Next Article in Journal
IoT Application-Layer Protocol Vulnerability Detection using Reverse Engineering
Previous Article in Journal
Charged and Non-Charged Black Hole Solutions in Mimetic Gravitational Theory
 
 
Article

Article Versions Notes

Symmetry 2018, 10(11), 560; https://doi.org/10.3390/sym10110560
Action Date Notes Link
article xml file uploaded 1 November 2018 06:51 CET Original file -
article xml uploaded. 1 November 2018 06:51 CET Update https://www.mdpi.com/2073-8994/10/11/560/xml
article pdf uploaded. 1 November 2018 06:51 CET Version of Record https://www.mdpi.com/2073-8994/10/11/560/pdf
article html file updated 1 November 2018 06:52 CET Original file -
article html file updated 26 November 2018 06:39 CET Update -
article html file updated 1 April 2019 14:53 CEST Update -
article html file updated 14 April 2019 08:55 CEST Update -
article html file updated 28 April 2019 13:43 CEST Update -
article html file updated 9 October 2019 20:29 CEST Update -
article html file updated 10 February 2020 18:58 CET Update https://www.mdpi.com/2073-8994/10/11/560/html
Back to TopTop