Original file -
article xml uploaded. 9 March 2024 07:26 CET Update https://www.mdpi.com/2079-9292/13/6/1029/xml
article pdf uploaded. 9 March 2024 07:26 CET Version of Record https://www.mdpi.com/2079-9292/13/6/1029/pdf
article html file updated 9 March 2024 07:28 CET Original file https://www.mdpi.com/2079-9292/13/6/1029/html
Back to TopTop