Next Article in Journal
A Framework for Detecting System Performance Anomalies Using Tracing Data Analysis
Next Article in Special Issue
Schrödinger’s Ballot: Quantum Information and the Violation of Arrow’s Impossibility Theorem
Previous Article in Journal
A Hybrid Analysis-Based Approach to Android Malware Family Classification
Previous Article in Special Issue
Performance Improvement of Atmospheric Continuous-Variable Quantum Key Distribution with Untrusted Source
 
 
Article

Article Versions Notes

Action Date Notes Link
article xml file uploaded 3 August 2021 15:16 CEST Original file -
article xml uploaded. 3 August 2021 15:16 CEST Update -
article pdf uploaded. 3 August 2021 15:16 CEST Version of Record https://0-www-mdpi-com.brum.beds.ac.uk/1099-4300/23/8/1010/pdf-vor
article xml file uploaded 4 August 2021 09:39 CEST Update -
article xml uploaded. 4 August 2021 09:39 CEST Update https://0-www-mdpi-com.brum.beds.ac.uk/1099-4300/23/8/1010/xml
article pdf uploaded. 4 August 2021 09:39 CEST Updated version of record https://0-www-mdpi-com.brum.beds.ac.uk/1099-4300/23/8/1010/pdf
article html file updated 4 August 2021 09:40 CEST Original file -
article html file updated 27 July 2022 08:02 CEST Update https://0-www-mdpi-com.brum.beds.ac.uk/1099-4300/23/8/1010/html
Back to TopTop