Next Article in Journal / Special Issue
Network Forensics Method Based on Evidence Graph and Vulnerability Reasoning
Previous Article in Journal
ODK Scan: Digitizing Data Collection and Impacting Data Management Processes in Pakistan’s Tuberculosis Control Program
Previous Article in Special Issue
Cyber Conflicts as a New Global Threat
 
 
Article

Article Versions Notes

Future Internet 2016, 8(4), 52; https://doi.org/10.3390/fi8040052
Action Date Notes Link
article pdf uploaded. 25 October 2016 13:14 CEST Version of Record https://www.mdpi.com/1999-5903/8/4/52/pdf
article xml uploaded. 25 October 2016 13:14 CEST Original file https://www.mdpi.com/1999-5903/8/4/52/xml
article html file updated 25 October 2016 13:15 CEST Original file -
article html file updated 5 May 2019 00:29 CEST Update -
article html file updated 7 February 2020 16:58 CET Update -
article html file updated 16 July 2022 03:40 CEST Update https://www.mdpi.com/1999-5903/8/4/52/html
Back to TopTop