Next Article in Journal
Data Collection in Areas without Infrastructure Using LoRa Technology and a Quadrotor
Previous Article in Journal
Exploiting Autoencoder-Based Anomaly Detection to Enhance Cybersecurity in Power Grids
Previous Article in Special Issue
Threshold Cryptography-Based Secure Vehicle-to-Everything (V2X) Communication in 5G-Enabled Intelligent Transportation Systems
 
 
Article

Article Versions Notes

Future Internet 2024, 16(6), 185; https://doi.org/10.3390/fi16060185
Action Date Notes Link
article pdf uploaded. 23 May 2024 17:12 CEST Version of Record https://www.mdpi.com/1999-5903/16/6/185/pdf-vor
article xml file uploaded 26 June 2024 03:06 CEST Original file -
article xml uploaded. 26 June 2024 03:06 CEST Update https://www.mdpi.com/1999-5903/16/6/185/xml
article pdf uploaded. 26 June 2024 03:06 CEST Updated version of record https://www.mdpi.com/1999-5903/16/6/185/pdf
article html file updated 26 June 2024 03:08 CEST Original file https://www.mdpi.com/1999-5903/16/6/185/html
Back to TopTop