Next Article in Journal
IoT Security Mechanisms in the Example of BLE
Next Article in Special Issue
Assessment of Sustainable Collaboration in Collaborative Business Ecosystems
Previous Article in Journal
Cloud-Based Business Process Security Risk Management: A Systematic Review, Taxonomy, and Future Directions
Previous Article in Special Issue
The Application of Deep Learning Algorithms for PPG Signal Processing and Classification
 
 
Article

Article Versions Notes

Computers 2021, 10(12), 161; https://doi.org/10.3390/computers10120161
Action Date Notes Link
article pdf uploaded. 28 November 2021 11:45 CET Version of Record https://www.mdpi.com/2073-431X/10/12/161/pdf-vor
article xml file uploaded 1 December 2021 09:15 CET Original file -
article xml uploaded. 1 December 2021 09:15 CET Update https://www.mdpi.com/2073-431X/10/12/161/xml
article pdf uploaded. 1 December 2021 09:15 CET Updated version of record https://www.mdpi.com/2073-431X/10/12/161/pdf
article html file updated 1 December 2021 09:17 CET Original file -
article html file updated 30 July 2022 19:19 CEST Update https://www.mdpi.com/2073-431X/10/12/161/html
Back to TopTop