Fig. 6From: Aftermath of bustamante attack on genomic beacon serviceEffect of method 2 on the power of the attack on beacon database considering different biasBack to article page