Next Article in Journal
Towards a Hybrid Security Framework for Phishing Awareness Education and Defense
Previous Article in Journal
Security Threats and Promising Solutions Arising from the Intersection of AI and IoT: A Study of IoMT and IoET Applications
 
 
Review

Article Versions Notes

Future Internet 2024, 16(3), 84; https://doi.org/10.3390/fi16030084
Action Date Notes Link
article pdf uploaded. 29 February 2024 16:01 CET Version of Record https://www.mdpi.com/1999-5903/16/3/84/pdf-vor
article pdf uploaded. 29 February 2024 16:06 CET Updated version of record https://www.mdpi.com/1999-5903/16/3/84/pdf-vor
article pdf uploaded. 29 February 2024 16:27 CET Updated version of record https://www.mdpi.com/1999-5903/16/3/84/pdf-vor
article xml file uploaded 4 March 2024 02:20 CET Original file -
article xml uploaded. 4 March 2024 02:20 CET Update -
article pdf uploaded. 4 March 2024 02:20 CET Updated version of record https://www.mdpi.com/1999-5903/16/3/84/pdf-vor
article html file updated 4 March 2024 02:22 CET Original file -
article xml file uploaded 4 March 2024 11:37 CET Update -
article xml uploaded. 4 March 2024 11:37 CET Update -
article pdf uploaded. 4 March 2024 11:37 CET Updated version of record https://www.mdpi.com/1999-5903/16/3/84/pdf-vor
article html file updated 4 March 2024 11:39 CET Update -
article xml file uploaded 13 March 2024 10:38 CET Update -
article xml uploaded. 13 March 2024 10:38 CET Update https://www.mdpi.com/1999-5903/16/3/84/xml
article pdf uploaded. 13 March 2024 10:38 CET Updated version of record https://www.mdpi.com/1999-5903/16/3/84/pdf
article html file updated 13 March 2024 10:39 CET Update https://www.mdpi.com/1999-5903/16/3/84/html
Back to TopTop