Next Article in Journal
End-to-End Framework for Identifying Vulnerabilities of Operational Technology Protocols and Their Implementations in Industrial IoT
Next Article in Special Issue
Database Security and Performance: A Case of SQL Injection Attacks Using Docker-Based Virtualisation and Its Effect on Performance
Previous Article in Journal
Analysis and Evaluation of Intel Software Guard Extension-Based Trusted Execution Environment Usage in Edge Intelligence and Internet of Things Scenarios
Previous Article in Special Issue
Internet of Things and Distributed Computing Systems in Business Models
 
 
Article

Article Versions Notes

Future Internet 2025, 17(1), 33; https://doi.org/10.3390/fi17010033
Action Date Notes Link
article xml file uploaded 14 January 2025 12:33 CET Original file -
article xml uploaded. 14 January 2025 12:33 CET Update -
article pdf uploaded. 14 January 2025 12:33 CET Version of Record -
article html file updated 14 January 2025 12:35 CET Original file -
article xml file uploaded 16 January 2025 11:08 CET Update -
article xml uploaded. 16 January 2025 11:08 CET Update -
article pdf uploaded. 16 January 2025 11:08 CET Updated version of record -
article html file updated 16 January 2025 11:10 CET Update -
article xml file uploaded 16 January 2025 11:11 CET Update -
article xml uploaded. 16 January 2025 11:11 CET Update https://www.mdpi.com/1999-5903/17/1/33/xml
article pdf uploaded. 16 January 2025 11:11 CET Updated version of record https://www.mdpi.com/1999-5903/17/1/33/pdf
article html file updated 16 January 2025 11:14 CET Update https://www.mdpi.com/1999-5903/17/1/33/html
Back to TopTop