Next Article in Journal
A Network Intrusion Detection Method Incorporating Bayesian Attack Graph and Incremental Learning Part
Next Article in Special Issue
Survey of Distributed and Decentralized IoT Securities: Approaches Using Deep Learning and Blockchain Technology
Previous Article in Journal
A Highly Interactive Honeypot-Based Approach to Network Threat Management
Previous Article in Special Issue
Privacy-Preserving Object Detection with Secure Convolutional Neural Networks for Vehicular Edge Computing
 
 
Article

Article Versions Notes

Future Internet 2023, 15(4), 126; https://doi.org/10.3390/fi15040126
Action Date Notes Link
article xml file uploaded 28 March 2023 11:10 CEST Original file -
article xml uploaded. 28 March 2023 11:10 CEST Update https://www.mdpi.com/1999-5903/15/4/126/xml
article pdf uploaded. 28 March 2023 11:10 CEST Version of Record https://www.mdpi.com/1999-5903/15/4/126/pdf
article html file updated 28 March 2023 11:12 CEST Original file -
article html file updated 6 April 2023 23:08 CEST Update https://www.mdpi.com/1999-5903/15/4/126/html
Back to TopTop