Game theory, control, and mechanism design for security and privacy.- Decision making for cybersecurity and security requirements engineering.- Security and privacy for the Internet-of-Things, cyber-physical systems, cloud computing, resilient control systems, and critical infrastructure.- Pricing, economic incentives, security investments, and cyber insurance for dependable and secure systems.- Risk assessment and security risk management.- Security and privacy of wireless and mobile communications, including user location privacy.- Socio-technological and behavioral approaches to security.- Empirical and experimental studies with game, control, or optimization theory-based analysis for security and privacy.- Adversarial Machine Learning and the role of AI in system security.