Next Article in Journal
Classification of Hacker’s Posts Based on Zero-Shot, Few-Shot, and Fine-Tuned LLMs in Environments with Constrained Resources
Previous Article in Journal
Securing Blockchain Systems: A Layer-Oriented Survey of Threats, Vulnerability Taxonomy, and Detection Methods
 
 
Article

Article Versions Notes

Future Internet 2025, 17(5), 206; https://doi.org/10.3390/fi17050206
Action Date Notes Link
article pdf uploaded. 4 May 2025 11:29 CEST Version of Record https://www.mdpi.com/1999-5903/17/5/206/pdf-vor
article xml file uploaded 6 May 2025 13:16 CEST Original file -
article xml uploaded. 6 May 2025 13:16 CEST Update https://www.mdpi.com/1999-5903/17/5/206/xml
article pdf uploaded. 6 May 2025 13:16 CEST Updated version of record https://www.mdpi.com/1999-5903/17/5/206/pdf
article html file updated 6 May 2025 13:18 CEST Original file https://www.mdpi.com/1999-5903/17/5/206/html
Back to TopTop