-
Open Access Article
1 - Content rating a nessissity for spam management in social networks
Simin Ghesmati -
Open Access Article
2 - Content rating for spam management in social networks a nessissity
Simin Ghesmati -
Open Access Article
3 - Hardwar Trojan classification and implementation and offer a new detection approach
sadegh hajimohseni -
Open Access Article
4 - A Novel Model for detecting intrusion with Mobile Agent and Game theory
Amin Nezarat mehdi raja Gholamhossein Dastghaibyfard -
Open Access Article
5 - An Approach to Agent- dependent Replicated in Fault-Tolerant Mobile Code Execution
Hodjat Hamidi -
Open Access Article
6 - modified division and replication of data in cloud for optimal performace and security (MDROPS)
hossein hassanpour -
Open Access Article
7 - IT Services Outsourcing Novation tactics and Entrepreneurial Strategies in the Financial Services (Case Study: Private and public banks in Markazi province)
mahtab Eshghiaraghi -
Open Access Article
8 - Classify and implement hardware trojans and provide a new way to detect them
sadegh hajmohseni mohammadali doustari mohammadbagher ghaznavi -
Open Access Article
9 - Presenting a model for using mobile agents in distributed intrusion detection systems based on game theory
امین نظارات مهدی رجا Gholamhossein Dastghaibyfard -
Open Access Article
10 - Assessing the implications of climate change on food security and rural livelihoods Case Study : Rural Farmers in Migan Nehbandan
Javad Mikaniki Morteza Esmailnejad Mohammad Akbarpour Mahmaoud Falsoleyman -
Open Access Article
11 - Study of Defense Climatic Conditions in the Kavir & Desert Region and Makran Coasts by using the Hierarchy Analysis Model(AHP
Alireza Karbalaei ali hanafi Seyed Asaad Hosseini Abbas Alipour -
Open Access Article
12 - Analysis of the Social Pathology Due old Texture Dugonbadan City in Using the Security Approach (Gachsaran Town ship)
Mohammad Hasel nejad Ali Shamsoddini Mohammad Reza Rezaei -
Open Access Article
13 - The explanation of food patterns in rural settlements in Jiroft city With approach Land use planning
ali shahdadi علي آذره -
Open Access Article
14 - Environmental Security Evaluation Using Space Syntax Theory and Place-Check Technique; Case Study: Saraseyb Neighborhood
Mehdi Mirmini Samaneh Jalili Sadrabad -
Open Access Article
15 - Rural migration impact on food security with emphasis on water resources (Case study: villages of Khansar city in Isfahan province)
hamidehsadat aghamiri -
Open Access Article
16 - Geopolitical Analysis of Spatial Planinng View in Afghanistan and Providing Strategic Model
Atiqullah Ghamari Qiuomars Yazdanpanah Dero Zahra Pishgahi fard Hossein Hataminejad -
Open Access Article
17 - Survey of environmental impacts of security policies of Israel (From theory to practice)
hassan kamran -
Open Access Article
18 - The Role of Environmental and Physical in Urban Security
-
Open Access Article
19 - Environmental security and national security in the context of cross-border hydropolitics developments (Case Study: Harirud)
hassan kamran -
Open Access Article
20 - Evaluation of social housing and the effective factors in housing provision for low income classes(a case study :Eslamshahr)
محسن سقایی Ahmad mozeni amir sanaeirad -
Open Access Article
21 - Investigation of environmental factors affecting the occurrence of urban crime (crime of theft) - Case study: District 1 and 7 of Qom-
-
Open Access Article
22 - Investigating the Impact of Defenseless Spaces on Citizen Safety sense (Case Study: Tehran Bazar Neighborhood)
Hossein Farhadikhah Ahmad Pourahmad Seyed Khalil Seyed Alipour -
Open Access Article
23 - Passive defense, the secret of security in the range of of urbans and rurals country (With emphasis on rural and urban architecture)
Nasr Allah Fallah tabar -
Open Access Article
24 - Caspian Sea geopolitical crises emphasizing the geo-economics’ competition between coastal countries and its impact on Iran's national security
-
Open Access Article
25 - The Elements and the Processes Influencing International System
Reza سیمبر ارسلان قربانی شیخنشین -
Open Access Article
26 - Studying the Relationship between Racial Integration (Kurds &Turks) and Stable Security; Recognition of Effective Factors on Integrating the Races in West Azarbayejan
شفیع بهرامیان امید بهرامیان -
Open Access Article
27 - Arabic Revolutions and Shaping New Security Orders In Middle East
فاطمه قیاسوندی نبیالله ابراهیمی Ahmad سلطانینژاد -
Open Access Article
28 - Comparative Study of Hobbes, Locke and Rawls' Ideas in the light of the Hypothetical Position of the Social Contract
mokhtar nouri Majid tavasoli -
Open Access Article
29 - Relation of Bio-Politics to Global Discourses; Liberalism, Totalitarianism, and Security
Fateh Moradi Abasali Rahbar -
Open Access Article
30 - An access control model for online social networks using user-to-user relationships
Mohamad Javad Piran mahmud deypir -
Open Access Article
31 - Proposing a New Framework to Decreasing Delay in the Internet of Things by Using Computing Power of Fog
Mohammad Taghi Shaykhan kianoosh azadi -
Open Access Article
32 - Analyzing the Capacity of Islamic Ethics in the Protest Movement of the Palestinian Jihadists on the Israeli National Security Doctrine
-
Open Access Article
33 - Security Policy Analysis in the Light of Human Rights
Eslam Mondani Mohammad Ashouri -
Open Access Article
34 - A moral look at chapteristic sanctions regarding the legal implications of this, Bernslett II Human Rights
حسین اخوان Seyyed Bagher Mirabassi Abo-Mohammad Asgarkhani -
Open Access Article
35 - The Importance and Position of Principal Organs of United Nations Organization in the Framework of United Nations Charter
Saeedeh Golkar Seyyed Mohammad Hashemi -
Open Access Article
36 - A moral and legal look at the nuclear risks to global peace and security
Ali Bagheri Mahmud Abadi Amir Maghami Alireza Arashpour -
Open Access Article
37 - Indicators of Mahdavi's rule of peace and security
Ehsan Samani -
Open Access Article
38 - Membership in social network son the level of identification and social security adolescents
Abbas Ali Shahidi -
Open Access Article
39 - Tawhid in the view points of Salafi Jihadi and studying it's consequences
abbasali farzandi -
Open Access Article
40 - Information Security Maturity Assessment Model in the IT Departments of the Oil Industry Subsidiaries in Iran
Reza Radfar Fatemeh akhavan -
Open Access Article
41 - Dynamic Model for Evaluating Information Systems Security by System Dynamics Modeling
Mohsen Shafiei Nikabadi Amir Hakaki Sara Gholamshahi -
Open Access Article
42 - Iran's penal policy towards providing security for children in cyberspace
Seyed Abbas Khalilpour Chalkiasari -
Open Access Article
43 - Structural Modeling Relationship between Social Security and Happiness with the Mediating Role of Psychological Capital: Case Study of Ahvaz City
yaser garavand ali anbari asgar Atashafrooz -
Open Access Article
44 - A Causal Explanation of Social Safeness Based on Neuroticism: The mediating Role of Basic Psychological Needs Satisfaction and Frustration
Hamid Barani Mohsen Arbezi Mahboubeh Fouladchang -
Open Access Article
45 - Anthropological Principles of Hobbes and Spinoza on Government (A Historical Overview)
Bayan Karimy Seyyed Mustafa Shahraeini -
Open Access Article
46 - Model Designing of Total Softpower Policy the Islamic Republic of Iran
Mohammad Taqi Amini Mohammad MahmoodiMeymand MohamadMehdi Parhizgar محمد رضا مشایخ -
Open Access Article
47 - Developing Indicators for assessing The Status of Iran’s Natural Gas Export Using Energy Demand Security Approach
Hadi Sahebi pourya souri -
Open Access Article
48 - ارائه الگوی راهبردی توسعه امنیت ساختمانها در برابر زلزله
Soheila Bourghani Farahani -
Open Access Article
49 - Examining solutions to deal with the shortage of cyberspace security experts in the country
Mohammad fathian Mehdi Abolhamid mohammadreza rafeei -
Open Access Article
50 - طراحی مجدد شبکه و برنامه¬ریزی زنجیره تأمین محصولات غذایی با لحاظ کردن امنیت غذایی و جریان¬های مالی
mir saman pishvaee -
Open Access Article
51 - Investigation the role of personality and individual differences on password security breaches: An Empirical Study
زهرا کریمی manije kaveh rezvan salehi milad moltaji -
Open Access Article
52 - Nastaliq CAPTCHA
M. H. Shirali-Shahreza Mohammad Shirali-Shahreza -
Open Access Article
53 - The Effects of SIP Register Flood Attack and Detection by Using Kullback–Leibler Distance
S. R. Chogan M. Fathy M. Ramezani -
Open Access Article
54 - Simultaneous Implementation of Time of Use Demand Response and Security Constraint Unit Commitment
M. Kia M. Setayesh-Nazar S. M. Sepasian -
Open Access Article
55 - Evaluation of Performance, Reliability and Security for Share-Data, Object-Oriented and Pipe and Filter Styles
H. Banki H. Banki -
Open Access Article
56 - A Hybrid Access Control Model for CIM-Based SCADA System
P. Mahmoudi Nasr A. Yazdian Varjani -
Open Access Article
57 - Identifying Primary User Emulation Attacks in Cognitive Radio Network Based on Bayesian Nonparametric Bayesian
K. Akbari J. Abouei -
Open Access Article
58 - Economic Load Dispatch in Power Plants, Taking into Account Environmental Pollutants and System Security Indices Using Multi-Objective Harmony Search Algorithm
H. Sharifi محمود اوکاتی صادق -
Open Access Article
59 - An On-Chip Detection Mechanism to Detect Scan-Based Attack in Crypto-Chips
F. Jamali Zavareh H. Beitollahi -
Open Access Article
60 - Coordinated Expansion Planning of Gas and Electricity Networks Considering N-1 Security Criterion
V. Khaligh M. Oloomi Buygi -
Open Access Article
61 - Energy Efficiency in Secrecy Multi-Antenna Two-Way Relay Networks
F. B. soroush akhlaghi -
Open Access Article
62 - A Patient Identification and Authentication Protocol to Increase Security
Afsaneh Sharafi Sepideh Adabi Ali Movaghar Salah Al-Majed -
Open Access Article
63 - Validation of the Cultural Security Model in Knowledge-Based Sustainable Development
Saeide Zare ramezan jahanian mahtab salimi -
Open Access Article
64 - Identification of Organizational Capital and Its Evaluation in Covid-19 Conditions
hajieh rajabi farjad -
Open Access Article
65 - Social justice and its role in social security from the perspective of the Qur'an and Islamic traditions
Mohsen Ghafoury pour seed hamid shamerizi Kamal Khajehpour -
Open Access Article
66 - Maintaining Confidentiality and Integrity of Data and Preventing Unauthorized Access to DICOM Medical Images
Mohammad Soltani Hassan Shakeri Mahboobeh Houshmand -
Open Access Article
67 - Relationship between Permeability and the Presence of Women in Residential Towns (Case Study: Hezar Dastgah and Dowlatabad Residential Towns, Tehran)
Fatemeh Khodadadi Agh Ghal’e Ali Asgari -
Open Access Article
68 - Secure Computing on the Internet of Everything
Seyed Omid Azarkasb Seyed Hossein Khasteh -
Open Access Article
69 - SQ-PUF: A Resistant PUF-Based Authentication Protocol against Machine-Learning Attack
Abolfazl Sajadi Bijan Alizadeh -
Open Access Article
70 - Improve security in cloud computing infrastructure using block chain protocol
Mohsen Gerami Vahid Yazdanian Siavash Naebasl -
Open Access Article
71 - بررسی احساس امنیت گردشگران مذهبی در اماکن فراغتی (مورد مطالعه : شهر مشهد)
-
Open Access Article
72 - Exploring the Effect of Perceived Forgiveness Climate on Female Practitioners of Tourism Industry
Fariborz Rahimnia Farshad Ghaderi -
Open Access Article
73 - A Cyber Security Maturity Model for Critical Infrastructures with a Comparative Study Approach
Mohamad Akhtari mohammadali keramati seyed abdolah amin mousavi -
Open Access Article
74 - Designing a food security management model in Iran
Reza Eskandari Mehraban Hadi Peykani akbar etebarian -
Open Access Article
75 - A New Parallel Method to Verify the Packets Forwarding in SDN Networks
Rozbeh Beglari Hakem Beitollahi -
Open Access Article
76 - Multilateral Export Control Regimes: a Legal Mechanism or Tool of Political Pressure?
غلامحسین دهقانی فاطمه هاشمی -
Open Access Article
77 - The Role of International Organizations in the Realization of the Right to Food
Farhad Talaie علی رزمخواه -
Open Access Article
78 - Comparative Study of UNSC’s Performance vis-à-vis Developments in Libya, Yemen and Bahrain (2011-12) from Viewpoint of International Law
رضا موسیزاده رضا رنجبر -
Open Access Article
79 - Iran's Energy Geopolitics and EU’s Approach
سیدشمسالدین صادقی -
Open Access Article
80 - Necessity and Possibility of Judicial Supervision over Security Council’s Performance in UN Legal System
حسین شریفی طرازکوهی ساسان مدرس سبزواری -
Open Access Article
81 - Challenges Facing Security and Defense Policies of EU and US
سعید خالوزاده -
Open Access Article
82 - Impact of Cooperation and Competition of Shanghai’s Members on its Goals and Performance: 2001- 2013
reza simbar مهدی هدایتی شهیدانی -
Open Access Article
83 - ANZUS Treaty: Past and Future
Nasrin Mosaffa Ahmad Heidarbeigi -
Open Access Article
84 - The Necessity of Power Sharing in the Security Council: A Pluralistic Model
Enayatollah Yazadani Enayatollah Yazadani -
Open Access Article
85 - The Legitimacy of State’s Evaluation in Implementation of United Nations Security Council
Malihe Behfar Hassan Savari -
Open Access Article
86 - Primacy in Relation Between the International Court of Justice and UN Security Council
همایون مافی وحید بذّار -
Open Access Article
87 - A New Structure for UN Security Council; The Need of Hegemony of Power
Siamak Soltani Saleh Rezaie Pishrobat -
Open Access Article
88 - EU’s Common Foreign and Security Policy: Challenges and Obstacles
Yasser Nooralivand Mohammad Reza Majidi -
Open Access Article
89 - Hidden Veto and Its Impact on Decision-Making Process in the Security Council
رضا موسیزاده Arsalan Jamshidi -
Open Access Article
90 - The Status of OIC Member States in the Main Organs of the United Nations
ستار عزیزی -
Open Access Article
91 - An Analysis of the Political-Security Integration of the European Union within the Framework of Realist Approaches
Seyed Davood Aghaee Yasser Nooralivand Ebrahim Bagheri -
Open Access Article
92 - Prerequisites for the Introduction of Regional Arrangements to Maintain International Peace and Security
علی احدی کرنق Mehdi Hadadi -
Open Access Article
93 - Change in Environmental Security in the Post-Cold War International Law
Seyed Abdolali ghavam Seyedeh Massoumeh Mostafavi -
Open Access Article
94 - Advance on the European Common Foreign and Security Policy, from Kosovo to Ukraine
Yousef Molaei Issa Adeli -
Open Access Article
95 - Feasibility Analysis of Formation of Arabian military coalition in Persian Gulf; with Emphasis on Geopolitical Backgrounds
Reza Rahimi Kiumars YazdanpanahRahimi -
Open Access Article
96 - The place of UN Security Council sanctions resolutions in the US sanctions strategy (2018-2020)
Mahdi Pakzat Saeed Daghineh -
Open Access Article
97 - COVID-19 and United Nations Peacekeeping Forces: New Challenges piled on Old Constraints
Nasrin Mosaffa -
Open Access Article
98 - The place of UN Security Council sanctions resolutions in the US sanctions strategy (2018-2020)
Mahdi Pakzat Saeed Daghineh -
Open Access Article
99 - COVID-19 and United Nations Peacekeeping Forces: New Challenges piled on Old Constraints
Nasrin Mosaffa -
Open Access Article
100 - The Legitimacy of State’s Evaluation in Implementation of United Nations Security Council
Malihe Behfar Hassan Savari -
Open Access Article
101 - Primacy in Relation Between the International Court of Justice and UN Security Council
همایون مافی وحید بذّار -
Open Access Article
102 - A New Structure for UN Security Council; The Need of Hegemony of Power
Siamak Soltani Saleh Rezaie Pishrobat -
Open Access Article
103 - EU’s Common Foreign and Security Policy: Challenges and Obstacles
Mohammad Reza Majidi Yasser Nooralivand -
Open Access Article
104 - China's Foreign Policy and the Evolution of its Security Council Voting Behavior
Hamid salehi Emad Aslani Minareh Bazaari -
Open Access Article
105 - The Role of the UN Security Council in Adopting Resolutions Against ISIS
ehsan jafari far Reza nasirihamed -
Open Access Article
106 - Human Security and Human Rights; Distinctions and Overlapping Areas
Naser khorshidi sarem shiravand -
Open Access Article
107 - Assessing the Role of South and Southeast Asian Regional Organizations in Confronting Maritime Terrorism: Case Study of SAARC, BIMSTEC & ASEAN
Farhad Talaie Maral Javidbakht -
Open Access Article
108 - Social welfare and its relationship with social capital and sense of security
milad abdi -
Open Access Article
109 - computer security models and proposing a new perspective: A review paper
Hadi sadjadi Reza Kalantari -
Open Access Article
110 - Machine Learning-Based Security Resource Allocation for Defending against Attacks in the Internet of Things
Nasim Navaei Vesal Hakami -
Open Access Article
111 - Designing a Secure Consensus Algorithm for Use in Blockchain
Hosein Badri Masumeh Safkhani -
Open Access Article
112 - Identifying the Key Drivers of Digital Signature Implementation in Iran (using fuzzy Delphi method)
Ghorbanali Mehrabani Fatemeh Zargaran khouzani -
Open Access Article
113 - Designing Model of Food Security Management in Iran
Reza Eskandari Mehraban Hadi Peykani akbar etebarian -
Open Access Article
114 - Investigating the impact of climate change on the environment and agriculture
Bahareh Rafiei Hamed Kioumarsi Reza Naseri Harsini Seyed Mohammad Reza Mahdavian -
Open Access Article
115 - Analysis of Ethical Principles of Disciplinary and Educational Responses to Juvenile Delinquency from the Perspective of Islamic Criminal Law
roh allah ebrahimi mohamad ali haji deh abadi ALIREZA HOSSINI -
Open Access Article
116 - The effects of the emergence of security-oriented criminalization in crimes against security in Iranian criminal law
Hossein Rezaei Todeshki Seyyed Mahmoud Majidi mohammad javad baghi zadeh -
Open Access Article
117 - Government’s role in human’s security and its impact on people’s happiness
Behnaz Yousefi Hossein Rahmatollahi -
Open Access Article
118 - A Novel Approach based on Chaotic Mapping for Implementing Security Phases on Cloud Computing
Azita Rezaei Ali Broumandnia Seyed Javad Mirabedini -
Open Access Article
119 - Explaining the discourse of thoughts, opinions and statements of Imam Khamenei regarding the role of food security in the resistance economy
Mohammad Bidgoli asghar Rajabi Deh Borzoei -
Open Access Article
120 - Explaining the principles of "social security" in Nahj al-Balaghah and its realization in society with a neglect approach
alinaghi lezgi alireza akbar zadeh Mohammad karaminia reza ojagh -
Open Access Article
121 - Investigation and effects of regional developments on the security of Iran and Turkey borders
Mahdi Najafi Jalil nayebian Parviz Ahadei Mohammad Yousefi Joybari -
Open Access Article
122 - Optimal Power Allocation for Maximizing Secrecy Rate in Physical Layer Security Using Frequency Diverse Array Directional Modulation and Artificial Noise
Mahdi Tayyeb Massoud Hossein Khaleghi -
Open Access Article
123 - Investigating the Factors Affecting the Public Participation of Users and the Survivability of Spaces in Urban Parks to Improve the Level of Children's Safety (a Case Study of Shafaq Park in Tehran)
Saeed Azemati Kimia Jamshidzadeh -
Open Access Article
124 - Human dignity and weapons of mass destruction
Mohosen Reza Mosaddegh,khah Morteza Bayat Hasan Soleimani -
Open Access Article
125 - A comparative study of the concept of home among children of two cities (Shiraz and Noujin)
Fahimeh Abbasi Tahereh Nasr Keivan Mohamadpur -
Open Access Article
126 - The role of food security in a resistance economy with emphasis on the thoughts, opinions and statements of the Supreme Leader Mohammad Bidgoli
Mohammad Bidgoli asghar Rajabi Deh Borzoei -
Open Access Article
127 - Identifying the Key Drivers of Digital Signature Implementation in Iran (Using Fuzzy Delphi Method)
Ghorbanali Mehrabani Fatemeh Zargaran khouzani -
Open Access Article
128 - Investigation and effects of regional developments on the security of Iran and Turkey borders
Mahdi Najafi Jalil nayebian Parviz Ahadei