Fig. 1From: Detecting compromised email accounts via login behavior characterizationThe average percentage of location-changed logins for each login protocol in our datasetsBack to article page