Next Article in Journal
myDIG: Personalized Illicit Domain-Specific Knowledge Discovery with No Programming
Next Article in Special Issue
Cyber Security Threat Modeling for Supply Chain Organizational Environments
Previous Article in Journal / Special Issue
Worldwide Connectivity for the Internet of Things Through LoRaWAN
Open AccessArticle

Article Versions Notes

Future Internet 2019, 11(3), 58; https://doi.org/10.3390/fi11030058
Action Date Notes Link
article xml file uploaded 2 March 2019 12:34 CET Update https://www.mdpi.com/1999-5903/11/3/58/xml
article pdf uploaded. 2 March 2019 12:34 CET Updated version of record https://www.mdpi.com/1999-5903/11/3/58/pdf
article pdf uploaded. 5 March 2019 13:54 CET Updated version of record https://www.mdpi.com/1999-5903/11/3/58/pdf
article xml file uploaded 7 March 2019 11:44 CET Update https://www.mdpi.com/1999-5903/11/3/58/xml
article xml uploaded. 7 March 2019 11:44 CET Update https://www.mdpi.com/1999-5903/11/3/58/xml
article pdf uploaded. 7 March 2019 11:44 CET Updated version of record https://www.mdpi.com/1999-5903/11/3/58/pdf
article html file updated 7 March 2019 11:45 CET Update https://www.mdpi.com/1999-5903/11/3/58/html
article html file updated 2 April 2019 09:12 CEST Update https://www.mdpi.com/1999-5903/11/3/58/html
article html file updated 4 April 2019 06:23 CEST Update https://www.mdpi.com/1999-5903/11/3/58/html
article html file updated 12 April 2019 04:24 CEST Update https://www.mdpi.com/1999-5903/11/3/58/html
article html file updated 26 April 2019 08:49 CEST Update https://www.mdpi.com/1999-5903/11/3/58/html
article html file updated 15 October 2019 22:52 CEST Update https://www.mdpi.com/1999-5903/11/3/58/html
Back to TopTop