Next Article in Journal
Vulnerability Detection and Classification of Ethereum Smart Contracts Using Deep Learning
Next Article in Special Issue
A Comparative Survey of Centralised and Decentralised Identity Management Systems: Analysing Scalability, Security, and Feasibility
Previous Article in Journal
Workflow Trace Profiling and Execution Time Analysis in Quantitative Verification
Previous Article in Special Issue
Optimal Weighted Voting-Based Collaborated Malware Detection for Zero-Day Malware: A Case Study on VirusTotal and MalwareBazaar
 
 
Article

Article Versions Notes

Future Internet 2024, 16(9), 320; https://doi.org/10.3390/fi16090320
Action Date Notes Link
article xml file uploaded 4 September 2024 12:48 CEST Original file -
article xml uploaded. 4 September 2024 12:48 CEST Update https://www.mdpi.com/1999-5903/16/9/320/xml
article pdf uploaded. 4 September 2024 12:48 CEST Version of Record https://www.mdpi.com/1999-5903/16/9/320/pdf
article html file updated 4 September 2024 12:49 CEST Original file https://www.mdpi.com/1999-5903/16/9/320/html
Back to TopTop