Fig. 9From: Detecting compromised email accounts via login behavior characterizationThe number of accounts that have been logged in by each IP address in our datasetsBack to article page