Next Article in Journal
A Method to Optimize Deployment of Directional Sensors for Coverage Enhancement in the Sensing Layer of IoT
Next Article in Special Issue
A Robust Machine Learning Model for Detecting XSS Attacks on IoT over 5G Networks
Previous Article in Journal
Wireless and Fiber-Based Post-Quantum-Cryptography-Secured IPsec Tunnel
Previous Article in Special Issue
Performance Evaluation of Lightweight Stream Ciphers for Real-Time Video Feed Encryption on ARM Processor
 
 
Article

Article Versions Notes

Future Internet 2024, 16(8), 301; https://doi.org/10.3390/fi16080301
Action Date Notes Link
article xml file uploaded 21 August 2024 11:21 CEST Original file -
article xml uploaded. 21 August 2024 11:21 CEST Update -
article pdf uploaded. 21 August 2024 11:21 CEST Version of Record https://www.mdpi.com/1999-5903/16/8/301/pdf-vor
article html file updated 21 August 2024 11:23 CEST Original file -
article xml file uploaded 22 August 2024 10:56 CEST Update -
article xml uploaded. 22 August 2024 10:56 CEST Update -
article pdf uploaded. 22 August 2024 10:57 CEST Updated version of record https://www.mdpi.com/1999-5903/16/8/301/pdf-vor
article html file updated 22 August 2024 10:59 CEST Update -
Correction published 21 October 2024 00:00 CEST Correction https://www.mdpi.com/1999-5903/16/10/383
article pdf uploaded. 21 October 2024 11:09 CEST Updated version of record https://www.mdpi.com/1999-5903/16/8/301/pdf
article xml uploaded. 21 October 2024 11:09 CEST Update -
article xml uploaded. 21 October 2024 11:09 CEST Update https://www.mdpi.com/1999-5903/16/8/301/xml
article html file updated 21 October 2024 11:13 CEST Update https://www.mdpi.com/1999-5903/16/8/301/html
Back to TopTop