Next Article in Journal
Signature-Based Security Analysis and Detection of IoT Threats in Advanced Message Queuing Protocol
Previous Article in Journal
Simulation-Based Evaluation of V2X System with Variable Computational Infrastructure
 
 
Article

Article Versions Notes

Action Date Notes Link
article pdf uploaded. 17 February 2025 09:51 CET Version of Record https://www.mdpi.com/2673-8732/5/1/6/pdf-vor
article xml file uploaded 18 February 2025 09:36 CET Original file -
article xml uploaded. 18 February 2025 09:36 CET Update -
article pdf uploaded. 18 February 2025 09:36 CET Updated version of record https://www.mdpi.com/2673-8732/5/1/6/pdf-vor
article html file updated 18 February 2025 09:38 CET Original file -
article xml file uploaded 19 February 2025 10:20 CET Update -
article xml uploaded. 19 February 2025 10:20 CET Update https://www.mdpi.com/2673-8732/5/1/6/xml
article pdf uploaded. 19 February 2025 10:20 CET Updated version of record https://www.mdpi.com/2673-8732/5/1/6/pdf
article html file updated 19 February 2025 10:22 CET Update https://www.mdpi.com/2673-8732/5/1/6/html
Back to TopTop