Next Article in Journal
An Iterative Approach for the Solution of the Constrained OWA Aggregation Problem with Two Comonotone Constraints
Next Article in Special Issue
FIRE: A Finely Integrated Risk Evaluation Methodology for Life-Critical Embedded Systems
Previous Article in Journal
Rebuilding Stakeholder Confidence in Health-Relevant Big Data Applications: A Social Representations Perspective
Previous Article in Special Issue
An Attribute-Based Approach toward a Secured Smart-Home IoT Access Control and a Comparison with a Role-Based Approach
 
 
Article

Article Versions Notes

Information 2022, 13(10), 442; https://doi.org/10.3390/info13100442
Action Date Notes Link
article pdf uploaded. 20 September 2022 14:51 CEST Version of Record https://www.mdpi.com/2078-2489/13/10/442/pdf-vor
article xml file uploaded 27 September 2022 14:01 CEST Original file -
article xml uploaded. 27 September 2022 14:01 CEST Update -
article pdf uploaded. 27 September 2022 14:01 CEST Updated version of record https://www.mdpi.com/2078-2489/13/10/442/pdf-vor
article html file updated 27 September 2022 14:02 CEST Original file -
article html file updated 28 September 2022 09:58 CEST Update -
article xml file uploaded 26 October 2022 09:08 CEST Update -
article xml uploaded. 26 October 2022 09:08 CEST Update https://www.mdpi.com/2078-2489/13/10/442/xml
article pdf uploaded. 26 October 2022 09:08 CEST Updated version of record https://www.mdpi.com/2078-2489/13/10/442/pdf
article html file updated 26 October 2022 09:09 CEST Update https://www.mdpi.com/2078-2489/13/10/442/html
Back to TopTop