List of Articles Attack Open Access Article Abstract Page Full-Text 1 - Timår's Invasion to Syria (803/1400-1): Backgrounds and Causes Shahrbanou Nazariyan Masoumali Panjeh Hadi Alemzadeh 10.30495/jhcin.2023.22797 Open Access Article Abstract Page Full-Text 2 - HF-Blocker: Detection of Distributed Denial of Service Attacks Based On Botnets Bita Amirshahi Ali Ahangari Open Access Article Abstract Page Full-Text 3 - IMNTV-Identifying Malicious Nodes using Trust Value in Wireless Sensor Networks Swathi B H Megha V Gururaj H L Hamsaveni M Janhavi V Open Access Article Abstract Page Full-Text 4 - Secure Bio-Cryptographic Authentication System for Cardless Automated Teller Machines Olayemi Olaniyi Ameh Ameh Lukman Ajao Omolara Lawal Open Access Article Abstract Page Full-Text 5 - Improving the security of wireless sensor networks using Game Theory Behzad Seif mohammad goodarzi Open Access Article Abstract Page Full-Text 6 - Development of the concept of self-defence in line with national interests against modern terrorism from the perspective of international law ehsan sadeghipoor Mahmoud Ganj Bakhsh Kourosh Jafarpour 10.30495/jlap.2023.74582.1734 Open Access Article Abstract Page Full-Text 7 - Comparison of Cognitive - Behavioral Therapy, Desensitization with Eye Movements and Biofeedback on Migraine Attacks, Anxiety Sensitivity, Quality of Sleep and Life Elahe Mehrmanesh fariba hafezi parvin ehteshamzadeh saeed bakhtiarpour 10.30495/jhm.2023.73314.11136 Open Access Article Abstract Page Full-Text 8 - Analyses the land use zoning based on provide passive defense approach (case study: district 11 of Tehran city) حسن حسینی امینی صالح اسدی مهدی برنافر طاها ربانی Open Access Article Abstract Page Full-Text 9 - Investigating the method of intelligent defense mechanism against DDOS attacks of IOT پریسا دانشجو reza ghaffari dizaji 10.71623/joins.2024.846327 Open Access Article Abstract Page Full-Text 10 - The Principle of Resorting to Force in International Relations Abbas Foladi Maryam Moradi Mohsen Dianat Open Access Article Abstract Page Full-Text 11 - an approach to detect DDoS attacks in the cloud computing environment using entropy and particle swarm optimization mehdi asayeshjoo Mehdi sadeghzadeh maziyar ganjoo Open Access Article Abstract Page Full-Text 12 - Distributed Denial of Service Attacks Detection in Internet of Things Using the Majority Voting Approach Habibollah Mazarei Marziye Dadvar MohammadHadi Atabakzadeh 10.30495/jce.2023.1984927.1201 Open Access Article Abstract Page Full-Text 13 - A Comparison between the effect of Acceptance and Commitment (ACT) individual and group Therapy on Panic Attack & Agoraphobia Peyman Dousti Golnaz Ghodrati Mohammad Esmaeil Ebrahimi 10.30486/jsrp.2019.575274.1489 Open Access Article Abstract Page Full-Text 14 - Analysis and Evaluation of Increasing the Throughput of Processors by Eliminating the Lobe’s Disorder Saeed Talati Seyed Morteza Ghazali MohammadReza Hassani Ahangar Seyed Mohammad Alavi 10.52547/mjtd.10.3.119 Open Access Article Abstract Page Full-Text 15 - Analysis and Investigation of Disturbance in Radar Systems Using New Techniques of Electronic Attack Pouria Etezadifar Saeed Talati 10.52547/mjtd.10.2.55 Open Access Article Abstract Page Full-Text 16 - A Honeypot-assisted Industrial Control System to Detect Replication Attacks on Wireless Sensor Networks Abbasgholi Pashaei Mohammad Esmaeil Akbari Mina Zolfy Lighvan Asghar Charmin 10.30486/mjtd.2022.695925 Open Access Article Abstract Page Full-Text 17 - Adversarial Attacks in a text sentiment Analysis model Sahar Mokarrami Sefidab Seyed Abolghasem Mirroshandel hamidreza Ahmadifar Mahdi Mokarrami Open Access Article Abstract Page Full-Text 18 - Using the Modified Colonial Competition Algorithm to Increase the Speed and Accuracy of the Intelligent Intrusion Detection System Mohammad Nazarpour Navid Nezafati Sajjad Shokouhyar 10.71856/impcs.2023.903591 Open Access Article Abstract Page Full-Text 19 - Sampled-Data Flocking of Multi-Agent Systems Under the Cyber-Attack Problem سحر یزدانی 10.71856/impcs.2024.903618 Open Access Article Abstract Page Full-Text 20 - The function of regional organizations in cyber wars Tajmohammad Sadeghi Leila raisi Alireza ansari mahyari Open Access Article Abstract Page Full-Text 21 - Security in the Internet of Things (IoT): A review of the status, challenges and future issues ) Alireza Zamani Open Access Article Abstract Page Full-Text 22 - Investigation of the Hydrodynamic Analysis of a Ballistic Body Using Simulator Software مقومی مقومی علی کاهید باصری Open Access Article Abstract Page Full-Text 23 - Proposing an effective approach for Network security and multimedia documents classically using encryption and watermarking Reza Abbasgolizadeh Habib Izadkhah ramin meshkabadi Open Access Article Abstract Page Full-Text 24 - political issues of sammanid collaps in iran history javad horavi Open Access Article Abstract Page Full-Text 25 - The study of Mahmood Afghan attack to Kohkiloyeh & Behbahan to Badaye Akhbar manuscript reza shabani jamshid ghayemi Open Access Article Abstract Page Full-Text 26 - The relationship between economy and pohicy in to Jhataids Olos hashem sedgh amiz Open Access Article Abstract Page Full-Text 27 - Taxonomy of Threats and Attacks in IoT Maryam Shamsadini Ali Ghaffari 10.22094/jcr.2022.1959116.1271 Open Access Article Abstract Page Full-Text 28 - Fuzzy Clustering Algorithm to Identify Sybil Attacks in Vehicular ad Hoc Networks Mahdi Maleknasab Ardekani Mohammad Tabarzad Mohammad Amin Shayegan 10.22094/jcr.2023.1979689.1295 Open Access Article Abstract Page Full-Text 29 - A New Intrusion Detection System to deal with Black Hole Attacks in Mobile Ad Hoc Networks Maryam Fathi Ahmadsaraei Abolfazl Toroghi Haghighat Open Access Article Abstract Page Full-Text 30 - A Survey of Solutions to Protect Against All Types of Attacks in Mobile Ad Hoc Networks Maryam Fathi Ahmadsaraei Abolfazl Toroghi Haghighat Open Access Article Abstract Page Full-Text 31 - Turning P2P Networks into DDoS Engines: A Survey Hamid Farhadi Behzad Akbari Shahab Rajaee Mohammad Farahani Open Access Article Abstract Page Full-Text 32 - Economic Modeling of Restricting the cryptocurrency market on ransomware attacks Mehran Garmehi Sarah Rahimi Devin 10.30495/eco.2021.1907003.2406 Open Access Article Abstract Page Full-Text 33 - The strategy of international and regional organizations in facing cyber attacks Tajmohammad Sadeghi Leila raisi Alireza Ansari mahyari Open Access Article Abstract Page Full-Text 34 - Foreign Intervention in the Internal Affairs of Governments through Cyber Operations According to Tallinn Manual 2 Azar Givkey Mohammadreza Hakakzadeh 10.30495/cyberlaw.2022.691988 Open Access Article Abstract Page Full-Text 35 - Investigation of the Ways to Reduce Cyberattacks from the Perspective of the International Humanitarian Law hadi mahmoodi Alireza Ansari mahyari 10.30495/cyberlaw.2022.696600 Open Access Article Abstract Page Full-Text 36 - Possible Responses to Cyber Attacks from the perspective of International Law Azar Givkey 10.30495/cyberlaw.2023.701823 Open Access Article Abstract Page Full-Text 37 - Challenges of Applying the Principles of Armed Conflict to Cyber Attacks Case Study: Observance of the Principle of Prohibition of the Use of Force and the Principle of Distinction in Cyber Attacks Zohre Sadeghi MohammadJavad Arabian 10.30495/cyberlaw.2022.693933 Open Access Article Abstract Page Full-Text 38 - The Scope of the Principle of Non-Use of Force in Cyber Attacks in the Framework of the United Nations Charter Peyman Hakimzade Khoei Reyhane Derogari 10.30495/cyberlaw.2023.701861 Open Access Article Abstract Page Full-Text 39 - Right to “Self-Defense” against Cyber-attacks with an Emphasis on the Attacks of the United States of America Saeid Eid koshayesh Hossein Sorayaii Azar jahangir bagheri 10.30495/cyberlaw.2023.701877 Open Access Article Abstract Page Full-Text 40 - Robust Digital Image Watermarking against Cropping and Salt & Pepper Noise using two-step Sudoku Mohammad Shahab Goli Alireza Nsghsh Open Access Article Abstract Page Full-Text 41 - Reducing the impact of SYN flood attacks by improving the accuracy of the PSO algorithm by adaptive effective filters Mohammad Momeny Sorayya Gharravi Fateme Hourali Open Access Article Abstract Page Full-Text 42 - Combined Intrusion Detection System to deal with Cyber- Attacks in Industrial Control Systems with a Dedicated Network Mohammad Safari Elham Parvinnia Alireza Keshavarz Haddad Open Access Article Abstract Page Full-Text 43 - A Novel Image Watermarking Robustness Improving Algorithm Based on Combination of Wavelet and Singular Value Decomposition Transforms Against Noisy and Compression Attacks Mohsen Ghaemizadeh Hossein Pourghasem Homayoun Mahdavi-Nasab Ahmad Keshavarz Open Access Article Abstract Page Full-Text 44 - Improvement of Networked Control Systems Performance Using a New Encryption Algorithm Seyed Ali Mesbahifard Benyamin Hagh Niaz Jahrimi Pooya Hajebi Seyed Mohammad Taghi Almadrasi Open Access Article Abstract Page Full-Text 45 - SDN-based Defending Against ARP Poisoning Attack Zeynab Sasan Majid Salehi Open Access Article Abstract Page Full-Text 46 - Investigating the Effect of Black Hole Attack on AODV and DSR routing protocols in Wireless Ad Hoc network Iman Zangeneh Sedigheh Navaezadeh Abolfazl Jafari Open Access Article Abstract Page Full-Text 47 - Intrusion Response System for SIP based Applications with Engineered Feature Set Hassan Asgharian Ahmad Akbari Bijan Raahemi Open Access Article Abstract Page Full-Text 48 - Detecting Flooding Attacks on IMS Networks Using Kullback-Leibler Divergence and Triple EWMA Noorallah Hemmati Doust Mansour Nejati Jahromi Open Access Article Abstract Page Full-Text 49 - Detection of Attacks and Anomalies in The Internet of Things System Using Neural Networks Based on Training with PSO and TLBO Algorithms Mohammad Nazarpour Navid Nezafati Sajjad Shokuhyar Open Access Article Abstract Page Full-Text 50 - Cyber attacks and the need to respect the basic principles of humanitarian law in them Azar Givkey Mohammad Ali Kafaeifar Mohammad Taghi Rezaei 10.30495/alr.2021.1872408.1562 Open Access Article Abstract Page Full-Text 51 - Consequences of the policymaker's reaction to speculative attacks in the foreign exchange market: The role of the quality of political institutions Shahram Jafarzadeh Gollo Hossein Abbasinejhad Teymour rahmani Sajjad Barkhordari 10.30495/fed.2023.698845 Open Access Article Abstract Page Full-Text 52 - Trump's Middle East Policy; A Case Study: the Syrian crisis and American missile attack Amir sajedi Open Access Article Abstract Page Full-Text 53 - Comparing Study of Strategies of the EU and U.S. in relation to Combat with Terrorism Ardeshir Sanaie Open Access Article Abstract Page Full-Text 54 - Political Participation of Afghanistan Women in the New Structure of Power in Post 11 September Event Mojtaba Maghsudi Sahere Ghallehdar Open Access Article Abstract Page Full-Text 55 - Armed attack of Saudi Arabia to Yemen according to International Criminal Law Mohammad Javad Heidarian Dolatabadi Rasool Mazaheri Koohestani Open Access Article Abstract Page Full-Text 56 - Predicting systematic banking crisis in selected developed countries by multiple logit method Mohammad Reza Asgarian Saeed Daei Karimzadeh Hossein Sharifi Renani Open Access Article Abstract Page Full-Text 57 - A Mechanism for Detecting and Identifying DoS attack in VANET Keyvan Khajavi Navid Hajhassan Open Access Article Abstract Page Full-Text 58 - The evolution of the concept of self-defence and new terrorism (with an emphasis on cyber terrorism) ehsan sadeghipoor Mahmoud Ganj Bakhsh Kourosh Jafarpour Open Access Article Abstract Page Full-Text 59 - Abutaleb Esfahani, a pioneer in the Epic Verses of Haydari attack Sayyed Mortaza Taheri Barzoki Mohsen Baghmirani Open Access Article Abstract Page Full-Text 60 - The study of fatalism in Shahnameh and religious epics Zahra farajnezhad Farhang Mohmmad Navid Bazargan Open Access Article Abstract Page Full-Text 61 - Legal analysis of the use of force in response to cyber threats in the international arena mohadeseh ghavamipoursereshkeh amirreza mahmoudi ali jamshidipour Open Access Article Abstract Page Full-Text 62 - Improving the performance of phishing attack detection systems based on synergy of neural network and Ali Baba and the forty thieves algorithm reza assareh younes mobasheri 10.71623/joins.2024.1121454 Open Access Article Abstract Page Full-Text 63 - The effect of eight weeks of resistance training in combination with nanoliposome BCAA supplement on the expression of HSP60 and HSP70 genes in mitochondrial cardiomyocytes of heart attack model rats Elham Farhadfar Makan Khajevandi Open Access Article Abstract Page Full-Text 64 - Presenting a method to deal with DDOS attack in multimedia broadband wireless network Mehdi Ghahremani Mohammad mehdi shirmohammadi 10.71623/joins.2024.1126057 Open Access Article Abstract Page Full-Text 65 - Multi-Objective Optimization of Locating the Pollution Detection Sensor in the Urban Water Distribution System Using the Multi-Objective Optimization Algorithm of Coordinated Search hamed mazandarani zadeh matin hendoopor 10.30495/wej.2021.4588 Open Access Article Abstract Page Full-Text 66 - The conflict of cyber attacks with the principle of non-intervention in international law, focusing on the actions of the United States of America Saeid Eid koshayesh Hossein Sorayyai Azar Jahangir Bagheri