Next Article in Journal
Towards Integrating Mobile Devices into Dew Computing: A Model for Hour-Wise Prediction of Energy Availability
Previous Article in Journal
Anomaly-Based Method for Detecting Multiple Classes of Network Attacks
 
 
Review

Article Versions Notes

Information 2019, 10(3), 85; https://doi.org/10.3390/info10030085
Action Date Notes Link
article xml file uploaded 26 February 2019 10:09 CET Original file -
article xml uploaded. 26 February 2019 10:09 CET Update https://www.mdpi.com/2078-2489/10/3/85/xml
article pdf uploaded. 26 February 2019 10:09 CET Version of Record https://www.mdpi.com/2078-2489/10/3/85/pdf
article html file updated 26 February 2019 10:10 CET Original file -
article html file updated 28 February 2019 04:27 CET Update -
article html file updated 2 April 2019 04:27 CEST Update -
article html file updated 4 April 2019 03:35 CEST Update -
article html file updated 12 April 2019 06:47 CEST Update -
article html file updated 26 April 2019 11:17 CEST Update -
article html file updated 15 October 2019 15:52 CEST Update -
article html file updated 11 February 2020 18:35 CET Update https://www.mdpi.com/2078-2489/10/3/85/html
Back to TopTop