Next Article in Journal
The Next Generation Cognitive Security Operations Center: Network Flow Forensics Using Cybersecurity Intelligence
Previous Article in Journal
Topological Signature of 19th Century Novelists: Persistent Homology in Text Mining
 
 
Article

Article Versions Notes

Big Data Cogn. Comput. 2018, 2(4), 34; https://doi.org/10.3390/bdcc2040034
Action Date Notes Link
article xml file uploaded 19 October 2018 08:20 CEST Original file -
article xml uploaded. 19 October 2018 08:20 CEST Update -
article pdf uploaded. 19 October 2018 08:20 CEST Version of Record https://www.mdpi.com/2504-2289/2/4/34/pdf
article html file updated 19 October 2018 08:21 CEST Original file -
article html file updated 1 April 2019 08:40 CEST Update -
article html file updated 14 April 2019 13:26 CEST Update -
article html file updated 28 April 2019 18:16 CEST Update -
article html file updated 9 October 2019 06:58 CEST Update -
article html file updated 10 February 2020 16:46 CET Update -
article xml uploaded. 2 December 2020 08:12 CET Update -
article xml uploaded. 2 December 2020 08:12 CET Update https://www.mdpi.com/2504-2289/2/4/34/xml
article html file updated 2 December 2020 08:14 CET Update -
article html file updated 17 July 2022 05:22 CEST Update https://www.mdpi.com/2504-2289/2/4/34/html
Back to TopTop