Fig. 7From: Detecting compromised email accounts via login behavior characterizationSpatial characterization result of an email account in Dataset-1Back to article page