Fig. 7
From: Cloud repository as a malicious service: challenge, identification and implication

Bars play critical roles in attack infrastructures. a Cumulative distribution of degrees per sites. b Percentage of Bars in each position of redirection path number of in-degrees per Bar. (Ignoring those traces with length of 2). c Cumulative distribution of position of redirection path number of in-degrees per Bar. (Ignoring those traces with length of 2)