Next Article in Journal
Application of Pattern Language for Game Design in Pedagogy and Design Practice
Next Article in Special Issue
Beyond Importance Scores: Interpreting Tabular ML by Visualizing Feature Semantics
Previous Article in Journal
Leveraging Aviation Risk Models to Combat Cybersecurity Threats in Vehicular Networks
 
 
Due to scheduled maintenance work on our database systems, there may be short service disruptions on this website between 10:00 and 11:00 CEST on June 14th.
Article

Article Versions Notes

Information 2021, 12(10), 392; https://doi.org/10.3390/info12100392
Action Date Notes Link
article pdf uploaded. 23 September 2021 13:06 CEST Version of Record https://www.mdpi.com/2078-2489/12/10/392/pdf-vor
article xml file uploaded 27 September 2021 12:54 CEST Original file -
article xml uploaded. 27 September 2021 12:54 CEST Update -
article pdf uploaded. 27 September 2021 12:54 CEST Updated version of record https://www.mdpi.com/2078-2489/12/10/392/pdf-vor
article html file updated 27 September 2021 12:56 CEST Original file -
article html file updated 28 September 2021 10:00 CEST Update -
article xml file uploaded 29 September 2021 10:30 CEST Update -
article xml uploaded. 29 September 2021 10:30 CEST Update https://www.mdpi.com/2078-2489/12/10/392/xml
article pdf uploaded. 29 September 2021 10:30 CEST Updated version of record https://www.mdpi.com/2078-2489/12/10/392/pdf
article html file updated 29 September 2021 10:32 CEST Update -
article html file updated 30 July 2022 07:12 CEST Update https://www.mdpi.com/2078-2489/12/10/392/html
Back to TopTop