Next Article in Journal
Algorithm for T-Spherical Fuzzy Multi-Attribute Decision Making Based on Improved Interactive Aggregation Operators
Next Article in Special Issue
A DRDoS Detection and Defense Method Based on Deep Forest in the Big Data Environment
Previous Article in Journal
Conservation Laws for a Delayed Hamiltonian System in a Time Scales Version
Previous Article in Special Issue
IoT Application-Layer Protocol Vulnerability Detection using Reverse Engineering
 
 
Article

Article Versions Notes

Symmetry 2018, 10(12), 669; https://doi.org/10.3390/sym10120669
Action Date Notes Link
article xml file uploaded 27 November 2018 07:24 CET Original file -
article xml uploaded. 27 November 2018 07:24 CET Update -
article pdf uploaded. 27 November 2018 07:24 CET Version of Record -
article xml file uploaded 27 November 2018 09:20 CET Update -
article xml uploaded. 27 November 2018 09:20 CET Update https://www.mdpi.com/2073-8994/10/12/669/xml
article pdf uploaded. 27 November 2018 09:20 CET Updated version of record https://www.mdpi.com/2073-8994/10/12/669/pdf
article html file updated 27 November 2018 11:56 CET Original file -
article html file updated 27 November 2018 13:13 CET Update -
article html file updated 25 December 2018 04:24 CET Update -
article html file updated 2 April 2019 02:58 CEST Update -
article html file updated 13 April 2019 23:16 CEST Update -
article html file updated 28 April 2019 03:09 CEST Update -
article html file updated 11 October 2019 00:51 CEST Update -
article html file updated 10 February 2020 23:31 CET Update -
article html file updated 17 July 2022 11:23 CEST Update https://www.mdpi.com/2073-8994/10/12/669/html
Back to TopTop