Next Article in Journal
Introducing External Knowledge to Answer Questions with Implicit Temporal Constraints over Knowledge Base
Next Article in Special Issue
Smart Devices Security Enhancement via Power Supply Monitoring
Previous Article in Journal
BASN—Learning Steganography with a Binary Attention Mechanism
Previous Article in Special Issue
Collaborative Blockchain-Based Detection of Distributed Denial of Service Attacks Based on Internet of Things Botnets
 
 
Article

Article Versions Notes

Future Internet 2020, 12(3), 44; https://doi.org/10.3390/fi12030044
Action Date Notes Link
article xml file uploaded 2 March 2020 12:16 CET Original file -
article xml uploaded. 2 March 2020 12:16 CET Update https://www.mdpi.com/1999-5903/12/3/44/xml
article pdf uploaded. 2 March 2020 12:16 CET Version of Record https://www.mdpi.com/1999-5903/12/3/44/pdf
article html file updated 2 March 2020 12:17 CET Original file -
article html file updated 1 April 2020 20:53 CEST Update -
article html file updated 20 July 2022 21:42 CEST Update https://www.mdpi.com/1999-5903/12/3/44/html
Back to TopTop