Next Article in Journal
Quantum Key Distribution for 5G Networks: A Review, State of Art and Future Directions
Next Article in Special Issue
Securing the Smart City Airspace: Drone Cyber Attack Detection through Machine Learning
Previous Article in Journal
Design of Relay Switching to Combat an Eavesdropper in IoT-NOMA Wireless Networks
Previous Article in Special Issue
The Framework of Cross-Domain and Model Adversarial Attack against Deepfake
 
 
Article

Article Versions Notes

Future Internet 2022, 14(3), 72; https://doi.org/10.3390/fi14030072
Action Date Notes Link
article xml file uploaded 25 February 2022 07:56 CET Original file -
article xml uploaded. 25 February 2022 07:56 CET Update https://www.mdpi.com/1999-5903/14/3/72/xml
article pdf uploaded. 25 February 2022 07:56 CET Version of Record https://www.mdpi.com/1999-5903/14/3/72/pdf
article html file updated 25 February 2022 07:58 CET Original file -
article html file updated 1 August 2022 02:40 CEST Update https://www.mdpi.com/1999-5903/14/3/72/html
Back to TopTop