Next Article in Journal
Formal Template-Based Generation of Attack–Defence Trees for Automated Security Analysis
Next Article in Special Issue
A New Social Media Analytics Method for Identifying Factors Contributing to COVID-19 Discussion Topics
Previous Article in Journal
Considerations, Advances, and Challenges Associated with the Use of Specific Emitter Identification in the Security of Internet of Things Deployments: A Survey
Previous Article in Special Issue
Health Monitoring Apps: An Evaluation of the Persuasive System Design Model for Human Wellbeing
 
 
Article

Article Versions Notes

Information 2023, 14(9), 480; https://doi.org/10.3390/info14090480
Action Date Notes Link
article xml file uploaded 29 August 2023 14:00 CEST Original file -
article xml uploaded. 29 August 2023 14:00 CEST Update -
article pdf uploaded. 29 August 2023 14:00 CEST Version of Record -
article html file updated 29 August 2023 14:02 CEST Original file -
article xml file uploaded 29 August 2023 14:29 CEST Update -
article xml uploaded. 29 August 2023 14:29 CEST Update https://www.mdpi.com/2078-2489/14/9/480/xml
article pdf uploaded. 29 August 2023 14:29 CEST Updated version of record https://www.mdpi.com/2078-2489/14/9/480/pdf
article html file updated 29 August 2023 14:30 CEST Update https://www.mdpi.com/2078-2489/14/9/480/html
Back to TopTop