<html><head></head><body><div class="yahoo-style-wrap" style="font-family:Helvetica Neue, Helvetica, Arial, sans-serif;font-size:13px;"><div dir="ltr" data-setdir="false"><div><div style="text-align: center; "><b><font size="3">Call for Paper</font></b></div><div style="text-align: center;"><b><font size="3"><br></font></b></div><div style="text-align: center; "><b><font size="3">The 2nd International Workshop on Data-Driven Security (DDSW 2021)</font></b></div><div style="text-align: center;"><b><font size="3"><br></font></b></div><div style="text-align: center;"><b><font size="3">In conjunction with</font></b></div><div style="text-align: center;"><b><font size="3"><br></font></b></div><div style="text-align: center;"><b><font size="3">The 4th International Conference on Emerging Data and Industry 4.0 (EDI40)</font></b></div><div style="text-align: center;"><b><font size="3"><br></font></b></div><div style="text-align: center;"><b><font size="3">March 23 - 26, 2021, Warsaw, Poland</font></b></div><div style="text-align: center;"><b><font size="3"><br></font></b></div><div style="text-align: center;"><b><font size="3"> </font></b></div><div style="text-align: center;"><b><font size="3"><br></font></b></div><div style="text-align: center; " dir="" data-setdir="true"><b><font size="3"> https://www.just.edu.jo/~qmyaseen/ddsw2021/ddsw2021.html</font></b></div><div><br></div><div> </div><div><br></div><div>Data breaches are a daily occurrence, where adversaries attack consumers, corporations, and governments. Moreover, data breaches are growing tremendously due to the immense growth of the backbones of commerce and critical infrastructure, and interconnectivity of networks.</div><div><br></div><div>The skills of adversaries are improving, and the number and severity of attacks are increasing, which make known security countermeasures suffer. While much research focuses on technical, business or compliance aspects, there is an increasing need for new security solutions to protect assists other than traditional approaches. </div><div><br></div><div>This workshop focuses on new security techniques that use machine learning, data mining and statistics analytical techniques to solve nowadays security challenges. The workshop will focus on, but is not limited to, the following areas:</div><div><br></div><div><br></div><div>Machine Learning for Security</div><div>Malware Analysis</div><div>Adversarial Machine learning</div><div>Statistics for Security</div><div>Analysis of identified vulnerabilities</div><div>Analysis of successful attacks or attack attempts</div><div>Diverse aspects of security analytics</div><div>Tools for security analytics</div><div>Security analytics data</div><div><br></div><div><br></div><div><b><font color="#9d1811">Submission of Papers</font></b></div><div><br></div><div>Original, unpublished papers are solicited for presentation at the DDSW workshop. Prospective authors are invited to submit papers (electronically, PDF only) that are no longer than 6 pages for full papers, including all figures and references, and must be formatted according to the conference guidelines found at: http://cs-conferences.acadiau.ca/EDI40-21/#paperSubmissions.</div><div><br></div><div>Please use the link https://easychair.org/my/conference?conf=ddsw2021 to submit your paper.</div><div><br></div><div><font color="#cd232c"><b>Important Dates</b></font></div><div><br></div><div>Submission Deadline: January 15,2021(11:59pm anywhere in the world)</div><div>Notification: February 1, 2021</div><div>Camera Ready: February 8, 2021</div><div><br></div><div>***Please send any inquiry on DDSW2021 to: qmyaseen@just.edu.jo</div></div><br></div></div></body></html>