Next Article in Journal
Threats, Attacks, and Cryptography Frameworks of Cybersecurity in Critical Infrastructures
Previous Article in Journal
Pervasive User Data Collection from Cyberspace: Privacy Concerns and Countermeasures
 
 
Article

Article Versions Notes

Action Date Notes Link
article pdf uploaded. 4 February 2024 14:04 CET Version of Record https://www.mdpi.com/2410-387X/8/1/6/pdf-vor
article xml file uploaded 5 February 2024 07:55 CET Original file -
article xml uploaded. 5 February 2024 07:55 CET Update -
article pdf uploaded. 5 February 2024 07:55 CET Updated version of record https://www.mdpi.com/2410-387X/8/1/6/pdf-vor
article html file updated 5 February 2024 07:57 CET Original file -
article xml file uploaded 7 February 2024 03:31 CET Update -
article xml uploaded. 7 February 2024 03:31 CET Update https://www.mdpi.com/2410-387X/8/1/6/xml
article pdf uploaded. 7 February 2024 03:31 CET Updated version of record https://www.mdpi.com/2410-387X/8/1/6/pdf
article html file updated 7 February 2024 03:33 CET Update https://www.mdpi.com/2410-387X/8/1/6/html
Back to TopTop