Next Article in Journal
An Optimization Strategy for Security and Reliability in a Diamond Untrusted Relay Network with Cooperative Jamming
Previous Article in Journal
Efficient Collaborative Edge Computing for Vehicular Network Using Clustering Service
 
 
Correction

Article Versions Notes

Action Date Notes Link
article xml uploaded. 11 September 2024 10:51 CEST Original file -
article xml file uploaded 11 September 2024 10:51 CEST Update -
article pdf uploaded. 11 September 2024 10:51 CEST Version of Record https://www.mdpi.com/2673-8732/4/3/19/pdf-vor
article html file updated 11 September 2024 10:53 CEST Original file -
article xml file uploaded 11 September 2024 12:13 CEST Update -
article xml uploaded. 11 September 2024 12:13 CEST Update -
article pdf uploaded. 11 September 2024 12:13 CEST Updated version of record https://www.mdpi.com/2673-8732/4/3/19/pdf-vor
article html file updated 11 September 2024 12:16 CEST Update -
article xml file uploaded 11 September 2024 12:18 CEST Update -
article xml uploaded. 11 September 2024 12:18 CEST Update -
article pdf uploaded. 11 September 2024 12:18 CEST Updated version of record https://www.mdpi.com/2673-8732/4/3/19/pdf-vor
article html file updated 11 September 2024 12:21 CEST Update -
article xml file uploaded 12 September 2024 03:29 CEST Update -
article xml uploaded. 12 September 2024 03:29 CEST Update https://www.mdpi.com/2673-8732/4/3/19/xml
article pdf uploaded. 12 September 2024 03:29 CEST Updated version of record https://www.mdpi.com/2673-8732/4/3/19/pdf
article html file updated 12 September 2024 03:31 CEST Update -
article html file updated 26 June 2025 18:27 CEST Update https://www.mdpi.com/2673-8732/4/3/19/html
Back to TopTop