Next Article in Journal
A Study on the Identification of Delayed Delivery Risk Transmission Paths in Multi-Variety and Low-Volume Enterprises Based on Bayesian Network
Next Article in Special Issue
The eIDAS Regulation: A Survey of Technological Trends for European Electronic Identity Schemes
Previous Article in Journal
BChainGuard: A New Framework for Cyberthreats Detection in Blockchain Using Machine Learning
Previous Article in Special Issue
Evaluation of Survivability of the Automatically Obfuscated Android Malware
 
 
Article

Article Versions Notes

Appl. Sci. 2022, 12(23), 12025; https://doi.org/10.3390/app122312025
Action Date Notes Link
article pdf uploaded. 24 November 2022 14:31 CET Version of Record https://www.mdpi.com/2076-3417/12/23/12025/pdf-vor
article xml file uploaded 28 November 2022 10:00 CET Original file -
article xml uploaded. 28 November 2022 10:00 CET Update https://www.mdpi.com/2076-3417/12/23/12025/xml
article pdf uploaded. 28 November 2022 10:00 CET Updated version of record https://www.mdpi.com/2076-3417/12/23/12025/pdf
article html file updated 28 November 2022 10:02 CET Original file -
article html file updated 1 March 2023 00:46 CET Update -
article html file updated 3 March 2023 22:41 CET Update https://www.mdpi.com/2076-3417/12/23/12025/html
Back to TopTop