Next Article in Journal
The Importance of the Security Culture in SMEs as Regards the Correct Management of the Security of Their Assets
Next Article in Special Issue
A Survey of Game Theoretic Approaches to Modelling Decision-Making in Information Warfare Scenarios
Previous Article in Journal
Substring Position Search over Encrypted Cloud Data Supporting Efficient Multi-User Setup
 
 
Article

Article Versions Notes

Action Date Notes Link
article pdf uploaded. 5 July 2016 08:12 CEST Version of Record https://0-www-mdpi-com.brum.beds.ac.uk/1999-5903/8/3/29/pdf
article xml uploaded. 5 July 2016 08:12 CEST Original file https://0-www-mdpi-com.brum.beds.ac.uk/1999-5903/8/3/29/xml
article html file updated 5 July 2016 08:14 CEST Original file -
article html file updated 27 March 2019 09:23 CET Update -
article html file updated 5 May 2019 11:00 CEST Update -
article html file updated 7 February 2020 11:13 CET Update https://0-www-mdpi-com.brum.beds.ac.uk/1999-5903/8/3/29/html
Back to TopTop