Next Article in Journal
Another Step in the Ladder of DNS-Based Covert Channels: Hiding Ill-Disposed Information in DNSKEY RRs
Next Article in Special Issue
Decision Diagram Algorithms to Extract Minimal Cutsets of Finite Degradation Models
Previous Article in Journal
A Novel Approach to Component Assembly Inspection Based on Mask R-CNN and Support Vector Machines
 
 
Article

Article Versions Notes

Information 2019, 10(9), 283; https://doi.org/10.3390/info10090283
Action Date Notes Link
article xml file uploaded 11 September 2019 16:15 CEST Original file -
article pdf uploaded. 11 September 2019 16:15 CEST Version of Record https://www.mdpi.com/2078-2489/10/9/283/pdf-vor
article xml file uploaded 12 September 2019 14:54 CEST Update -
article xml uploaded. 12 September 2019 14:55 CEST Update https://www.mdpi.com/2078-2489/10/9/283/xml
article pdf uploaded. 12 September 2019 14:55 CEST Updated version of record https://www.mdpi.com/2078-2489/10/9/283/pdf
article html file updated 12 September 2019 14:56 CEST Original file -
article html file updated 12 September 2019 14:58 CEST Update -
article html file updated 12 September 2019 14:59 CEST Update -
article html file updated 13 February 2020 16:57 CET Update -
article html file updated 20 July 2022 03:34 CEST Update https://www.mdpi.com/2078-2489/10/9/283/html
Back to TopTop