Next Article in Journal
Copy-Move Forgery Detection and Localization Using a Generative Adversarial Network and Convolutional Neural-Network
Previous Article in Journal
Another Step in the Ladder of DNS-Based Covert Channels: Hiding Ill-Disposed Information in DNSKEY RRs
 
 
Article

Article Versions Notes

Information 2019, 10(9), 285; https://doi.org/10.3390/info10090285
Action Date Notes Link
article xml file uploaded 14 September 2019 09:34 CEST Original file -
article pdf uploaded. 14 September 2019 09:34 CEST Version of Record https://www.mdpi.com/2078-2489/10/9/285/pdf-vor
article xml file uploaded 20 September 2019 05:09 CEST Update -
article xml uploaded. 20 September 2019 05:09 CEST Update https://www.mdpi.com/2078-2489/10/9/285/xml
article pdf uploaded. 20 September 2019 05:09 CEST Updated version of record https://www.mdpi.com/2078-2489/10/9/285/pdf
article html file updated 20 September 2019 05:11 CEST Original file -
article html file updated 20 September 2019 05:12 CEST Update -
article html file updated 20 September 2019 05:14 CEST Update -
article html file updated 13 February 2020 17:37 CET Update -
article html file updated 20 July 2022 03:24 CEST Update https://www.mdpi.com/2078-2489/10/9/285/html
Back to TopTop