Next Article in Journal
Rethinking Vulnerability Management: How AI and Automation Reshape Organizational Routines and Supports Adaptive Cybersecurity Systems
Previous Article in Journal
Modeling Healthcare Accessibility with Endogenous Search Ranges: A Huff-Based Multi-Source Data Approach
Previous Article in Special Issue
A Data Envelopment Analysis of Inland Ports’ Efficiency: Evidence from the Romanian Danube Ports
 
 
Article

Article Versions Notes

Systems 2026, 14(5), 572; https://doi.org/10.3390/systems14050572
Action Date Notes Link
article html file updated 22 May 2026 12:19 CEST Update https://www.mdpi.com/2079-8954/14/5/572/html
article pdf uploaded. 22 May 2026 12:17 CEST Updated version of record https://www.mdpi.com/2079-8954/14/5/572/pdf
article xml uploaded. 22 May 2026 12:17 CEST Update https://www.mdpi.com/2079-8954/14/5/572/xml
article xml file uploaded 22 May 2026 12:17 CEST Update -
article html file updated 22 May 2026 11:53 CEST Original file -
article pdf uploaded. 22 May 2026 11:51 CEST Updated version of record https://www.mdpi.com/2079-8954/14/5/572/pdf-vor
article xml uploaded. 22 May 2026 11:51 CEST Update -
article xml file uploaded 22 May 2026 11:51 CEST Original file -
article pdf uploaded. 18 May 2026 04:17 CEST Updated version of record https://www.mdpi.com/2079-8954/14/5/572/pdf-vor
article pdf uploaded. 17 May 2026 11:58 CEST Version of Record https://www.mdpi.com/2079-8954/14/5/572/pdf-vor
Back to TopTop