Fig. 8From: Detecting compromised email accounts via login behavior characterizationThe number of IP addresses that have logged in to each account in our datasetsBack to article page