Next Article in Journal
A Novel Cryptography-Based Architecture for Secure Data Asset Sharing and Circulation Systems
Next Article in Special Issue
Multi-Layered Security Assessment in mHealth Environments: Case Study on Server, Mobile and Wearable Components in the PHGL-COVID Platform
Previous Article in Journal
Automated Exploratory Clustering to Democratize Clustering Analysis
Previous Article in Special Issue
Evaluating Cybersecurity Risks of Bulgaria’s Energy Sector: Focus on PV and HVAC-R
 
 
Article

Article Versions Notes

Appl. Sci. 2025, 15(12), 6878; https://doi.org/10.3390/app15126878
Action Date Notes Link
article pdf uploaded. 18 June 2025 14:35 CEST Version of Record https://www.mdpi.com/2076-3417/15/12/6878/pdf-vor
article xml file uploaded 19 June 2025 05:43 CEST Original file -
article xml uploaded. 19 June 2025 05:43 CEST Update -
article pdf uploaded. 19 June 2025 05:43 CEST Updated version of record https://www.mdpi.com/2076-3417/15/12/6878/pdf-vor
article html file updated 19 June 2025 05:47 CEST Original file -
article xml file uploaded 19 June 2025 07:40 CEST Update -
article xml uploaded. 19 June 2025 07:40 CEST Update https://www.mdpi.com/2076-3417/15/12/6878/xml
article pdf uploaded. 19 June 2025 07:40 CEST Updated version of record https://www.mdpi.com/2076-3417/15/12/6878/pdf
article html file updated 19 June 2025 07:43 CEST Update -
article html file updated 25 June 2025 10:16 CEST Update https://www.mdpi.com/2076-3417/15/12/6878/html
Back to TopTop