Next Article in Journal
An Intrusion Detection System for 5G SDN Network Utilizing Binarized Deep Spiking Capsule Fire Hawk Neural Networks and Blockchain Technology
Previous Article in Journal
A Secure Key Exchange and Authentication Scheme for Securing Communications in the Internet of Things Environment
 
 
Article

Article Versions Notes

Future Internet 2024, 16(10), 358; https://doi.org/10.3390/fi16100358
Action Date Notes Link
article pdf uploaded. 1 October 2024 16:44 CEST Version of Record https://www.mdpi.com/1999-5903/16/10/358/pdf-vor
article xml file uploaded 6 October 2024 11:32 CEST Original file -
article xml uploaded. 6 October 2024 11:32 CEST Update -
article pdf uploaded. 6 October 2024 11:32 CEST Updated version of record https://www.mdpi.com/1999-5903/16/10/358/pdf-vor
article html file updated 6 October 2024 11:36 CEST Original file -
article xml file uploaded 9 October 2024 04:46 CEST Update -
article xml uploaded. 9 October 2024 04:46 CEST Update https://www.mdpi.com/1999-5903/16/10/358/xml
article pdf uploaded. 9 October 2024 04:46 CEST Updated version of record https://www.mdpi.com/1999-5903/16/10/358/pdf
article html file updated 9 October 2024 04:48 CEST Update https://www.mdpi.com/1999-5903/16/10/358/html
Back to TopTop