<html><head></head><body><div class="yahoo-style-wrap" style="font-family:Helvetica Neue, Helvetica, Arial, sans-serif;font-size:13px;"><div dir="ltr" data-setdir="false"><div><div>*** Apologies if you received multiple emails for this call</div><div><br></div><div>Call for Papers</div><div><br></div><div><br></div><div>The 3rd International Workshop on Data-Driven Security (DDSW 2022)</div><div>Porto, Portugal, March 22-25, 2022</div><div><br></div><div>In Conjunction with THE 5TH INTERNATIONAL CONFERENCE ON EMERGING DATA AND INDUSTRY 4.0 (EDI40)</div><div><br></div><div><br></div><div><br></div><div>Conference website<span style="white-space: pre-wrap;"> </span>https://www.ajman.ac.ae/en/ddsw</div><div><br></div><div>Submission link<span style="white-space: pre-wrap;"> </span>https://easychair.org/conferences/?conf=ddsw2022</div><div><br></div><div>Submission deadline<span style="white-space: pre-wrap;"> </span>December 20, 2021</div><div><br></div><div>Data breaches are a daily occurrence, where adversaries attack consumers, corporations, and governments. Moreover, data breaches are growing tremendously due to the immense growth of the backbones of commerce and critical infrastructure, and interconnectivity of networks. The skills of adversaries are improving, and the number and severity of attacks are increasing, which make known security countermeasures suffer. While much research focuses on technical, business or compliance aspects, there is an increasing need for new security solutions to protect assists other than traditional approaches. This workshop focuses on new security techniques that use machine learning, data mining and statistics analytical techniques to solve nowadays security challenges. The workshop will focus on, but is not limited to, the following areas:</div><div><br></div><div>Machine Learning for Security</div><div>Malware Analysis</div><div>Adversarial Machine learning</div><div>Statistics for Security</div><div>Analysis of identified vulnerabilities</div><div>Analysis of successful attacks or attack attempts</div><div>Diverse aspects of security analytics</div><div>Tools for security analytics</div><div>Security analytics data</div><div><br></div><div>Submission Guidelines</div><div>Original, unpublished papers are solicited for presentation at the DDSW workshop. Prospective authors are invited to submit papers (electronically, PDF only) that are no longer than 6 pages for full papers, including all figures and references. The submitted paper must be formatted according to the guidelines of Procedia Computer Science, MS Word Template, Latex, Template Generic, Elsevier.</div><div><br></div><div>All questions about submissions should be emailed to q.yaseen@ajman.ac.ae</div><div><br></div></div><br></div></div></body></html>