List of Articles حملات سایبری Open Access Article Abstract Page Full-Text 1 - The function of regional organizations in cyber wars Tajmohammad Sadeghi Leila raisi Alireza ansari mahyari Open Access Article Abstract Page Full-Text 2 - The strategy of international and regional organizations in facing cyber attacks Tajmohammad Sadeghi Leila raisi Alireza Ansari mahyari Open Access Article Abstract Page Full-Text 3 - Cyber Attacks from the Perspective of the Use of Force Stipulated Under International Law Alireza Ansari mahyari زهرا سادات Hosseini 10.30495/cyberlaw.2022.693895 Open Access Article Abstract Page Full-Text 4 - Investigation of the Ways to Reduce Cyberattacks from the Perspective of the International Humanitarian Law hadi mahmoodi Alireza Ansari mahyari 10.30495/cyberlaw.2022.696600 Open Access Article Abstract Page Full-Text 5 - Possible Responses to Cyber Attacks from the perspective of International Law Azar Givkey 10.30495/cyberlaw.2023.701823 Open Access Article Abstract Page Full-Text 6 - Challenges of Applying the Principles of Armed Conflict to Cyber Attacks Case Study: Observance of the Principle of Prohibition of the Use of Force and the Principle of Distinction in Cyber Attacks Zohre Sadeghi MohammadJavad Arabian 10.30495/cyberlaw.2022.693933 Open Access Article Abstract Page Full-Text 7 - The Scope of the Principle of Non-Use of Force in Cyber Attacks in the Framework of the United Nations Charter Peyman Hakimzade Khoei Reyhane Derogari 10.30495/cyberlaw.2023.701861 Open Access Article Abstract Page Full-Text 8 - Right to “Self-Defense” against Cyber-attacks with an Emphasis on the Attacks of the United States of America Saeid Eid koshayesh Hossein Sorayaii Azar jahangir bagheri 10.30495/cyberlaw.2023.701877 Open Access Article Abstract Page Full-Text 9 - Cyber attacks and the need to respect the basic principles of humanitarian law in them Azar Givkey Mohammad Ali Kafaeifar Mohammad Taghi Rezaei 10.30495/alr.2021.1872408.1562 Open Access Article Abstract Page Full-Text 10 - Improving the performance of phishing attack detection systems based on synergy of neural network and Ali Baba and the forty thieves algorithm reza assareh younes mobasheri 10.71623/joins.2024.1121454 Open Access Article Abstract Page Full-Text 11 - The conflict of cyber attacks with the principle of non-intervention in international law, focusing on the actions of the United States of America Saeid Eid koshayesh Hossein Sorayyai Azar Jahangir Bagheri