Next Article in Journal
A Distributed Architecture for Smart Recycling Using Machine Learning
Next Article in Special Issue
Vulnerabilities to Online Social Network Identity Deception Detection Research and Recommendations for Mitigation
Previous Article in Journal
From Color-Avoiding to Color-Favored Percolation in Diluted Lattices
Previous Article in Special Issue
DeepDiver: Diving into Abysmal Depth of the Binary for Hunting Deeply Hidden Software Vulnerabilities
 
 
Article

Article Versions Notes

Future Internet 2020, 12(9), 140; https://doi.org/10.3390/fi12090140
Action Date Notes Link
article pdf uploaded. 20 August 2020 17:34 CEST Version of Record https://www.mdpi.com/1999-5903/12/9/140/pdf-vor
article pdf uploaded. 20 August 2020 17:34 CEST Updated version of record https://www.mdpi.com/1999-5903/12/9/140/pdf-vor
article xml file uploaded 21 August 2020 10:44 CEST Original file -
article xml uploaded. 21 August 2020 10:44 CEST Update https://www.mdpi.com/1999-5903/12/9/140/xml
article pdf uploaded. 21 August 2020 10:44 CEST Updated version of record https://www.mdpi.com/1999-5903/12/9/140/pdf
article html file updated 21 August 2020 10:45 CEST Original file -
article html file updated 9 October 2020 19:30 CEST Update -
article html file updated 22 July 2022 04:16 CEST Update https://www.mdpi.com/1999-5903/12/9/140/html
Back to TopTop