List of Articles حملات Open Access Article Abstract Page Full-Text 1 - Comparison of Cognitive - Behavioral Therapy, Desensitization with Eye Movements and Biofeedback on Migraine Attacks, Anxiety Sensitivity, Quality of Sleep and Life Elahe Mehrmanesh fariba hafezi parvin ehteshamzadeh saeed bakhtiarpour 10.30495/jhm.2023.73314.11136 Open Access Article Abstract Page Full-Text 2 - Analyses the land use zoning based on provide passive defense approach (case study: district 11 of Tehran city) حسن حسینی امینی صالح اسدی مهدی برنافر طاها ربانی Open Access Article Abstract Page Full-Text 3 - Investigating the method of intelligent defense mechanism against DDOS attacks of IOT پریسا دانشجو reza ghaffari dizaji Open Access Article Abstract Page Full-Text 4 - an approach to detect DDoS attacks in the cloud computing environment using entropy and particle swarm optimization mehdi asayeshjoo Mehdi sadeghzadeh maziyar ganjoo Open Access Article Abstract Page Full-Text 5 - Adversarial Attacks in a text sentiment Analysis model Sahar Mokarrami Sefidab Seyed Abolghasem Mirroshandel hamidreza Ahmadifar Mahdi Mokarrami Open Access Article Abstract Page Full-Text 6 - A new method in the security of encryption systems by unbalanced gates seyyed hamidreza mousavi mehdi safaeian Amir Hassan Ahmadi Ghaleh Open Access Article Abstract Page Full-Text 7 - مروری بر سیستمهای تشخیص نفوذ از دیدگاه ساختار و روشهای بهبود کارایی در آنها شهرزاد رحیمی مسعود نیازی سیدعابد حسینی Open Access Article Abstract Page Full-Text 8 - The function of regional organizations in cyber wars Tajmohammad Sadeghi Leila raisi Alireza ansari mahyari Open Access Article Abstract Page Full-Text 9 - Cyber Attacks from the Perspective of the Use of Force Stipulated Under International Law Alireza Ansari mahyari زهرا سادات Hosseini 10.30495/cyberlaw.2022.693895 Open Access Article Abstract Page Full-Text 10 - Investigation of the Ways to Reduce Cyberattacks from the Perspective of the International Humanitarian Law hadi mahmoodi Alireza Ansari mahyari 10.30495/cyberlaw.2022.696600 Open Access Article Abstract Page Full-Text 11 - Possible Responses to Cyber Attacks from the perspective of International Law Azar Givkey 10.30495/cyberlaw.2023.701823 Open Access Article Abstract Page Full-Text 12 - Challenges of Applying the Principles of Armed Conflict to Cyber Attacks Case Study: Observance of the Principle of Prohibition of the Use of Force and the Principle of Distinction in Cyber Attacks Zohre Sadeghi MohammadJavad Arabian 10.30495/cyberlaw.2022.693933 Open Access Article Abstract Page Full-Text 13 - The Scope of the Principle of Non-Use of Force in Cyber Attacks in the Framework of the United Nations Charter Peyman Hakimzade Khoei Reyhane Derogari 10.30495/cyberlaw.2023.701861 Open Access Article Abstract Page Full-Text 14 - Right to “Self-Defense” against Cyber-attacks with an Emphasis on the Attacks of the United States of America Saeid Eid koshayesh Hossein Sorayaii Azar jahangir bagheri 10.30495/cyberlaw.2023.701877 Open Access Article Abstract Page Full-Text 15 - Reducing the impact of SYN flood attacks by improving the accuracy of the PSO algorithm by adaptive effective filters Mohammad Momeny Sorayya Gharravi Fateme Hourali Open Access Article Abstract Page Full-Text 16 - Combined Intrusion Detection System to deal with Cyber- Attacks in Industrial Control Systems with a Dedicated Network Mohammad Safari Elham Parvinnia Alireza Keshavarz Haddad Open Access Article Abstract Page Full-Text 17 - Cyber attacks and the need to respect the basic principles of humanitarian law in them Azar Givkey Mohammad Ali Kafaeifar Mohammad Taghi Rezaei 10.30495/alr.2021.1872408.1562 Open Access Article Abstract Page Full-Text 18 - Consequences of the policymaker's reaction to speculative attacks in the foreign exchange market: The role of the quality of political institutions Shahram Jafarzadeh Gollo Hossein Abbasinejhad Teymour rahmani Sajjad Barkhordari 10.30495/fed.2023.698845 Open Access Article Abstract Page Full-Text 19 - Political Participation of Afghanistan Women in the New Structure of Power in Post 11 September Event Mojtaba Maghsudi Sahere Ghallehdar Open Access Article Abstract Page Full-Text 20 - Improving the performance of phishing attack detection systems based on synergy of neural network and Ali Baba and the forty thieves algorithm reza assareh younes mobasheri Open Access Article Abstract Page Full-Text 21 - Multi-Objective Optimization of Locating the Pollution Detection Sensor in the Urban Water Distribution System Using the Multi-Objective Optimization Algorithm of Coordinated Search hamed mazandarani zadeh matin hendoopor 10.30495/wej.2021.4588 Open Access Article Abstract Page Full-Text 22 - The conflict of cyber attacks with the principle of non-intervention in international law, focusing on the actions of the United States of America Saeid Eid koshayesh Hossein Sorayyai Azar Jahangir Bagheri