Next Article in Journal
Cyber Security Threat Modeling for Supply Chain Organizational Environments
Previous Article in Journal
A Dual Attack Detection Technique to Identify Black and Gray Hole Attacks Using an Intrusion Detection System and a Connected Dominating Set in MANETs
 
 
Article

Article Versions Notes

Future Internet 2019, 11(3), 62; https://doi.org/10.3390/fi11030062
Action Date Notes Link
article xml file uploaded 5 March 2019 10:43 CET Original file -
article xml uploaded. 5 March 2019 10:43 CET Update https://www.mdpi.com/1999-5903/11/3/62/xml
article pdf uploaded. 5 March 2019 10:43 CET Version of Record https://www.mdpi.com/1999-5903/11/3/62/pdf
article html file updated 5 March 2019 10:45 CET Original file -
article html file updated 2 April 2019 09:15 CEST Update -
article html file updated 4 April 2019 07:26 CEST Update -
article html file updated 12 April 2019 03:21 CEST Update -
article html file updated 26 April 2019 07:50 CEST Update -
article html file updated 16 October 2019 01:33 CEST Update -
article html file updated 11 February 2020 20:05 CET Update -
article html file updated 19 July 2022 15:55 CEST Update https://www.mdpi.com/1999-5903/11/3/62/html
Back to TopTop