Next Article in Journal
Analysis of Random Local Descriptors in Face Recognition
Next Article in Special Issue
Advanced Cybersecurity Services Design
Previous Article in Journal
Cross-Compiler Bipartite Vulnerability Search
Previous Article in Special Issue
Resilience Evaluation of Multi-Path Routing against Network Attacks and Failures
 
 
Review

Article Versions Notes

Action Date Notes Link
article xml file uploaded 7 June 2021 07:53 CEST Original file -
article xml uploaded. 7 June 2021 07:53 CEST Update -
article pdf uploaded. 7 June 2021 07:53 CEST Version of Record -
article html file updated 7 June 2021 07:54 CEST Original file -
article xml file uploaded 7 June 2021 13:20 CEST Update -
article xml uploaded. 7 June 2021 13:20 CEST Update https://0-www-mdpi-com.brum.beds.ac.uk/2079-9292/10/11/1357/xml
article pdf uploaded. 7 June 2021 13:21 CEST Updated version of record https://0-www-mdpi-com.brum.beds.ac.uk/2079-9292/10/11/1357/pdf
article html file updated 7 June 2021 13:22 CEST Update -
article html file updated 26 July 2022 23:08 CEST Update https://0-www-mdpi-com.brum.beds.ac.uk/2079-9292/10/11/1357/html
Back to TopTop