Next Article in Journal
Password Managers—It’s All about Trust and Transparency
Previous Article in Journal
A Comparative Analysis of Machine Learning Techniques for Cyberbullying Detection on Twitter
Previous Article in Special Issue
Software Defined Networking Flow Table Management of OpenFlow Switches Performance and Security Challenges: A Survey
 
 
Article

Article Versions Notes

Future Internet 2020, 12(11), 188; https://doi.org/10.3390/fi12110188
Action Date Notes Link
article pdf uploaded. 29 October 2020 17:04 CET Version of Record https://www.mdpi.com/1999-5903/12/11/188/pdf-vor
article xml file uploaded 3 November 2020 10:39 CET Original file -
article xml uploaded. 3 November 2020 10:39 CET Update -
article pdf uploaded. 3 November 2020 10:39 CET Updated version of record https://www.mdpi.com/1999-5903/12/11/188/pdf-vor
article html file updated 3 November 2020 10:41 CET Original file -
article xml file uploaded 6 November 2020 09:39 CET Update -
article xml uploaded. 6 November 2020 09:39 CET Update https://www.mdpi.com/1999-5903/12/11/188/xml
article pdf uploaded. 6 November 2020 09:39 CET Updated version of record https://www.mdpi.com/1999-5903/12/11/188/pdf
article html file updated 6 November 2020 09:41 CET Update -
article html file updated 4 December 2020 11:20 CET Update -
article html file updated 22 July 2022 23:07 CEST Update https://www.mdpi.com/1999-5903/12/11/188/html
Back to TopTop