Next Article in Journal
A Holistic Approach to Ransomware Classification: Leveraging Static and Dynamic Analysis with Visualization
Next Article in Special Issue
Directed Criminal Networks: Temporal Analysis and Disruption
Previous Article in Journal
Radar-Based Invisible Biometric Authentication
Previous Article in Special Issue
Interoperability and Targeted Attacks on Terrorist Organizations Using Intelligent Tools from Network Science
 
 
Article

Article Versions Notes

Information 2024, 15(1), 45; https://doi.org/10.3390/info15010045
Action Date Notes Link
article xml file uploaded 12 January 2024 14:35 CET Original file -
article xml uploaded. 12 January 2024 14:35 CET Update -
article pdf uploaded. 12 January 2024 14:35 CET Version of Record https://www.mdpi.com/2078-2489/15/1/45/pdf-vor
article html file updated 12 January 2024 14:37 CET Original file -
article xml file uploaded 23 January 2024 07:16 CET Update -
article xml uploaded. 23 January 2024 07:16 CET Update -
article pdf uploaded. 23 January 2024 07:16 CET Updated version of record https://www.mdpi.com/2078-2489/15/1/45/pdf-vor
article xml file uploaded 23 January 2024 07:18 CET Update -
article xml uploaded. 23 January 2024 07:18 CET Update https://www.mdpi.com/2078-2489/15/1/45/xml
article pdf uploaded. 23 January 2024 07:18 CET Updated version of record https://www.mdpi.com/2078-2489/15/1/45/pdf
article html file updated 23 January 2024 07:18 CET Update -
article html file updated 23 January 2024 07:20 CET Update https://www.mdpi.com/2078-2489/15/1/45/html
Back to TopTop