Skip to main content

Table 1 Four possible cases of the mixture model and the corresponding determination results

From: Detecting compromised email accounts via login behavior characterization

 

Low credibility reference model

High credibility reference model

Large \(\omega\)

3.suspicious

1.normal

Small \(\omega\)

4.suspicious

2.suspicious