List of Articles Attack Open Access Article Abstract Page Full-Text 1 - Timår's Invasion to Syria (803/1400-1): Backgrounds and Causes Shahrbanou Nazariyan Masoumali Panjeh Hadi Alemzadeh 10.30495/jhcin.2023.22797 Open Access Article Abstract Page Full-Text 2 - HF-Blocker: Detection of Distributed Denial of Service Attacks Based On Botnets Bita Amirshahi Ali Ahangari Open Access Article Abstract Page Full-Text 3 - IMNTV-Identifying Malicious Nodes using Trust Value in Wireless Sensor Networks Swathi B H Megha V Gururaj H L Hamsaveni M Janhavi V Open Access Article Abstract Page Full-Text 4 - Improving the security of wireless sensor networks using Game Theory Behzad Seif mohammad goodarzi Open Access Article Abstract Page Full-Text 5 - Development of the concept of self-defence in line with national interests against modern terrorism from the perspective of international law ehsan sadeghipoor Mahmoud Ganj Bakhsh Kourosh Jafarpour 10.30495/jlap.2023.74582.1734 Open Access Article Abstract Page Full-Text 6 - Comparison of Cognitive - Behavioral Therapy, Desensitization with Eye Movements and Biofeedback on Migraine Attacks, Anxiety Sensitivity, Quality of Sleep and Life Elahe Mehrmanesh fariba hafezi parvin ehteshamzadeh saeed bakhtiarpour 10.30495/jhm.2023.73314.11136 Open Access Article Abstract Page Full-Text 7 - Analyses the land use zoning based on provide passive defense approach (case study: district 11 of Tehran city) حسن حسینی امینی صالح اسدی مهدی برنافر طاها ربانی Open Access Article Abstract Page Full-Text 8 - Investigating the method of intelligent defense mechanism against DDOS attacks of IOT پریسا دانشجو reza ghaffari dizaji Open Access Article Abstract Page Full-Text 9 - The Principle of Resorting to Force in International Relations Abbas Foladi Maryam Moradi Mohsen Dianat Open Access Article Abstract Page Full-Text 10 - Distributed Denial of Service Attacks Detection in Internet of Things Using the Majority Voting Approach Habibollah Mazarei Marziye Dadvar MohammadHadi Atabakzadeh 10.30495/jce.2023.1984927.1201 Open Access Article Abstract Page Full-Text 11 - A Comparison between the effect of Acceptance and Commitment (ACT) individual and group Therapy on Panic Attack & Agoraphobia Peyman Dousti Golnaz Ghodrati Mohammad Esmaeil Ebrahimi 10.30486/jsrp.2019.575274.1489 Open Access Article Abstract Page Full-Text 12 - Analysis and Evaluation of Increasing the Throughput of Processors by Eliminating the Lobe’s Disorder Saeed Talati Seyed Morteza Ghazali MohammadReza Hassani Ahangar Seyed Mohammad Alavi 10.52547/mjtd.10.3.119 Open Access Article Abstract Page Full-Text 13 - Analysis and Investigation of Disturbance in Radar Systems Using New Techniques of Electronic Attack Pouria Etezadifar Saeed Talati 10.52547/mjtd.10.2.55 Open Access Article Abstract Page Full-Text 14 - A Honeypot-assisted Industrial Control System to Detect Replication Attacks on Wireless Sensor Networks Abbasgholi Pashaei Mohammad Esmaeil Akbari Mina Zolfy Lighvan Asghar Charmin 10.30486/mjtd.2022.695925 Open Access Article Abstract Page Full-Text 15 - Adversarial Attacks in a text sentiment Analysis model Sahar Mokarrami Sefidab Seyed Abolghasem Mirroshandel hamidreza Ahmadifar Mahdi Mokarrami Open Access Article Abstract Page Full-Text 16 - Security in the Internet of Things (IoT): A review of the status, challenges and future issues ) Alireza Zamani Open Access Article Abstract Page Full-Text 17 - Investigation of the Hydrodynamic Analysis of a Ballistic Body Using Simulator Software مقومی مقومی علی کاهید باصری Open Access Article Abstract Page Full-Text 18 - The study of Mahmood Afghan attack to Kohkiloyeh & Behbahan to Badaye Akhbar manuscript reza shabani jamshid ghayemi Open Access Article Abstract Page Full-Text 19 - Taxonomy of Threats and Attacks in IoT Maryam Shamsadini Ali Ghaffari 10.22094/jcr.2022.1959116.1271 Open Access Article Abstract Page Full-Text 20 - Fuzzy Clustering Algorithm to Identify Sybil Attacks in Vehicular ad Hoc Networks Mahdi Maleknasab Ardekani Mohammad Tabarzad Mohammad Amin Shayegan 10.22094/jcr.2023.1979689.1295 Open Access Article Abstract Page Full-Text 21 - A New Intrusion Detection System to deal with Black Hole Attacks in Mobile Ad Hoc Networks Maryam Fathi Ahmadsaraei Abolfazl Toroghi Haghighat Open Access Article Abstract Page Full-Text 22 - A Survey of Solutions to Protect Against All Types of Attacks in Mobile Ad Hoc Networks Maryam Fathi Ahmadsaraei Abolfazl Toroghi Haghighat Open Access Article Abstract Page Full-Text 23 - Turning P2P Networks into DDoS Engines: A Survey Hamid Farhadi Behzad Akbari Shahab Rajaee Mohammad Farahani Open Access Article Abstract Page Full-Text 24 - Economic Modeling of Restricting the cryptocurrency market on ransomware attacks Mehran Garmehi Sarah Rahimi Devin 10.30495/eco.2021.1907003.2406 Open Access Article Abstract Page Full-Text 25 - Possible Responses to Cyber Attacks from the perspective of International Law Azar Givkey 10.30495/cyberlaw.2023.701823 Open Access Article Abstract Page Full-Text 26 - Challenges of Applying the Principles of Armed Conflict to Cyber Attacks Case Study: Observance of the Principle of Prohibition of the Use of Force and the Principle of Distinction in Cyber Attacks Zohre Sadeghi MohammadJavad Arabian 10.30495/cyberlaw.2022.693933 Open Access Article Abstract Page Full-Text 27 - The Scope of the Principle of Non-Use of Force in Cyber Attacks in the Framework of the United Nations Charter Peyman Hakimzade Khoei Reyhane Derogari 10.30495/cyberlaw.2023.701861 Open Access Article Abstract Page Full-Text 28 - Robust Digital Image Watermarking against Cropping and Salt & Pepper Noise using two-step Sudoku Mohammad Shahab Goli Alireza Nsghsh Open Access Article Abstract Page Full-Text 29 - Reducing the impact of SYN flood attacks by improving the accuracy of the PSO algorithm by adaptive effective filters Mohammad Momeny Sorayya Gharravi Fateme Hourali Open Access Article Abstract Page Full-Text 30 - Combined Intrusion Detection System to deal with Cyber- Attacks in Industrial Control Systems with a Dedicated Network Mohammad Safari Elham Parvinnia Alireza Keshavarz Haddad Open Access Article Abstract Page Full-Text 31 - A Novel Image Watermarking Robustness Improving Algorithm Based on Combination of Wavelet and Singular Value Decomposition Transforms Against Noisy and Compression Attacks Mohsen Ghaemizadeh Hossein Pourghasem Homayoun Mahdavi-Nasab Ahmad Keshavarz Open Access Article Abstract Page Full-Text 32 - Improvement of Networked Control Systems Performance Using a New Encryption Algorithm Seyed Ali Mesbahifard Benyamin Hagh Niaz Jahrimi Pooya Hajebi Seyed Mohammad Taghi Almadrasi Open Access Article Abstract Page Full-Text 33 - SDN-based Defending Against ARP Poisoning Attack Zeynab Sasan Majid Salehi Open Access Article Abstract Page Full-Text 34 - Investigating the Effect of Black Hole Attack on AODV and DSR routing protocols in Wireless Ad Hoc network Iman Zangeneh Sedigheh Navaezadeh Abolfazl Jafari Open Access Article Abstract Page Full-Text 35 - Intrusion Response System for SIP based Applications with Engineered Feature Set Hassan Asgharian Ahmad Akbari Bijan Raahemi Open Access Article Abstract Page Full-Text 36 - Detecting Flooding Attacks on IMS Networks Using Kullback-Leibler Divergence and Triple EWMA Noorallah Hemmati Doust Mansour Nejati Jahromi Open Access Article Abstract Page Full-Text 37 - Cyber attacks and the need to respect the basic principles of humanitarian law in them Azar Givkey Mohammad Ali Kafaeifar Mohammad Taghi Rezaei 10.30495/alr.2021.1872408.1562 Open Access Article Abstract Page Full-Text 38 - Consequences of the policymaker's reaction to speculative attacks in the foreign exchange market: The role of the quality of political institutions Shahram Jafarzadeh Gollo Hossein Abbasinejhad Teymour rahmani Sajjad Barkhordari 10.30495/fed.2023.698845 Open Access Article Abstract Page Full-Text 39 - Trump's Middle East Policy; A Case Study: the Syrian crisis and American missile attack Amir sajedi Open Access Article Abstract Page Full-Text 40 - Comparing Study of Strategies of the EU and U.S. in relation to Combat with Terrorism Ardeshir Sanaie Open Access Article Abstract Page Full-Text 41 - Political Participation of Afghanistan Women in the New Structure of Power in Post 11 September Event Mojtaba Maghsudi Sahere Ghallehdar Open Access Article Abstract Page Full-Text 42 - Armed attack of Saudi Arabia to Yemen according to International Criminal Law Mohammad Javad Heidarian Dolatabadi Rasool Mazaheri Koohestani Open Access Article Abstract Page Full-Text 43 - Predicting systematic banking crisis in selected developed countries by multiple logit method Mohammad Reza Asgarian Saeed Daei Karimzadeh Hossein Sharifi Renani Open Access Article Abstract Page Full-Text 44 - Abutaleb Esfahani, a pioneer in the Epic Verses of Haydari attack Sayyed Mortaza Taheri Barzoki Mohsen Baghmirani Open Access Article Abstract Page Full-Text 45 - The study of fatalism in Shahnameh and religious epics Zahra farajnezhad Farhang Mohmmad Navid Bazargan Open Access Article Abstract Page Full-Text 46 - Improving the performance of phishing attack detection systems based on synergy of neural network and Ali Baba and the forty thieves algorithm reza assareh younes mobasheri Open Access Article Abstract Page Full-Text 47 - Presenting a method to deal with DDOS attack in multimedia broadband wireless network Mehdi Ghahremani Mohammad mehdi shirmohammadi Open Access Article Abstract Page Full-Text 48 - Multi-Objective Optimization of Locating the Pollution Detection Sensor in the Urban Water Distribution System Using the Multi-Objective Optimization Algorithm of Coordinated Search hamed mazandarani zadeh matin hendoopor 10.30495/wej.2021.4588 Open Access Article Abstract Page Full-Text 49 - The conflict of cyber attacks with the principle of non-intervention in international law, focusing on the actions of the United States of America Saeid Eid koshayesh Hossein Sorayyai Azar Jahangir Bagheri