A

  • Alavi.Seyed Hosein The role and position of territorialization and border guarding of cyber space in exercising sovereignty over national cyberspace [ Vol.3, Issue 2 - Summer Year 1403]
  • alayee fard.sepideh The principle of Proportionality in Light of the Use of Artificial Intelligence in Armed Conflicts [ Vol.3, Issue 1 - Spring Year 1403]
  • Alizadehseresht.Nader Effectiveness Requirements for Foreign Criminal Laws and Sentences in The National Territory: Developments, Obstacles and Solutions in the Field of Cybercrimes [ Vol.3, Issue 1 - Spring Year 1403]
  • Ansari Mahyari.Alireza The principle of Proportionality in Light of the Use of Artificial Intelligence in Armed Conflicts [ Vol.3, Issue 1 - Spring Year 1403]
  • Ansari Mahyari.Alireza Examining the position of deep web and dark web in international law [ Vol.3, Issue 2 - Summer Year 1403]

B

  • Babai.Samaneh Jurisprudential Feasibility Of The Right To Anonymity In Cyberspace [ Vol.3, Issue 1 - Spring Year 1403]
  • Bagheri.Jahangir The conflict of cyber attacks with the principle of non-intervention in international law, focusing on the actions of the United States of America [ Vol.3, Issue 2 - Summer Year 1403]
  • Beiki shouroki.Mahdi Examining the Necessary Changes in the Structure, Organization and Systems in Judiciary for Implementation of the Electronic Proceedings [ Vol.3, Issue 2 - Summer Year 1403]
  • bidarvand.mokhtar A Study of the Preventive Role of the Media Literacy in Occurrence of Cybercrimes in Iran Over Duration of the COVID-19 Pandemic [ Vol.3, Issue 1 - Spring Year 1403]

E

  • Eid koshayesh.Saeid The conflict of cyber attacks with the principle of non-intervention in international law, focusing on the actions of the United States of America [ Vol.3, Issue 2 - Summer Year 1403]

F

  • fallah tafti.fatemeh Jurisprudential Feasibility Of The Right To Anonymity In Cyberspace [ Vol.3, Issue 1 - Spring Year 1403]
  • fallah.Mohammadreza Examining the Necessary Changes in the Structure, Organization and Systems in Judiciary for Implementation of the Electronic Proceedings [ Vol.3, Issue 2 - Summer Year 1403]
  • Famil Modaberan.Ashkan Effectiveness Requirements for Foreign Criminal Laws and Sentences in The National Territory: Developments, Obstacles and Solutions in the Field of Cybercrimes [ Vol.3, Issue 1 - Spring Year 1403]

G

  • ghaderi.reza Pathology of Whistleblowing Phenomenon in Virtual Social Networks [ Vol.3, Issue 1 - Spring Year 1403]
  • Givkey.Azar Effectiveness Requirements for Foreign Criminal Laws and Sentences in The National Territory: Developments, Obstacles and Solutions in the Field of Cybercrimes [ Vol.3, Issue 1 - Spring Year 1403]

H

  • Hosseini.Zahra sadat Examining the position of deep web and dark web in international law [ Vol.3, Issue 2 - Summer Year 1403]

K

  • Karimi.Sahar A Comparative Study of Digital Signatures in Smart Contracts Under the Laws of Iran and the United States of America [ Vol.3, Issue 2 - Summer Year 1403]
  • kiankhah.ehsan The role and position of territorialization and border guarding of cyber space in exercising sovereignty over national cyberspace [ Vol.3, Issue 2 - Summer Year 1403]

L

  • lorkojori.atefeh Examining the Role of Forensic Nurses in Cybersecurity and Preventing Crimes in Cyberspace [ Vol.3, Issue 1 - Spring Year 1403]

M

  • Mahmoudi.Amirreza Examining the Role of Forensic Nurses in Cybersecurity and Preventing Crimes in Cyberspace [ Vol.3, Issue 1 - Spring Year 1403]

R

  • Radman.Ahmad Examining the position of deep web and dark web in international law [ Vol.3, Issue 2 - Summer Year 1403]
  • rae.masoud The principle of Proportionality in Light of the Use of Artificial Intelligence in Armed Conflicts [ Vol.3, Issue 1 - Spring Year 1403]
  • ramak.mehrab The role and position of territorialization and border guarding of cyber space in exercising sovereignty over national cyberspace [ Vol.3, Issue 2 - Summer Year 1403]
  • Razavi.Seyed Mahdi Civil Liability Incurred from Smart Contract Error [ Vol.3, Issue 2 - Summer Year 1403]

S

  • Sedghi Sabet.mitra Examining the Role of Forensic Nurses in Cybersecurity and Preventing Crimes in Cyberspace [ Vol.3, Issue 1 - Spring Year 1403]
  • sinambari.parisa A Comparative Study of Digital Signatures in Smart Contracts Under the Laws of Iran and the United States of America [ Vol.3, Issue 2 - Summer Year 1403]
  • Sorayyai Azar.Hossein The conflict of cyber attacks with the principle of non-intervention in international law, focusing on the actions of the United States of America [ Vol.3, Issue 2 - Summer Year 1403]