Next Article in Journal
Interactive Image Segmentation Based on Feature-Aware Attention
Next Article in Special Issue
Aye: A Trusted Forensic Method for Firmware Tampering Attacks
Previous Article in Journal
General Entropy with Bayes Techniques under Lindley and MCMC for Estimating the New Weibull–Pareto Parameters: Theory and Application
Previous Article in Special Issue
Security and Privacy Analysis of Vinoth et al.’s Authenticated Key Agreement Scheme for Industrial IoT
 
 
Article

Article Versions Notes

Action Date Notes Link
article pdf uploaded. 12 November 2022 09:55 CET Version of Record https://0-www-mdpi-com.brum.beds.ac.uk/2073-8994/14/11/2394/pdf-vor
article xml file uploaded 18 November 2022 03:19 CET Original file -
article xml uploaded. 18 November 2022 03:19 CET Update https://0-www-mdpi-com.brum.beds.ac.uk/2073-8994/14/11/2394/xml
article pdf uploaded. 18 November 2022 03:19 CET Updated version of record https://0-www-mdpi-com.brum.beds.ac.uk/2073-8994/14/11/2394/pdf
article html file updated 18 November 2022 03:20 CET Original file -
article html file updated 28 February 2023 22:43 CET Update -
article html file updated 2 March 2023 22:53 CET Update https://0-www-mdpi-com.brum.beds.ac.uk/2073-8994/14/11/2394/html
Back to TopTop