Next Article in Journal
Towards Accurate Run-Time Hardware-Assisted Stealthy Malware Detection: A Lightweight, yet Effective Time Series CNN-Based Approach
Previous Article in Journal
A Fault Attack on the Family of Enocoro Stream Ciphers
 
 
Article

Article Versions Notes

Action Date Notes Link
article pdf uploaded. 14 October 2021 15:05 CEST Version of Record https://0-www-mdpi-com.brum.beds.ac.uk/2410-387X/5/4/27/pdf-vor
article xml file uploaded 4 November 2021 15:23 CET Original file -
article xml uploaded. 4 November 2021 15:23 CET Update https://0-www-mdpi-com.brum.beds.ac.uk/2410-387X/5/4/27/xml
article pdf uploaded. 4 November 2021 15:23 CET Updated version of record https://0-www-mdpi-com.brum.beds.ac.uk/2410-387X/5/4/27/pdf
article html file updated 4 November 2021 15:25 CET Original file -
article html file updated 30 July 2022 10:57 CEST Update https://0-www-mdpi-com.brum.beds.ac.uk/2410-387X/5/4/27/html
Back to TopTop