Next Article in Journal
An Efficient Encryption Algorithm for the Security of Sensitive Private Information in Cyber-Physical Systems
Next Article in Special Issue
Application of Histogram-Based Outlier Scores to Detect Computer Network Anomalies
Previous Article in Journal
Efficient Iterative Process Based on an Improved Genetic Algorithm for Decoupling Capacitor Placement at Board Level
Previous Article in Special Issue
Mitigating ARP Cache Poisoning Attack in Software-Defined Networking (SDN): A Survey
 
 
Article

Article Versions Notes

Electronics 2019, 8(11), 1218; https://doi.org/10.3390/electronics8111218
Action Date Notes Link
article xml file uploaded 24 October 2019 17:11 CEST Original file -
article pdf uploaded. 24 October 2019 17:11 CEST Version of Record https://www.mdpi.com/2079-9292/8/11/1218/pdf-vor
article xml file uploaded 30 October 2019 07:10 CET Update -
article xml uploaded. 30 October 2019 07:10 CET Update https://www.mdpi.com/2079-9292/8/11/1218/xml
article pdf uploaded. 30 October 2019 07:10 CET Updated version of record https://www.mdpi.com/2079-9292/8/11/1218/pdf
article html file updated 30 October 2019 07:11 CET Original file -
article html file updated 27 November 2019 19:16 CET Update -
article html file updated 14 February 2020 03:48 CET Update https://www.mdpi.com/2079-9292/8/11/1218/html
Back to TopTop