Next Article in Journal
HP-LSTM: Hawkes Process–LSTM-Based Detection of DDoS Attack for In-Vehicle Network
Next Article in Special Issue
Watch the Skies: A Study on Drone Attack Vectors, Forensic Approaches, and Persisting Security Challenges
Previous Article in Journal
Cross-Layer Optimization for Enhanced IoT Connectivity: A Novel Routing Protocol for Opportunistic Networks
Previous Article in Special Issue
Realization of Authenticated One-Pass Key Establishment on RISC-V Micro-Controller for IoT Applications
 
 
Article

Article Versions Notes

Future Internet 2024, 16(6), 184; https://doi.org/10.3390/fi16060184
Action Date Notes Link
article pdf uploaded. 22 May 2024 16:42 CEST Version of Record https://www.mdpi.com/1999-5903/16/6/184/pdf-vor
article xml file uploaded 26 June 2024 06:17 CEST Original file -
article xml uploaded. 26 June 2024 06:17 CEST Update https://www.mdpi.com/1999-5903/16/6/184/xml
article pdf uploaded. 26 June 2024 06:17 CEST Updated version of record https://www.mdpi.com/1999-5903/16/6/184/pdf
article html file updated 26 June 2024 06:19 CEST Original file https://www.mdpi.com/1999-5903/16/6/184/html
Back to TopTop