Text this: Research Directions in Data and Applications Security XVIII