Next Article in Journal
Fast Multi-User Searchable Encryption with Forward and Backward Private Access Control
Previous Article in Journal
Service-Aware Hierarchical Fog–Cloud Resource Mappingfor e-Health with Enhanced-Kernel SVM
Previous Article in Special Issue
Machine Learning-Based Detection for Unauthorized Access to IoT Devices
 
 
Editorial

Article Versions Notes

J. Sens. Actuator Netw. 2024, 13(1), 11; https://doi.org/10.3390/jsan13010011
Action Date Notes Link
article xml file uploaded 1 February 2024 04:52 CET Original file -
article xml uploaded. 1 February 2024 04:52 CET Update https://www.mdpi.com/2224-2708/13/1/11/xml
article pdf uploaded. 1 February 2024 04:52 CET Version of Record https://www.mdpi.com/2224-2708/13/1/11/pdf
article html file updated 1 February 2024 04:53 CET Original file https://www.mdpi.com/2224-2708/13/1/11/html
Back to TopTop