Next Article in Journal
UAV Deployment Design Under Incomplete Information with a Connectivity Constraint for UAV-Assisted Networks
Next Article in Special Issue
Detection and Mitigation in IoT Ecosystems Using oneM2M Architecture and Edge-Based Machine Learning
Previous Article in Journal
IoT Security: Threat Detection, Analysis, and Defense
Previous Article in Special Issue
DDoS Defense Strategy Based on Blockchain and Unsupervised Learning Techniques in SDN
 
 
Article

Article Versions Notes

Future Internet 2025, 17(9), 400; https://doi.org/10.3390/fi17090400
Action Date Notes Link
article xml file uploaded 1 September 2025 14:23 CEST Original file -
article xml uploaded. 1 September 2025 14:23 CEST Update -
article pdf uploaded. 1 September 2025 14:23 CEST Version of Record https://www.mdpi.com/1999-5903/17/9/400/pdf-vor
article html file updated 1 September 2025 14:26 CEST Original file -
article xml file uploaded 2 September 2025 08:47 CEST Update -
article xml uploaded. 2 September 2025 08:47 CEST Update https://www.mdpi.com/1999-5903/17/9/400/xml
article pdf uploaded. 2 September 2025 08:47 CEST Updated version of record https://www.mdpi.com/1999-5903/17/9/400/pdf
article html file updated 2 September 2025 08:49 CEST Update https://www.mdpi.com/1999-5903/17/9/400/html
Back to TopTop