Next Article in Journal
Possibilities of Detecting Damage Due to Osmosis of GFRP Composites Used in Marine Applications
Next Article in Special Issue
Teletraffic Analysis of DoS and Malware Cyber Attacks on P2P Networks under Exponential Assumptions
Previous Article in Journal
An Internet of Things Access Control Scheme Based on Permissioned Blockchain and Edge Computing
Previous Article in Special Issue
MAC-Based Compression Ratio Improvement for CAN Security
 
 
Article

Article Versions Notes

Appl. Sci. 2023, 13(7), 4170; https://doi.org/10.3390/app13074170
Action Date Notes Link
article pdf uploaded. 24 March 2023 16:40 CET Version of Record https://www.mdpi.com/2076-3417/13/7/4170/pdf-vor
article pdf uploaded. 25 March 2023 07:34 CET Updated version of record https://www.mdpi.com/2076-3417/13/7/4170/pdf-vor
article xml uploaded. 27 March 2023 03:19 CEST Original file https://www.mdpi.com/2076-3417/13/7/4170/xml
article pdf uploaded. 27 March 2023 03:19 CEST Updated version of record https://www.mdpi.com/2076-3417/13/7/4170/pdf
article html file updated 27 March 2023 03:21 CEST Original file -
article html file updated 6 April 2023 22:26 CEST Update https://www.mdpi.com/2076-3417/13/7/4170/html
Back to TopTop