Next Article in Journal
Centralized Two-Tiered Tree-Based Intrusion-Detection System (C2T-IDS)
Previous Article in Journal
Blockchain for Secure IoT: A Review of Identity Management, Access Control, and Trust Mechanisms
 
 
Review

Article Versions Notes

Action Date Notes Link
article html file updated 14 November 2025 03:54 CET Update https://www.mdpi.com/2624-831X/6/4/66/html
article html file updated 14 November 2025 03:53 CET Update -
article pdf uploaded. 14 November 2025 03:53 CET Updated version of record https://www.mdpi.com/2624-831X/6/4/66/pdf
article xml uploaded. 14 November 2025 03:53 CET Update https://www.mdpi.com/2624-831X/6/4/66/xml
article xml file uploaded 14 November 2025 03:53 CET Update -
article pdf uploaded. 14 November 2025 03:51 CET Updated version of record https://www.mdpi.com/2624-831X/6/4/66/pdf-vor
article xml uploaded. 14 November 2025 03:51 CET Update -
article xml file uploaded 14 November 2025 03:51 CET Update -
article html file updated 3 November 2025 07:42 CET Update -
article pdf uploaded. 3 November 2025 07:40 CET Updated version of record https://www.mdpi.com/2624-831X/6/4/66/pdf-vor
article xml uploaded. 3 November 2025 07:40 CET Update -
article xml file uploaded 3 November 2025 07:40 CET Update -
article html file updated 30 October 2025 15:29 CET Original file -
article pdf uploaded. 30 October 2025 15:27 CET Version of Record https://www.mdpi.com/2624-831X/6/4/66/pdf-vor
article xml uploaded. 30 October 2025 15:27 CET Update -
article xml file uploaded 30 October 2025 15:27 CET Original file -
Back to TopTop