Authorization, Authentication, Access Control, Automated Vulnerability Repair, Availability, Confidentiality, Integrity, Botnets and Botnet Monitoring, Cloud Security, Compliance, Certification, Legal aspects related to Security and Privacy, Dependability, Resilience, Digital Forensics, Human Factors in Security and Privacy Identity Management, Incident Response and Prevention, Intrusion Detection, Fraud Detection, Machine Learning for Security and Privacy, Security and Privacy for Machine Learning, Mobile Security, Network Security, Privacy-Enhancing Technologies (PETs), Process based Security Models and Methods, Risk analysis, Side Channel Attacks, Software Security, Static and Dynamic Code Analysis for Security and Privacy, Security and Privacy for IoT, Cyber-Physical Systems, Critical Infrastructures, Security and Privacy Awareness, Security Requirements, Secure Design of Applications, Usable Security and Privacy, Threats and Attack Modelling, Trusted Computing, Trust Models, Trust Management, Web Application Security and Privacy