Next Article in Journal
Unknown Security Attack Detection of Industrial Control System by Deep Learning
Next Article in Special Issue
Three-Parameter Estimation Method of Multiple Hybrid Weibull Distribution Based on the EM Optimization Algorithm
Previous Article in Journal
Quantum Steganography Based on the B92 Quantum Protocol
Previous Article in Special Issue
Optimal Control of PC-PLC Virus-Mutation and Multi-Delay Propagation Model in Distribution Network CPS
 
 
Article

Article Versions Notes

Mathematics 2022, 10(16), 2871; https://doi.org/10.3390/math10162871
Action Date Notes Link
article pdf uploaded. 11 August 2022 13:43 CEST Version of Record https://www.mdpi.com/2227-7390/10/16/2871/pdf-vor
article xml file uploaded 18 August 2022 12:15 CEST Original file -
article xml uploaded. 18 August 2022 12:15 CEST Update -
article pdf uploaded. 18 August 2022 12:15 CEST Updated version of record https://www.mdpi.com/2227-7390/10/16/2871/pdf-vor
article html file updated 18 August 2022 12:17 CEST Original file -
article html file updated 19 August 2022 09:58 CEST Update -
article xml file uploaded 22 August 2022 14:33 CEST Update -
article xml uploaded. 22 August 2022 14:33 CEST Update https://www.mdpi.com/2227-7390/10/16/2871/xml
article pdf uploaded. 22 August 2022 14:33 CEST Updated version of record https://www.mdpi.com/2227-7390/10/16/2871/pdf
article html file updated 22 August 2022 14:35 CEST Update https://www.mdpi.com/2227-7390/10/16/2871/html
Back to TopTop