Next Article in Journal
Feature Focus: Towards Explainable and Transparent Deep Face Morphing Attack Detectors
Next Article in Special Issue
An Architecture for Distributed Electronic Documents Storage in Decentralized Blockchain B2B Applications
Previous Article in Journal
An Experimental Study on Centrality Measures Using Clustering
Previous Article in Special Issue
Proposal for an Implementation Guide for a Computer Security Incident Response Team on a University Campus
 
 
Article

Article Versions Notes

Computers 2021, 10(9), 116; https://doi.org/10.3390/computers10090116
Action Date Notes Link
article pdf uploaded. 16 September 2021 15:03 CEST Version of Record https://www.mdpi.com/2073-431X/10/9/116/pdf-vor
article xml file uploaded 17 September 2021 11:21 CEST Original file -
article xml uploaded. 17 September 2021 11:21 CEST Update -
article pdf uploaded. 17 September 2021 11:21 CEST Updated version of record https://www.mdpi.com/2073-431X/10/9/116/pdf-vor
article html file updated 17 September 2021 11:23 CEST Original file -
article html file updated 18 September 2021 10:02 CEST Update -
article xml file uploaded 22 September 2021 04:48 CEST Update -
article xml uploaded. 22 September 2021 04:48 CEST Update https://www.mdpi.com/2073-431X/10/9/116/xml
article pdf uploaded. 22 September 2021 04:48 CEST Updated version of record https://www.mdpi.com/2073-431X/10/9/116/pdf
article html file updated 22 September 2021 04:49 CEST Update -
article html file updated 30 July 2022 06:10 CEST Update https://www.mdpi.com/2073-431X/10/9/116/html
Back to TopTop