Next Article in Journal
Tracing CVE Vulnerability Information to CAPEC Attack Patterns Using Natural Language Processing Techniques
Next Article in Special Issue
Data Security Protocol with Blind Factor in Cloud Environment
Previous Article in Journal
A Hybrid Knowledge-Based Recommender for Product-Service Systems Mass Customization
Previous Article in Special Issue
Formalizing the Blockchain-Based BlockVoke Protocol for Fast Certificate Revocation Using Colored Petri Nets
 
 
Article

Article Versions Notes

Information 2021, 12(8), 297; https://doi.org/10.3390/info12080297
Action Date Notes Link
article pdf uploaded. 26 July 2021 12:46 CEST Version of Record https://www.mdpi.com/2078-2489/12/8/297/pdf-vor
article xml file uploaded 5 August 2021 08:47 CEST Original file -
article xml uploaded. 5 August 2021 08:47 CEST Update https://www.mdpi.com/2078-2489/12/8/297/xml
article pdf uploaded. 5 August 2021 08:47 CEST Updated version of record https://www.mdpi.com/2078-2489/12/8/297/pdf
article html file updated 5 August 2021 08:49 CEST Original file -
article html file updated 27 July 2022 06:32 CEST Update https://www.mdpi.com/2078-2489/12/8/297/html
Back to TopTop