Next Article in Journal
Development of an In-Vehicle Intrusion Detection Model Integrating Federated Learning and LSTM Networks
Previous Article in Journal
Cloud Security Assessment: A Taxonomy-Based and Stakeholder-Driven Approach
 
 
Article

Article Versions Notes

Information 2025, 16(4), 290; https://doi.org/10.3390/info16040290
Action Date Notes Link
article pdf uploaded. 4 April 2025 16:49 CEST Version of Record https://www.mdpi.com/2078-2489/16/4/290/pdf-vor
article supplementary file uploaded. 4 April 2025 16:49 CEST - https://www.mdpi.com/2078-2489/16/4/290#supplementary
article xml file uploaded 7 April 2025 09:31 CEST Original file -
article xml uploaded. 7 April 2025 09:31 CEST Update -
article pdf uploaded. 7 April 2025 09:31 CEST Updated version of record https://www.mdpi.com/2078-2489/16/4/290/pdf-vor
article html file updated 7 April 2025 09:31 CEST Original file -
article xml file uploaded 10 April 2025 04:52 CEST Update -
article xml uploaded. 10 April 2025 04:52 CEST Update https://www.mdpi.com/2078-2489/16/4/290/xml
article pdf uploaded. 10 April 2025 04:52 CEST Updated version of record https://www.mdpi.com/2078-2489/16/4/290/pdf
article html file updated 10 April 2025 04:54 CEST Update -
article supplementary file uploaded. 10 April 2025 07:51 CEST - https://www.mdpi.com/2078-2489/16/4/290#supplementary
article html file updated 10 April 2025 07:51 CEST Update https://www.mdpi.com/2078-2489/16/4/290/html
Back to TopTop