Fig. 2From: Detecting compromised email accounts via login behavior characterizationIn a real case in our datasets, the account was logged in by both the owner and the attacker, who were in different time zonesBack to article page