Fig. 6
From: Aftermath of bustamante attack on genomic beacon service

Effect of method 2 on the power of the attack on beacon database considering different bias
From: Aftermath of bustamante attack on genomic beacon service
Effect of method 2 on the power of the attack on beacon database considering different bias