Next Article in Journal
There Are Infinite Ways to Formulate Code: How to Mitigate the Resulting Problems for Better Software Vulnerability Detection
Previous Article in Journal
Automated Mapping of Common Vulnerabilities and Exposures to MITRE ATT&CK Tactics
 
 
Article

Article Versions Notes

Information 2024, 15(4), 215; https://doi.org/10.3390/info15040215
Action Date Notes Link
article xml file uploaded 11 April 2024 04:31 CEST Original file -
article xml uploaded. 11 April 2024 04:31 CEST Update -
article pdf uploaded. 11 April 2024 04:31 CEST Version of Record -
article html file updated 11 April 2024 04:32 CEST Original file -
article xml file uploaded 11 April 2024 04:57 CEST Update -
article xml uploaded. 11 April 2024 04:57 CEST Update https://www.mdpi.com/2078-2489/15/4/215/xml
article pdf uploaded. 11 April 2024 04:57 CEST Updated version of record https://www.mdpi.com/2078-2489/15/4/215/pdf
article html file updated 11 April 2024 04:58 CEST Update https://www.mdpi.com/2078-2489/15/4/215/html
Back to TopTop