Next Article in Journal
A DNN Architecture Generation Method for DDoS Detection via Genetic Alogrithm
Next Article in Special Issue
Addressing ZSM Security Issues with Blockchain Technology
Previous Article in Journal
A Replica-Selection Algorithm Based on Transmission Completion Time Estimation in ICN
Previous Article in Special Issue
Data Is the New Oil–Sort of: A View on Why This Comparison Is Misleading and Its Implications for Modern Data Administration
 
 
Article

Article Versions Notes

Future Internet 2023, 15(4), 121; https://doi.org/10.3390/fi15040121
Action Date Notes Link
article pdf uploaded. 25 March 2023 10:19 CET Version of Record https://www.mdpi.com/1999-5903/15/4/121/pdf-vor
article pdf uploaded. 25 March 2023 11:18 CET Updated version of record https://www.mdpi.com/1999-5903/15/4/121/pdf-vor
article xml uploaded. 27 March 2023 05:52 CEST Original file -
article pdf uploaded. 27 March 2023 05:52 CEST Updated version of record https://www.mdpi.com/1999-5903/15/4/121/pdf-vor
article html file updated 27 March 2023 05:54 CEST Original file -
article xml uploaded. 4 April 2023 04:00 CEST Update https://www.mdpi.com/1999-5903/15/4/121/xml
article pdf uploaded. 4 April 2023 04:00 CEST Updated version of record https://www.mdpi.com/1999-5903/15/4/121/pdf
article html file updated 4 April 2023 04:02 CEST Update -
article html file updated 6 April 2023 22:32 CEST Update https://www.mdpi.com/1999-5903/15/4/121/html
Back to TopTop