Next Article in Journal
Extending WSN Lifetime via Optimized Mobile Sink Trajectories: Linear Programming and Cuckoo Search Approaches with Overhearing-Aware Energy Models
Next Article in Special Issue
A Comprehensive Review of Cybersecurity Threats to Wireless Infocommunications in the Quantum-Age Cryptography
Previous Article in Journal
An Extension of Input Setup Assistance Service Using Generative AI to Unlearned Sensors for the SEMAR IoT Application Server Platform
Previous Article in Special Issue
Radio Frequency Fingerprinting Authentication for IoT Networks Using Siamese Networks
 
 
Article

Article Versions Notes

Action Date Notes Link
article pdf uploaded. 8 September 2025 16:17 CEST Version of Record https://www.mdpi.com/2624-831X/6/3/53/pdf-vor
article xml file uploaded 9 September 2025 08:21 CEST Original file -
article xml uploaded. 9 September 2025 08:21 CEST Update https://www.mdpi.com/2624-831X/6/3/53/xml
article pdf uploaded. 9 September 2025 08:22 CEST Updated version of record https://www.mdpi.com/2624-831X/6/3/53/pdf
article html file updated 9 September 2025 08:23 CEST Original file https://www.mdpi.com/2624-831X/6/3/53/html
Back to TopTop