Follow
Jake Drew
Jake Drew
Postdoctoral Fellow - Darwin Deason Institute for Cyber Security, SMU
Verified email at mail.smu.edu - Homepage
Title
Cited by
Cited by
Year
Polymorphic malware detection using sequence classification methods
J Drew, T Moore, M Hahsler
2016 IEEE Security and Privacy Workshops (SPW), 81-87, 2016
682016
Polymorphic malware detection using sequence classification methods and ensembles: BioSTAR 2016 Recommended Submission-EURASIP Journal on Information Security
J Drew, M Hahsler, T Moore
EURASIP Journal on Information Security 2017, 1-12, 2017
672017
The e-commerce market for" lemons" identification and analysis of websites selling counterfeit goods
J Wadleigh, J Drew, T Moore
Proceedings of the 24th International Conference on World Wide Web, 1188-1197, 2015
392015
Automatic identification of replicated criminal websites using combined clustering
J Drew, T Moore
2014 IEEE Security and Privacy Workshops, 116-123, 2014
382014
System and method for machine learning and classifying data
J Drew, M Hahsler, T Moore
US Patent 10,579,661, 2020
252020
Strand fast sequence comparison using mapreduce and locality sensitive hashing
J Drew, M Hahsler
Proceedings of the 5th ACM Conference on Bioinformatics, Computational …, 2014
162014
Optimized combined-clustering methods for finding replicated criminal websites
JM Drew, T Moore
EURASIP Journal on Information Security 2014, 1-13, 2014
82014
Automatic identification of replicated criminal websites using combined clustering. In 2014 IEEE Security and Privacy Workshops
J Drew, T Moore
IEEE, 2014
52014
hierarchical agglomerative clustering
J Drew
Accessed: Aug 27, 2023
12023
Scalable machine learning using applications in bioinformatics and cybercrime
JM Drew
Southern Methodist University, 2015
2015
Mass compromise of iis shared web hosting for blackhat seo: A case study
JM Drew, M Vasek, T Moore
Dim 7 (X77X7XX), X7X77XX, 2014
2014
Month: October 2014
J Drew
html feature extraction
J Drew
Month: January 2016
J Drew
Month: May 2014
J Drew
Automatic Identification of Replicated Criminal Websites Using Combined Clustering Methods
J Drew
consensus clustering
J Drew
Nearest Neighbor
J Drew
escrow fraud
J Drew
ponzi schemes
J Drew
The system can't perform the operation now. Try again later.
Articles 1–20