From: Detecting compromised email accounts via login behavior characterization
Low credibility reference model
High credibility reference model
Large \(\omega\)
3.suspicious
1.normal
Small \(\omega\)
4.suspicious
2.suspicious