Nonintrusive SSL/TLS proxy with JSON-based policy SM Jawi, FHM Ali, NHN Zulkipli Information Science and Applications, 431-438, 2015 | 4 | 2015 |
Rules and results for SSL/TLS nonintrusive proxy based on JSON data SM Jawi, FHM Ali 2016 6th International Conference on IT Convergence and Security (ICITCS), 1-5, 2016 | 3 | 2016 |
Non-intrusive SSL/TLS proxy implementation and issues SM Jawi, FHM Ali 2015 IEEE Student Conference on Research and Development (SCOReD), 684-689, 2015 | 1 | 2015 |
Integration of Security Hardware Module Zymkey 4i With Raspberry Pi RM Rechie, NN Mohamed, YM Yussoff, L Mazalan, SM Jawi, MS Rohmad Journal of Positive School Psychology 6 (3), 8461–8469-8461–8469, 2022 | | 2022 |
The Implementation of Hardware Security Based Zymkey 4i in HDVA RM Rechie, YM Yussoff, L Mazalan, SMJ Said 2021 International Congress of Advanced Technology and Engineering (ICOTEN), 1-5, 2021 | | 2021 |
New Vulnerabilities upon Grain v0 Boolean Function through Fault Injection Analysis WZ Omar, MRK Ariffin, SM Jawi, Z Mahad OIC-CERT Journal of Cyber Security 3 (1), 65-74, 2021 | | 2021 |
Findings Annihilator (s) via Fault Injection Analysis (FIA) on Boolean Function of LILI-128 WZ Omar, SM Jawi, MRK Ariffin, Z Mahad, S Shamsuddin Journal of Advances in Information Technology Vol 11 (4), 2020 | | 2020 |
Findings Annihilator (s) via Fault Injection Attack (FIA) on Boolean Function of Grain v0 MRK Ariffin, WZ Omar, S Shamsuddin, Z Mahad, SM Jawi ITM Web of Conferences 24, 02009, 2019 | | 2019 |
A Proxy-Based Adaptive Security Implementation for SSL Ecosystem SM Jawi Kolokium Siswazah Sains Komputer Dan Matematik Peringkat Kebangsaan, 2013 | | 2013 |
Insecurity of Inputs to CGI Program, SANS Institute. 2002 SM Jawi | | 2001 |
New Vulnerabilities Upon Pomaranch Boolean Function Through Fault Injection Analysis (FIA) SS Ariffin, Z Mahad, SM Jawi | | |