Fig. 11From: Detecting compromised email accounts via login behavior characterizationSpatial characterization result of 9 datasetsBack to article page