Papers: Methods and Designs for Security Experiments (Continued)