Next Article in Journal
Cell-Sequence-Based Covert Signal for Tor De-Anonymization Attacks
Previous Article in Journal
UAV Deployment Design Under Incomplete Information with a Connectivity Constraint for UAV-Assisted Networks
 
 
Article

Article Versions Notes

Future Internet 2025, 17(9), 402; https://doi.org/10.3390/fi17090402
Action Date Notes Link
article xml file uploaded 2 September 2025 16:48 CEST Original file -
article xml uploaded. 2 September 2025 16:48 CEST Update -
article pdf uploaded. 2 September 2025 16:48 CEST Version of Record https://www.mdpi.com/1999-5903/17/9/402/pdf-vor
article html file updated 2 September 2025 16:49 CEST Original file -
article xml file uploaded 3 September 2025 11:07 CEST Update -
article xml uploaded. 3 September 2025 11:07 CEST Update https://www.mdpi.com/1999-5903/17/9/402/xml
article pdf uploaded. 3 September 2025 11:07 CEST Updated version of record https://www.mdpi.com/1999-5903/17/9/402/pdf
article html file updated 3 September 2025 11:09 CEST Update https://www.mdpi.com/1999-5903/17/9/402/html
Back to TopTop