Next Article in Journal
Self-Healing in Cyber–Physical Systems Using Machine Learning: A Critical Analysis of Theories and Tools
Next Article in Special Issue
Automotive Cybersecurity Application Based on CARDIAN
Previous Article in Journal
Optimization of the Decision Criterion for Increasing the Bandwidth Utilization by Means of the Novel Effective DBA Algorithm in NG-PON2 Networks
Previous Article in Special Issue
HH-NIDS: Heterogeneous Hardware-Based Network Intrusion Detection Framework for IoT Security
 
 
Article

Article Versions Notes

Future Internet 2023, 15(7), 243; https://doi.org/10.3390/fi15070243
Action Date Notes Link
article pdf uploaded. 16 July 2023 14:40 CEST Version of Record https://www.mdpi.com/1999-5903/15/7/243/pdf-vor
article pdf uploaded. 16 July 2023 15:05 CEST Updated version of record https://www.mdpi.com/1999-5903/15/7/243/pdf-vor
article pdf uploaded. 16 July 2023 15:06 CEST Updated version of record https://www.mdpi.com/1999-5903/15/7/243/pdf-vor
article xml file uploaded 17 July 2023 05:37 CEST Original file -
article xml uploaded. 17 July 2023 05:37 CEST Update -
article pdf uploaded. 17 July 2023 05:37 CEST Updated version of record https://www.mdpi.com/1999-5903/15/7/243/pdf-vor
article html file updated 17 July 2023 05:39 CEST Original file -
article xml file uploaded 20 July 2023 08:59 CEST Update -
article xml uploaded. 20 July 2023 08:59 CEST Update https://www.mdpi.com/1999-5903/15/7/243/xml
article pdf uploaded. 20 July 2023 08:59 CEST Updated version of record https://www.mdpi.com/1999-5903/15/7/243/pdf
article html file updated 20 July 2023 09:00 CEST Update -
article html file updated 5 August 2023 20:16 CEST Update https://www.mdpi.com/1999-5903/15/7/243/html
Back to TopTop