
here is my table code :
% Please add the following required packages to your document preamble:
% \usepackage{multirow}
% \usepackage[table,xcdraw]{xcolor}
% If you use beamer only pass "xcolor=table" option, i.e. \documentclass[xcolor=table]{beamer}
\begin{table}[h]
\begin{tabular}{|l|l|l|l|}
\hline
\rowcolor[HTML]{333333}
{\color[HTML]{FFFFFF} {\bf Layer}} & {\color[HTML]{FFFFFF} {\bf Attack}} & {\color[HTML]{FFFFFF} {\bf countermeasure}} & {\color[HTML]{FFFFFF} {\bf Ref.}} \\ \hline
\cellcolor[HTML]{3531FF}{\color[HTML]{FFFFFF} } & {\color[HTML]{3531FF} } & {\color[HTML]{3531FF} \begin{tabular}[c]{@{}l@{}}Glue or bond, Embedding in the product,\\ Alarm function trigger\end{tabular}} & {\color[HTML]{3531FF} {[}a{]}} \\ \cline{3-4}
\cellcolor[HTML]{3531FF}{\color[HTML]{FFFFFF} } & \multirow{-2}{*}{{\color[HTML]{3531FF} Tag Remove}} & {\color[HTML]{3531FF} Chip coating, Tamper-proof} & {\color[HTML]{3531FF} {[}b{]}} \\ \cline{2-4}
\cellcolor[HTML]{3531FF}{\color[HTML]{FFFFFF} } & {\color[HTML]{3531FF} Kill Command} & {\color[HTML]{3531FF} \begin{tabular}[c]{@{}l@{}}Class-1 Gen-2 EPC Standard, \\ Master Password\end{tabular}} & {\color[HTML]{3531FF} {[}10{]}} \\ \cline{2-4}
\cellcolor[HTML]{3531FF}{\color[HTML]{FFFFFF} } & {\color[HTML]{3531FF} } & {\color[HTML]{3531FF} \begin{tabular}[c]{@{}l@{}}Encryption, Authentication, \\ Password, PIN, biometric\end{tabular}} & {\color[HTML]{3531FF} {[}a{]}} \\ \cline{3-4}
\cellcolor[HTML]{3531FF}{\color[HTML]{FFFFFF} } & {\color[HTML]{3531FF} } & {\color[HTML]{3531FF} Round Trip Delay} & {\color[HTML]{3531FF} {[}48{]}} \\ \cline{3-4}
\multirow{-6}{*}{\cellcolor[HTML]{3531FF}{\color[HTML]{FFFFFF} {\bf Physical}}} & \multirow{-3}{*}{{\color[HTML]{3531FF} Relay}} & {\color[HTML]{3531FF} Distance Bounding Protocol} & {\color[HTML]{3531FF} {[}21,44{]}} \\ \hline
\cellcolor[HTML]{036400}{\color[HTML]{FFFFFF} } & {\color[HTML]{036400} } & {\color[HTML]{036400} \begin{tabular}[c]{@{}l@{}}Challenge-response Authentication \\ Protocol, Public key cryptography\end{tabular}} & {\color[HTML]{036400} {\bf {[}25{]}}} \\ \cline{3-4}
\cellcolor[HTML]{036400}{\color[HTML]{FFFFFF} } & {\color[HTML]{036400} } & {\color[HTML]{036400} PIN-based Access} & {\color[HTML]{036400} {\bf {[}27{]}}} \\ \cline{3-4}
\cellcolor[HTML]{036400}{\color[HTML]{FFFFFF} } & {\color[HTML]{036400} } & {\color[HTML]{036400} Correlating Information} & {\color[HTML]{036400} {\bf {[}a{]}}} \\ \cline{3-4}
\cellcolor[HTML]{036400}{\color[HTML]{FFFFFF} } & {\color[HTML]{036400} } & {\color[HTML]{036400} Back-end database} & {\color[HTML]{036400} {[}38{]}} \\ \cline{3-4}
\cellcolor[HTML]{036400}{\color[HTML]{FFFFFF} } & {\color[HTML]{036400} } & {\color[HTML]{036400} Finger Print} & {\color[HTML]{036400} {[}35{]}} \\ \cline{3-4}
\cellcolor[HTML]{036400}{\color[HTML]{FFFFFF} } & \multirow{-6}{*}{{\color[HTML]{036400} {\bf Cloning}}} & {\color[HTML]{036400} Unclonable Function} & {\color[HTML]{036400} {[}b{]}} \\ \cline{2-4}
\cellcolor[HTML]{036400}{\color[HTML]{FFFFFF} } & {\color[HTML]{036400} Eavesdropping} & {\color[HTML]{036400} Encyption} & {\color[HTML]{036400} {[}a,b{]}} \\ \cline{2-4}
\cellcolor[HTML]{036400}{\color[HTML]{FFFFFF} } & {\color[HTML]{036400} } & {\color[HTML]{036400} Authentication} & {\color[HTML]{036400} {[}a,b{]}} \\ \cline{3-4}
\cellcolor[HTML]{036400}{\color[HTML]{FFFFFF} } & {\color[HTML]{036400} } & {\color[HTML]{036400} PINs or biometric} & {\color[HTML]{036400} {[}12{]}} \\ \cline{3-4}
\cellcolor[HTML]{036400}{\color[HTML]{FFFFFF} } & {\color[HTML]{036400} } & {\color[HTML]{036400} Pseduonymization} & {\color[HTML]{036400} {[}a{]}} \\ \cline{3-4}
\cellcolor[HTML]{036400}{\color[HTML]{FFFFFF} } & {\color[HTML]{036400} } & {\color[HTML]{036400} Hash-hock} & {\color[HTML]{036400} {[}53{]}} \\ \cline{3-4}
\cellcolor[HTML]{036400}{\color[HTML]{FFFFFF} } & {\color[HTML]{036400} } & {\color[HTML]{036400} Randomized hash-lock} & {\color[HTML]{036400} {[}54{]}} \\ \cline{3-4}
\cellcolor[HTML]{036400}{\color[HTML]{FFFFFF} } & {\color[HTML]{036400} } & {\color[HTML]{036400} Chained hashes} & {\color[HTML]{036400} {[}41{]}} \\ \cline{3-4}
\multirow{-14}{*}{\cellcolor[HTML]{036400}{\color[HTML]{FFFFFF} {\bf Network}}} & \multirow{-7}{*}{{\color[HTML]{036400} Spoofing}} & {\color[HTML]{036400} Encryption} & {\color[HTML]{036400} {[}b,6{]}} \\ \hline
\cellcolor[HTML]{330001}{\color[HTML]{FFFFFF} } & {\color[HTML]{330001} } & {\color[HTML]{330001} Aluminum-lined wallets} & {\color[HTML]{330001} {[}a, 37{]}} \\ \cline{3-4}
\cellcolor[HTML]{330001}{\color[HTML]{FFFFFF} } & {\color[HTML]{330001} } & {\color[HTML]{330001} Blocker tags} & {\color[HTML]{330001} {[}28{]}} \\ \cline{3-4}
\cellcolor[HTML]{330001}{\color[HTML]{FFFFFF} } & {\color[HTML]{330001} } & {\color[HTML]{330001} Guardian} & {\color[HTML]{330001} {[}45{]}} \\ \cline{3-4}
\cellcolor[HTML]{330001}{\color[HTML]{FFFFFF} } & {\color[HTML]{330001} } & {\color[HTML]{330001} Symmetric key encryption} & {\color[HTML]{330001} {[}34{]}} \\ \cline{3-4}
\cellcolor[HTML]{330001}{\color[HTML]{FFFFFF} } & {\color[HTML]{330001} } & {\color[HTML]{330001} Public Key Encryption} & {\color[HTML]{330001} {[}14{]}} \\ \cline{3-4}
\cellcolor[HTML]{330001}{\color[HTML]{FFFFFF} } & {\color[HTML]{330001} } & {\color[HTML]{330001} Hash Function} & {\color[HTML]{330001} {[}54{]}} \\ \cline{3-4}
\cellcolor[HTML]{330001}{\color[HTML]{FFFFFF} } & {\color[HTML]{330001} } & {\color[HTML]{330001} Mutual Authentication} & {\color[HTML]{330001} {[}40,7{]}} \\ \cline{3-4}
\cellcolor[HTML]{330001}{\color[HTML]{FFFFFF} } & \multirow{-8}{*}{{\color[HTML]{330001} Unauthorized tag reading}} & {\color[HTML]{330001} Pseudonyms} & {\color[HTML]{330001} {[}26{]}} \\ \cline{2-4}
\cellcolor[HTML]{330001}{\color[HTML]{FFFFFF} } & {\color[HTML]{330001} } & {\color[HTML]{330001} Field Detectors, Authentication} & {\color[HTML]{330001} {[}b{]}} \\ \cline{3-4}
\cellcolor[HTML]{330001}{\color[HTML]{FFFFFF} } & \multirow{-2}{*}{{\color[HTML]{330001} Tag Modification}} & {\color[HTML]{330001} Read-Only-Tag} & {\color[HTML]{330001} {[}a{]}} \\ \cline{2-4}
\cellcolor[HTML]{330001}{\color[HTML]{FFFFFF} } & {\color[HTML]{330001} Middleware} & {\color[HTML]{330001} Isolating, Input Checking} & {\color[HTML]{330001} {[}a{]}} \\ \cline{2-4}
\multirow{-12}{*}{\cellcolor[HTML]{330001}{\color[HTML]{FFFFFF} {\bf Application}}} & Virus & Blocking Anomalous Bits & {[}b{]} \\ \hline
\cellcolor[HTML]{FE0000}{\color[HTML]{FFFFFF} } & {\color[HTML]{FE0000} Social Engineering} & {\color[HTML]{FE0000} \begin{tabular}[c]{@{}l@{}}Training, Education, Awareness and \\ Oversight\end{tabular}} & {\color[HTML]{FE0000} {[}31{]}} \\ \cline{2-4}
\cellcolor[HTML]{FE0000}{\color[HTML]{FFFFFF} } & {\color[HTML]{FE0000} } & {\color[HTML]{FE0000} EPC Global Guidelines} & {\color[HTML]{FE0000} {[}11{]}} \\ \cline{3-4}
\multirow{-3}{*}{\cellcolor[HTML]{FE0000}{\color[HTML]{FFFFFF} {\bf Strategic}}} & \multirow{-2}{*}{{\color[HTML]{FE0000} Privacy}} & {\color[HTML]{FE0000} Fair Information Practices (FIP)} & {\color[HTML]{FE0000} {[}16{]}} \\ \hline
\cellcolor[HTML]{6665CD}{\color[HTML]{FFFFFF} } & {\color[HTML]{6665CD} Dos and Traffic Analysis} & {\color[HTML]{6665CD} Cryptographic Algorithms} & {\color[HTML]{6665CD} {[}43{]}} \\ \cline{2-4}
\cellcolor[HTML]{6665CD}{\color[HTML]{FFFFFF} } & {\color[HTML]{6665CD} Side Channel} & {\color[HTML]{6665CD} \begin{tabular}[c]{@{}l@{}}Limiting the Electromagnetic\\ Emissions, Complex Circuit\end{tabular}} & {\color[HTML]{6665CD} {[}a{]}} \\ \cline{2-4}
\cellcolor[HTML]{6665CD}{\color[HTML]{FFFFFF} } & {\color[HTML]{6665CD} } & {\color[HTML]{6665CD} Challenge Response} & {\color[HTML]{6665CD} {[}a{]},{[}b{]}} \\ \cline{3-4}
\cellcolor[HTML]{6665CD}{\color[HTML]{FFFFFF} } & \multirow{-2}{*}{{\color[HTML]{6665CD} Replay}} & {\color[HTML]{6665CD} \begin{tabular}[c]{@{}l@{}}Timestamps, One-time Passwords,\\ Encryption\end{tabular}} & {\color[HTML]{6665CD} {[}a{]}} \\ \cline{2-4}
\cellcolor[HTML]{6665CD}{\color[HTML]{FFFFFF} } & {\color[HTML]{6665CD} Cryptography} & {\color[HTML]{6665CD} Eccryption} & {\color[HTML]{6665CD} {[}a{]}} \\ \cline{2-4}
\multirow{-6}{*}{\cellcolor[HTML]{6665CD}{\color[HTML]{FFFFFF} {\bf Multilayer}}} & {\color[HTML]{6665CD} Man-In-The-Middle} & {\color[HTML]{6665CD} Encryption, Authentication} & {\color[HTML]{6665CD} {[}b{]}} \\ \hline
\end{tabular}
\caption{My caption}
\label{my-label}
\end{table}


table*(not with thehoption , of course)? – GuM Jun 06 '15 at 21:36\caption{table}{…}. At the moment, I'm looking at the problem of breaking the table across pages. We can't uselongtablein twocolumn mode, butxtabseems to do the job. – Bernard Jun 06 '15 at 22:25Where " Table 1 " and This is my Caption should come in one line
– Sangeen Khan Jun 06 '15 at 22:35