Fig. 10From: Detecting compromised email accounts via login behavior characterizationThe results of using three different similarity comparison methods on Dataset-1Back to article page