Next Article in Journal
Question–Answer Methodology for Vulnerable Source Code Review via Prototype-Based Model-Agnostic Meta-Learning
Next Article in Special Issue
Edge Intelligence: Edge Computing for 5G and the Internet of Things
Previous Article in Journal
Exploiting Blockchain Technology for Enhancing Digital Twins’ Security and Transparency
Previous Article in Special Issue
On Edge-Fog-Cloud Collaboration and Reaping Its Benefits: A Heterogeneous Multi-Tier Edge Computing Architecture
 
 
Article

Article Versions Notes

Future Internet 2025, 17(1), 32; https://doi.org/10.3390/fi17010032
Action Date Notes Link
article xml file uploaded 13 January 2025 15:05 CET Original file -
article xml uploaded. 13 January 2025 15:05 CET Update -
article pdf uploaded. 13 January 2025 15:05 CET Version of Record https://www.mdpi.com/1999-5903/17/1/32/pdf-vor
article html file updated 13 January 2025 15:07 CET Original file -
article xml file uploaded 14 January 2025 02:15 CET Update -
article xml uploaded. 14 January 2025 02:15 CET Update https://www.mdpi.com/1999-5903/17/1/32/xml
article pdf uploaded. 14 January 2025 02:15 CET Updated version of record https://www.mdpi.com/1999-5903/17/1/32/pdf
article html file updated 14 January 2025 02:16 CET Update https://www.mdpi.com/1999-5903/17/1/32/html
Back to TopTop