Figure 6From: Optimized combined-clustering methods for finding replicated criminal websites Survival probability of fake escrow clusters (left) and HYIP clusters (right). Back to article page