Full Description
security investments, and cyber insurance for dependable and secure systems; security and privacy of wireless and mobile communications, including user location privacy; empirical and experimental studies with game, control, or optimization theory-based analysis for security and privacy;



