Next Article in Journal
Image Text Deblurring Method Based on Generative Adversarial Network
Next Article in Special Issue
An Enhanced Design of Sparse Autoencoder for Latent Features Extraction Based on Trigonometric Simplexes for Network Intrusion Detection Systems
Previous Article in Journal
Flux Weakening Control Technique without Look-Up Tables for SynRMs Based on Flux Saturation Models
Previous Article in Special Issue
Hybrid Intrusion Detection System Based on the Stacking Ensemble of C5 Decision Tree Classifier and One Class Support Vector Machine
 
 
Article

Article Versions Notes

Action Date Notes Link
article xml file uploaded 27 January 2020 16:23 CET Original file -
article pdf uploaded. 27 January 2020 16:23 CET Version of Record https://0-www-mdpi-com.brum.beds.ac.uk/2079-9292/9/2/219/pdf-vor
article xml file uploaded 16 February 2020 11:37 CET Update -
article xml uploaded. 16 February 2020 11:37 CET Update https://0-www-mdpi-com.brum.beds.ac.uk/2079-9292/9/2/219/xml
article pdf uploaded. 16 February 2020 11:37 CET Updated version of record https://0-www-mdpi-com.brum.beds.ac.uk/2079-9292/9/2/219/pdf
article html file updated 16 February 2020 11:38 CET Original file -
article html file updated 6 March 2020 19:03 CET Update -
article html file updated 20 July 2022 18:34 CEST Update https://0-www-mdpi-com.brum.beds.ac.uk/2079-9292/9/2/219/html
Back to TopTop