Next Article in Journal
The Effect of the Ransomware Dataset Age on the Detection Accuracy of Machine Learning Models
Next Article in Special Issue
Assessing the Security and Privacy of Android Official ID Wallet Apps
Previous Article in Journal
A Survey on Feature Selection Techniques Based on Filtering Methods for Cyber Attack Detection
Previous Article in Special Issue
Blockchain Data Availability Scheme with Strong Data Privacy Protection
 
 
Review

Article Versions Notes

Information 2023, 14(3), 192; https://doi.org/10.3390/info14030192
Action Date Notes Link
article xml file uploaded 17 March 2023 12:46 CET Original file -
article xml uploaded. 17 March 2023 12:46 CET Update -
article pdf uploaded. 17 March 2023 12:46 CET Version of Record https://www.mdpi.com/2078-2489/14/3/192/pdf-vor
article html file updated 17 March 2023 12:47 CET Original file -
article xml file uploaded 23 March 2023 09:55 CET Update -
article xml uploaded. 23 March 2023 09:55 CET Update -
article pdf uploaded. 23 March 2023 09:55 CET Updated version of record https://www.mdpi.com/2078-2489/14/3/192/pdf-vor
article html file updated 23 March 2023 09:56 CET Update -
article xml file uploaded 24 March 2023 07:34 CET Update -
article xml uploaded. 24 March 2023 07:34 CET Update https://www.mdpi.com/2078-2489/14/3/192/xml
article pdf uploaded. 24 March 2023 07:34 CET Updated version of record https://www.mdpi.com/2078-2489/14/3/192/pdf
article html file updated 24 March 2023 07:36 CET Update -
article html file updated 6 April 2023 20:31 CEST Update https://www.mdpi.com/2078-2489/14/3/192/html
Back to TopTop