Next Article in Journal
Anomaly-Based Method for Detecting Multiple Classes of Network Attacks
Previous Article in Journal
Machine Reading Comprehension for Answer Re-Ranking in Customer Support Chatbots
Previous Article in Special Issue
Efficient Security Scheme for Disaster Surveillance UAV Communication Networks
 
 
Article

Article Versions Notes

Information 2019, 10(3), 83; https://doi.org/10.3390/info10030083
Action Date Notes Link
article xml file uploaded 26 February 2019 05:22 CET Original file -
article xml uploaded. 26 February 2019 05:22 CET Update https://www.mdpi.com/2078-2489/10/3/83/xml
article pdf uploaded. 26 February 2019 05:22 CET Version of Record https://www.mdpi.com/2078-2489/10/3/83/pdf
article html file updated 26 February 2019 05:24 CET Original file -
article html file updated 28 February 2019 03:59 CET Update -
article html file updated 2 April 2019 04:27 CEST Update -
article html file updated 4 April 2019 03:20 CEST Update -
article html file updated 12 April 2019 06:58 CEST Update -
article html file updated 26 April 2019 11:29 CEST Update -
article html file updated 15 October 2019 15:17 CEST Update -
article html file updated 11 February 2020 18:30 CET Update -
article html file updated 19 July 2022 15:36 CEST Update https://www.mdpi.com/2078-2489/10/3/83/html
Back to TopTop