Next Article in Journal
A Dual Attack Detection Technique to Identify Black and Gray Hole Attacks Using an Intrusion Detection System and a Connected Dominating Set in MANETs
Previous Article in Journal
myDIG: Personalized Illicit Domain-Specific Knowledge Discovery with No Programming
 
 
Article

Article Versions Notes

Future Internet 2019, 11(3), 60; https://doi.org/10.3390/fi11030060
Action Date Notes Link
article html file updated 30 August 2025 12:36 CEST Update https://www.mdpi.com/1999-5903/11/3/60/html
article html file updated 19 July 2022 15:52 CEST Update -
article html file updated 11 February 2020 19:50 CET Update -
article html file updated 16 October 2019 00:00 CEST Update -
article html file updated 26 April 2019 08:24 CEST Update -
article html file updated 12 April 2019 03:58 CEST Update -
article html file updated 4 April 2019 06:49 CEST Update -
article html file updated 2 April 2019 09:14 CEST Update -
article html file updated 4 March 2019 10:07 CET Original file -
article pdf uploaded. 4 March 2019 10:06 CET Version of Record https://www.mdpi.com/1999-5903/11/3/60/pdf
article xml uploaded. 4 March 2019 10:06 CET Update https://www.mdpi.com/1999-5903/11/3/60/xml
article xml file uploaded 4 March 2019 10:06 CET Original file -
Back to TopTop