Blockchain Mirage or Silver Bullet? A Requirements-driven Comparative Analysis of Business and Developers’ Perceptions in the Accountancy DomainUniversal Identity and Access Management Framework for Future EcosystemsDynamic Mobile Malware Detection through System Call-based Image representationDetecting Network Covert Channels using Machine Learning, Data Mining and Hierarchical Organisation of Frequent SetsMachine Learning Based Approach to Anomaly and Cyberattack Detection in Streamed Network Traffic DataGuest Editorial: Special Issue on the ARES-Workshops 2020AgriLoRa: A Digital Twin Framework for Smart AgricultureResearch on Note-Taking Apps with Security FeaturesDetection and Classification of Radio Frequency Jamming Attacks using Machine learningTowards Detecting and Classifying Malicious URLs Using Deep Learning