Next Article in Journal
Threat Modeling—How to Visualize Attacks on IOTA?
Previous Article in Journal
Resource Management Techniques for Cloud/Fog and Edge Computing: An Evaluation Framework and Classification
 
 
Article

Article Versions Notes

Action Date Notes Link
article pdf uploaded. 6 March 2021 06:34 CET Version of Record https://0-www-mdpi-com.brum.beds.ac.uk/1424-8220/21/5/1833/pdf-vor
article xml file uploaded 11 March 2021 09:00 CET Original file -
article xml uploaded. 11 March 2021 09:00 CET Update https://0-www-mdpi-com.brum.beds.ac.uk/1424-8220/21/5/1833/xml
article pdf uploaded. 11 March 2021 09:00 CET Updated version of record https://0-www-mdpi-com.brum.beds.ac.uk/1424-8220/21/5/1833/pdf
article html file updated 11 March 2021 09:01 CET Original file -
article html file updated 25 July 2022 06:24 CEST Update https://0-www-mdpi-com.brum.beds.ac.uk/1424-8220/21/5/1833/html
Back to TopTop