Figure 7: ROC of several mimicry attack and noisy case scenario.