Follow
Suhairi Mohd Jawi
Suhairi Mohd Jawi
Senior Analyst, Cybersecurity Malaysia
Verified email at cybersecurity.my
Title
Cited by
Cited by
Year
Nonintrusive SSL/TLS proxy with JSON-based policy
SM Jawi, FHM Ali, NHN Zulkipli
Information Science and Applications, 431-438, 2015
42015
Rules and results for SSL/TLS nonintrusive proxy based on JSON data
SM Jawi, FHM Ali
2016 6th International Conference on IT Convergence and Security (ICITCS), 1-5, 2016
32016
Non-intrusive SSL/TLS proxy implementation and issues
SM Jawi, FHM Ali
2015 IEEE Student Conference on Research and Development (SCOReD), 684-689, 2015
12015
Integration of Security Hardware Module Zymkey 4i With Raspberry Pi
RM Rechie, NN Mohamed, YM Yussoff, L Mazalan, SM Jawi, MS Rohmad
Journal of Positive School Psychology 6 (3), 8461–8469-8461–8469, 2022
2022
The Implementation of Hardware Security Based Zymkey 4i in HDVA
RM Rechie, YM Yussoff, L Mazalan, SMJ Said
2021 International Congress of Advanced Technology and Engineering (ICOTEN), 1-5, 2021
2021
New Vulnerabilities upon Grain v0 Boolean Function through Fault Injection Analysis
WZ Omar, MRK Ariffin, SM Jawi, Z Mahad
OIC-CERT Journal of Cyber Security 3 (1), 65-74, 2021
2021
Findings Annihilator (s) via Fault Injection Analysis (FIA) on Boolean Function of LILI-128
WZ Omar, SM Jawi, MRK Ariffin, Z Mahad, S Shamsuddin
Journal of Advances in Information Technology Vol 11 (4), 2020
2020
Findings Annihilator (s) via Fault Injection Attack (FIA) on Boolean Function of Grain v0
MRK Ariffin, WZ Omar, S Shamsuddin, Z Mahad, SM Jawi
ITM Web of Conferences 24, 02009, 2019
2019
A Proxy-Based Adaptive Security Implementation for SSL Ecosystem
SM Jawi
Kolokium Siswazah Sains Komputer Dan Matematik Peringkat Kebangsaan, 2013
2013
Insecurity of Inputs to CGI Program, SANS Institute. 2002
SM Jawi
2001
New Vulnerabilities Upon Pomaranch Boolean Function Through Fault Injection Analysis (FIA)
SS Ariffin, Z Mahad, SM Jawi
The system can't perform the operation now. Try again later.
Articles 1–11