Next Article in Journal
Autonomous Navigation of a Solar-Powered UAV for Secure Communication in Urban Environments with Eavesdropping Avoidance
Previous Article in Journal
Phishing Attacks Survey: Types, Vectors, and Technical Approaches
 
 
Due to scheduled maintenance work on our database systems, there may be short service disruptions on this website between 10:00 and 11:00 CEST on June 14th.
Article

Article Versions Notes

Future Internet 2020, 12(10), 169; https://doi.org/10.3390/fi12100169
Action Date Notes Link
article xml file uploaded 3 October 2020 11:22 CEST Original file -
article xml uploaded. 3 October 2020 11:22 CEST Update -
article pdf uploaded. 3 October 2020 11:22 CEST Version of Record https://www.mdpi.com/1999-5903/12/10/169/pdf-vor
article html file updated 3 October 2020 11:23 CEST Original file -
article xml file uploaded 12 October 2020 08:42 CEST Update -
article xml uploaded. 12 October 2020 08:42 CEST Update https://www.mdpi.com/1999-5903/12/10/169/xml
article pdf uploaded. 12 October 2020 08:42 CEST Updated version of record https://www.mdpi.com/1999-5903/12/10/169/pdf
article html file updated 12 October 2020 08:43 CEST Update -
article html file updated 22 July 2022 09:34 CEST Update https://www.mdpi.com/1999-5903/12/10/169/html
Back to TopTop