Fig. 6From: Detecting compromised email accounts via login behavior characterizationTemporal characterization result of 9 datasetsBack to article page