Next Article in Journal
Detecting Website Defacements Based on Machine Learning Techniques and Attack Signatures
Next Article in Special Issue
Autonomous Wireless Sensor Networks in an IPM Spatial Decision Support System
Previous Article in Journal
A Novel Dictionary-Driven Mental Spelling Application Based on Code-Modulated Visual Evoked Potentials
Previous Article in Special Issue
Symmetric-Key-Based Security for Multicast Communication in Wireless Sensor Networks
 
 
Article

Article Versions Notes

Action Date Notes Link
article xml file uploaded 3 May 2019 06:13 CEST Original file -
article pdf uploaded. 3 May 2019 06:13 CEST Version of Record https://www.mdpi.com/2073-431X/8/2/34/pdf-vor
article xml file uploaded 31 May 2019 12:36 CEST Update -
article xml uploaded. 31 May 2019 12:36 CEST Update https://www.mdpi.com/2073-431X/8/2/34/xml
article pdf uploaded. 31 May 2019 12:36 CEST Updated version of record https://www.mdpi.com/2073-431X/8/2/34/pdf
article html file updated 31 May 2019 12:38 CEST Original file -
article html file updated 4 July 2019 16:57 CEST Update -
article html file updated 19 October 2019 11:26 CEST Update -
article html file updated 12 February 2020 09:38 CET Update https://www.mdpi.com/2073-431X/8/2/34/html
Back to TopTop