Next Article in Journal
Secure Cyber Deception Architecture and Decoy Injection to Mitigate the Insider Threat
Next Article in Special Issue
Editorial of Special Issue “Information Technology and Its Applications”
Previous Article in Journal
On the Interdependence of the Financial Market and Open Access Spectrum Market in the 5G Network
Previous Article in Special Issue
Identification of Apple Leaf Diseases Based on Deep Convolutional Neural Networks
 
 
Article

Article Versions Notes

Symmetry 2018, 10(1), 13; https://doi.org/10.3390/sym10010013
Action Date Notes Link
article pdf uploaded. 2 January 2018 13:57 CET Version of Record -
article xml uploaded. 2 January 2018 13:57 CET Original file -
article xml uploaded. 2 January 2018 13:57 CET Update -
article xml uploaded. 2 January 2018 13:57 CET Update https://www.mdpi.com/2073-8994/10/1/13/xml
article html file updated 2 January 2018 20:57 CET Original file -
article pdf uploaded. 23 January 2018 07:19 CET Updated version of record https://www.mdpi.com/2073-8994/10/1/13/pdf
article html file updated 1 February 2018 11:40 CET Update -
article html file updated 28 March 2019 12:34 CET Update -
article html file updated 18 April 2019 02:57 CEST Update -
article html file updated 2 May 2019 04:54 CEST Update -
article html file updated 29 September 2019 14:59 CEST Update -
article html file updated 9 February 2020 01:46 CET Update https://www.mdpi.com/2073-8994/10/1/13/html
Back to TopTop