Fig. 4From: Detecting compromised email accounts via login behavior characterizationThe alternating logins of the attacker and owner generate a login series with extreme volatilityBack to article page