Fig. 5From: Aftermath of bustamante attack on genomic beacon serviceEffect of method 1 on the power of the attack on beacon database considering different biasBack to article page