The Third International Symposium on Machine Learning and Big Data Analytics For Cybersecurity and Privacy

IN CONJUNCTION WITH The 12th International Conference on Ambient Systems, Networks and Technologies (ANT-2021)
the Fourth International Conference on Emerging Data and Industry 4.0 (EDI40-21)

March 23 - 26, 2021, Warsaw, Poland

Download the CFP About The Event


As cyber-attacks against critical infrastructure increase and evolve, automated systems to complement human analysis are needed. Moreover, chasing the breaches is like looking for a needle in a haystack. Such organizations are so large, with so much information and data to sort through to obtain actionable information that it seems impossible to know where to start. The analysis of the intelligence of an attack is traditionally an iterative, mainly manual process, which involves an unlimited amount of data to try to determine the sophisticated patterns and behaviours of intruders. In addition, most of the detected intrusions provide a limited set of attributes on a single phase of an attack. Accurate and timely knowledge of all stages of an intrusion would allow us to support our cyber-detection and prevention capabilities, enhance our information on cyber-threats and facilitate the immediate sharing of information on threats, as we share several elements. The workshop is expected to address the above issues and will aim to present new research in the field of cyber threat hunting, information on cyber threats and analysis of important data.

Therefore, cyber-attacks protection of computer systems is one of the most important cybersecurity tasks for single users and businesses, since even a single attack can result in compromised data and sufficient losses. Massive losses and frequent attacks dictate the need for accurate and timely detection methods. Current static and dynamic methods do not provide efficient detection, especially when dealing with zero-day attacks. For this reason, Big Data Analytics and machine learning-based techniques can be used.

This workshop aims to bring together researchers in the field of cybersecurity and key data to advance the missions of anticipating, prohibiting, preventing, preparing and responding to internal security. We are soliciting submissions in areas related to knowledge extraction from key cybersecurity intelligence datasets, rapid analysis of security datasets to obtain relevant information and Machine learning techniques for cyber-attacks detection and prevention.

Workshop chairs

Speaker 1

Yassine Maleh

Sultan Moulay Slimane University, Beni Melal, Morocco

Speaker 2

Youssef Baddi

Chouaib Doukkali University El Jadida, Morocco

Speaker 3

Mamoun Alazab

Charles Darwin University, Darwin, Australia

Workshop topics

Here is our event topics

  • Big Data Analytics for cybersecurity
  • Real-time situational awareness
  • Artificial Intelligence Analytics Techniques
  • Machine Learning techniques for Cybersecurity and Privacy
  • Deep Learning techniques for Cybersecurity and Privacy
  • Malware detection and prevention techniques
  • Intrusion and cybersecurity threat detection and analysis
  • Cyber-physical-social system security and incident management
  • Mobile and cloud computing security
  • IoT cybersecurity and privacy
  • Big data analytics for cybersecurity
  • Big data analytics for digital forensics
  • Cybersecurity Applications
  • Anomaly/threat detection techniques
  • Malware detection and Prevention

Event Committees

Here is our event Committees and chairs

General Chairs

  • Yassine Maleh, Sultan Moulay Slimane University, Morocco
  • Youssef Baddi, Chouaib Doukkali University, Morocco
  • Mamoun Alazab, Charles Darwin University, Australia

General Co-Chairs

  • Mohammed Boulmalf, Université Internationale de Rabat, Morocco
  • Karim Zkik, Université Internationale de Rabat, Morocco
  • Mustapha Belaissaoui, University Hassan 1st, Morocco
  • Hossain Shahriar, Kennesaw State University, USA
  • Fanxin Kong, University of Pennsylvania, USA
  • Loai Tawalbeh, Texas A&M University-San Antonio, USA

Program Chairs

  • Mohamed Moughit, Sultan Moulay Slimane University, Morocco
  • Yassine Sadqi, Sultan Moulay Slimane University, Morocco
  • Khalid El Gholami, Sultan Moulay Slimane University, Morocco
  • Fatima Lakrami,UCD, Morocco
  • Faycal Bensaleh,UCD, Morocco

Students Committee

  • Sounni hind, Chouaib doukkali University, El Jadida, Morocco
  • Houali youssef, Chouaib doukkali University, El Jadida, Morocco
  • Fatima zahra Fagroud, Hassan II University- Casablanca,Morocco

Programe Committee

  • Edgar Weippl, , SBA Research, Austria
  • Patrick Siarry, , Universit de Paris 12, France
  • Aswani Kumar Cherukuri, , Vellore Institute of Technology, India
  • Xuping Huang, , Meiji University, Japan
  • Sang-Bing Tsai, , University of Electronic Science and Technology, China
  • K.P. Chow, , University of Hong Kong, Hong Kong
  • Ben Alla Said, , University Hassan 1st, Morocco
  • Alberto Cano, , Virginia Commonwealth University, USA
  • Tzung-Pei Hong, , National University of Kaohsiung, Taiwan
  • Yudi Prayudi, , Center for Digital Forensics Studies, Indonesia
  • Farrokh Aminifar, , Illinois Institute of Technology, USA
  • Wei Cai, , University of California, Irvine, USA
  • Antonio J. Jara, , University of Applied Sciences Western Switzerland, Switzerland
  • Rafigul Islam, , Charles Sturt University, Australia
  • Kevin Curran, , Ulster University, UK
  • Shareeful Islam, , University of East London, UK
  • Chang-Tsun Li, , University of Warwick, UK
  • Rajgopal Kannan, , Louisiana State University, Las Angeles, USA
  • Imed Romdhani, , Edinburgh Napier University, UK
  • Lo'ai A. Tawalbeh, , Umm Al-Qura University, Saudi Arabia
  • Nilesh Uke, , Pimpri Chinchwad College Of Engineering, India
  • Homero Toral Cruz, , Univeersity of Quintana Roo, México
  • Mohamed Amine Ferrag, , Guelma University, Algeria
  • Hossain Shahriar, , Kennesaw State University, USA
  • Fanxin Kong, , University of Pennsylvania, USA

Call for papers

Authors are requested to submit their papers electronically using the online conference management system in PDF format before the deadline. The submission processes will be managed by

All papers must be original and not simultaneously submitted to another journal or conference. The following paper categories are welcome:

  • The submitted paper must be formatted according to the guidelines of Procedia Computer Science, MS Word Template, MS Word Template, Latex, Template Generic, Elsevier.

  • Submitted technical papers must be no longer than 6 pages for full papers, 4 pages for short papers, including all figures, tables and references.

  • Authors are requested to submit their papers electronically using the online conference management system in PDF format before the deadline (see Important Dates).

    The submission processes will be managed by If you have used this system before, you can use the same username and password. If this is your first time using EasyChair, you will need to register for an account by clicking "I have no EasyChair account" button. Upon completion of registration, you will get a notification email from the system and you are ready for submitting your paper. You can upload and re-upload the paper to the system by the submission due date.

    All accepted papers will be scheduled for oral presentations and will be included in the conference proceedings published by Elsevier Science in the open-access Procedia Computer Science series on-line. At least one author of each accepted paper is required to register and attend the conference to present the work.

Contact Us

All questions about submissions should be emailed to Dr Maleh Yassine: