Next Article in Journal
A Comparative Survey of Centralised and Decentralised Identity Management Systems: Analysing Scalability, Security, and Feasibility
Next Article in Special Issue
Shared-Custodial Wallet for Multi-Party Crypto-Asset Management
Previous Article in Journal
Advanced Hybrid Transformer-CNN Deep Learning Model for Effective Intrusion Detection Systems with Class Imbalance Mitigation Using Resampling Techniques
Previous Article in Special Issue
Beat the Heat: Syscall Attack Detection via Thermal Side Channel
 
 
Article

Article Versions Notes

Future Internet 2024, 16(12), 482; https://doi.org/10.3390/fi16120482
Action Date Notes Link
article xml file uploaded 23 December 2024 14:41 CET Original file -
article xml uploaded. 23 December 2024 14:41 CET Update https://www.mdpi.com/1999-5903/16/12/482/xml
article pdf uploaded. 23 December 2024 14:41 CET Version of Record https://www.mdpi.com/1999-5903/16/12/482/pdf
article html file updated 23 December 2024 14:44 CET Original file https://www.mdpi.com/1999-5903/16/12/482/html
Back to TopTop