Next Article in Journal
Topic Modeling for Analyzing Topic Manipulation Skills
Next Article in Special Issue
Editorial for Special Issue Detecting Attack and Incident Zone System
Previous Article in Journal
Betraying Blockchain: Accountability, Transparency and Document Standards for Non-Fungible Tokens (NFTs)
Previous Article in Special Issue
PocketCTF: A Fully Featured Approach for Hosting Portable Attack and Defense Cybersecurity Exercises
 
 
Article

Article Versions Notes

Information 2021, 12(9), 357; https://doi.org/10.3390/info12090357
Action Date Notes Link
article pdf uploaded. 31 August 2021 11:24 CEST Version of Record https://www.mdpi.com/2078-2489/12/9/357/pdf-vor
article xml file uploaded 3 September 2021 06:10 CEST Original file -
article xml uploaded. 3 September 2021 06:10 CEST Update -
article pdf uploaded. 3 September 2021 06:10 CEST Updated version of record https://www.mdpi.com/2078-2489/12/9/357/pdf-vor
article html file updated 3 September 2021 06:11 CEST Original file -
article html file updated 3 September 2021 10:08 CEST Update -
article xml file uploaded 10 September 2021 12:05 CEST Update -
article xml uploaded. 10 September 2021 12:05 CEST Update -
article pdf uploaded. 10 September 2021 12:05 CEST Updated version of record https://www.mdpi.com/2078-2489/12/9/357/pdf-vor
article html file updated 10 September 2021 12:07 CEST Update -
article xml file uploaded 10 September 2021 12:21 CEST Update -
article xml uploaded. 10 September 2021 12:21 CEST Update https://www.mdpi.com/2078-2489/12/9/357/xml
article pdf uploaded. 10 September 2021 12:21 CEST Updated version of record https://www.mdpi.com/2078-2489/12/9/357/pdf
article html file updated 10 September 2021 12:23 CEST Update https://www.mdpi.com/2078-2489/12/9/357/html
Back to TopTop