Next Article in Journal
Phishing Attacks Survey: Types, Vectors, and Technical Approaches
Next Article in Special Issue
Portfolio Learning Based on Deep Learning
Previous Article in Journal
A Survey of Defensive Measures for Digital Persecution in the Global South
 
 
Article

Article Versions Notes

Future Internet 2020, 12(10), 167; https://0-doi-org.brum.beds.ac.uk/10.3390/fi12100167
Action Date Notes Link
article xml file uploaded 30 September 2020 08:00 CEST Original file -
article xml uploaded. 30 September 2020 08:00 CEST Update https://0-www-mdpi-com.brum.beds.ac.uk/1999-5903/12/10/167/xml
article pdf uploaded. 30 September 2020 08:00 CEST Version of Record https://0-www-mdpi-com.brum.beds.ac.uk/1999-5903/12/10/167/pdf
article supplementary file uploaded. 30 September 2020 08:00 CEST - https://0-www-mdpi-com.brum.beds.ac.uk/1999-5903/12/10/167#supplementary
article html file updated 30 September 2020 08:02 CEST Original file -
article html file updated 22 July 2022 09:09 CEST Update https://0-www-mdpi-com.brum.beds.ac.uk/1999-5903/12/10/167/html
Back to TopTop