Guest Editorial: Special Issue on the ARES-Workshops 2020
Machine Learning Based Approach to Anomaly and Cyberattack Detection in Streamed Network Traffic Data
Detecting Network Covert Channels using Machine Learning, Data Mining and Hierarchical Organisation of Frequent Sets
Dynamic Mobile Malware Detection through System Call-based Image representation
Universal Identity and Access Management Framework for Future Ecosystems
Blockchain Mirage or Silver Bullet? A Requirements-driven Comparative Analysis of Business and Developers’ Perceptions in the Accountancy Domain
Conflict Identification and Resolution for Trust-Related Requirements Elicitation A Goal Modeling Approach