Next Article in Journal
Meta-Heuristic Optimization Algorithm-Based Hierarchical Intrusion Detection System
Previous Article in Journal
Correction: Mohammad et al. User Authentication and Authorization Framework in IoT Protocols. Computers 2022, 11, 147
 
 
Review

Article Versions Notes

Computers 2022, 11(12), 169; https://doi.org/10.3390/computers11120169
Action Date Notes Link
article pdf uploaded. 27 November 2022 15:04 CET Version of Record https://www.mdpi.com/2073-431X/11/12/169/pdf-vor
article xml file uploaded 2 December 2022 08:50 CET Original file -
article xml uploaded. 2 December 2022 08:50 CET Update -
article pdf uploaded. 2 December 2022 08:50 CET Updated version of record https://www.mdpi.com/2073-431X/11/12/169/pdf-vor
article html file updated 2 December 2022 08:51 CET Original file -
article xml file uploaded 12 December 2022 04:21 CET Update -
article xml uploaded. 12 December 2022 04:21 CET Update https://www.mdpi.com/2073-431X/11/12/169/xml
article pdf uploaded. 12 December 2022 04:21 CET Updated version of record https://www.mdpi.com/2073-431X/11/12/169/pdf
article html file updated 12 December 2022 04:23 CET Update -
article html file updated 3 March 2023 23:22 CET Update https://www.mdpi.com/2073-431X/11/12/169/html
Back to TopTop