Next Article in Journal
Advancing Cybersecurity with Honeypots and Deception Strategies
Previous Article in Journal
How to Improve Usability in Open-Source Software Projects? An Analysis of Evaluation Techniques Through a Multiple Case Study
 
 
Article

Article Versions Notes

Informatics 2025, 12(1), 13; https://doi.org/10.3390/informatics12010013
Action Date Notes Link
article pdf uploaded. 31 January 2025 14:15 CET Version of Record https://www.mdpi.com/2227-9709/12/1/13/pdf-vor
article xml file uploaded 11 February 2025 07:32 CET Original file -
article xml uploaded. 11 February 2025 07:32 CET Update -
article pdf uploaded. 11 February 2025 07:32 CET Updated version of record https://www.mdpi.com/2227-9709/12/1/13/pdf-vor
article html file updated 11 February 2025 07:34 CET Original file -
article xml file uploaded 11 February 2025 07:55 CET Update -
article xml uploaded. 11 February 2025 07:55 CET Update https://www.mdpi.com/2227-9709/12/1/13/xml
article pdf uploaded. 11 February 2025 07:55 CET Updated version of record https://www.mdpi.com/2227-9709/12/1/13/pdf
article html file updated 11 February 2025 07:57 CET Update https://www.mdpi.com/2227-9709/12/1/13/html
Back to TopTop