List of Articles Attacks Open Access Article Abstract Page Full-Text 1 - HF-Blocker: Detection of Distributed Denial of Service Attacks Based On Botnets Bita Amirshahi Ali Ahangari Open Access Article Abstract Page Full-Text 2 - Comparison of Cognitive - Behavioral Therapy, Desensitization with Eye Movements and Biofeedback on Migraine Attacks, Anxiety Sensitivity, Quality of Sleep and Life Elahe Mehrmanesh fariba hafezi parvin ehteshamzadeh saeed bakhtiarpour 10.30495/jhm.2023.73314.11136 Open Access Article Abstract Page Full-Text 3 - Analyses the land use zoning based on provide passive defense approach (case study: district 11 of Tehran city) حسن حسینی امینی صالح اسدی مهدی برنافر طاها ربانی Open Access Article Abstract Page Full-Text 4 - A Honeypot-assisted Industrial Control System to Detect Replication Attacks on Wireless Sensor Networks Abbasgholi Pashaei Mohammad Esmaeil Akbari Mina Zolfy Lighvan Asghar Charmin 10.30486/mjtd.2022.695925 Open Access Article Abstract Page Full-Text 5 - Adversarial Attacks in a text sentiment Analysis model Sahar Mokarrami Sefidab Seyed Abolghasem Mirroshandel hamidreza Ahmadifar Mahdi Mokarrami Open Access Article Abstract Page Full-Text 6 - The function of regional organizations in cyber wars Tajmohammad Sadeghi Leila raisi Alireza ansari mahyari 10.30495/DPI.1403.928046 Open Access Article Abstract Page Full-Text 7 - Security in the Internet of Things (IoT): A review of the status, challenges and future issues ) Alireza Zamani Open Access Article Abstract Page Full-Text 8 - Proposing an effective approach for Network security and multimedia documents classically using encryption and watermarking Reza Abbasgolizadeh Habib Izadkhah ramin meshkabadi Open Access Article Abstract Page Full-Text 9 - Taxonomy of Threats and Attacks in IoT Maryam Shamsadini Ali Ghaffari 10.22094/jcr.2022.1959116.1271 Open Access Article Abstract Page Full-Text 10 - The strategy of international and regional organizations in facing cyber attacks Tajmohammad Sadeghi Leila raisi Alireza Ansari mahyari Open Access Article Abstract Page Full-Text 11 - Investigation of the Ways to Reduce Cyberattacks from the Perspective of the International Humanitarian Law hadi mahmoodi Alireza Ansari mahyari 10.30495/cyberlaw.2022.696600 Open Access Article Abstract Page Full-Text 12 - Possible Responses to Cyber Attacks from the perspective of International Law Azar Givkey 10.30495/cyberlaw.2023.701823 Open Access Article Abstract Page Full-Text 13 - Challenges of Applying the Principles of Armed Conflict to Cyber Attacks Case Study: Observance of the Principle of Prohibition of the Use of Force and the Principle of Distinction in Cyber Attacks Zohre Sadeghi MohammadJavad Arabian 10.30495/cyberlaw.2022.693933 Open Access Article Abstract Page Full-Text 14 - The Scope of the Principle of Non-Use of Force in Cyber Attacks in the Framework of the United Nations Charter Peyman Hakimzade Khoei Reyhane Derogari 10.30495/cyberlaw.2023.701861 Open Access Article Abstract Page Full-Text 15 - Right to “Self-Defense” against Cyber-attacks with an Emphasis on the Attacks of the United States of America Saeid Eid koshayesh Hossein Sorayaii Azar jahangir bagheri 10.30495/cyberlaw.2023.701877 Open Access Article Abstract Page Full-Text 16 - Reducing the impact of SYN flood attacks by improving the accuracy of the PSO algorithm by adaptive effective filters Mohammad Momeny Sorayya Gharravi Fateme Hourali Open Access Article Abstract Page Full-Text 17 - Combined Intrusion Detection System to deal with Cyber- Attacks in Industrial Control Systems with a Dedicated Network Mohammad Safari Elham Parvinnia Alireza Keshavarz Haddad Open Access Article Abstract Page Full-Text 18 - Intrusion Response System for SIP based Applications with Engineered Feature Set Hassan Asgharian Ahmad Akbari Bijan Raahemi Open Access Article Abstract Page Full-Text 19 - Cyber attacks and the need to respect the basic principles of humanitarian law in them Azar Givkey Mohammad Ali Kafaeifar Mohammad Taghi Rezaei 10.30495/alr.2021.1872408.1562 Open Access Article Abstract Page Full-Text 20 - Consequences of the policymaker's reaction to speculative attacks in the foreign exchange market: The role of the quality of political institutions Shahram Jafarzadeh Gollo Hossein Abbasinejhad Teymour rahmani Sajjad Barkhordari 10.30495/fed.2023.698845 Open Access Article Abstract Page Full-Text 21 - Comparing Study of Strategies of the EU and U.S. in relation to Combat with Terrorism Ardeshir Sanaie Open Access Article Abstract Page Full-Text 22 - A Mechanism for Detecting and Identifying DoS attack in VANET Keyvan Khajavi Navid Hajhassan Open Access Article Abstract Page Full-Text 23 - Improving the performance of phishing attack detection systems based on synergy of neural network and Ali Baba and the forty thieves algorithm reza assareh younes mobasheri 10.71623/joins.2024.1121454 Open Access Article Abstract Page Full-Text 24 - Multi-Objective Optimization of Locating the Pollution Detection Sensor in the Urban Water Distribution System Using the Multi-Objective Optimization Algorithm of Coordinated Search hamed mazandarani zadeh matin hendoopor 10.30495/wej.2021.4588 Open Access Article Abstract Page Full-Text 25 - The conflict of cyber attacks with the principle of non-intervention in international law, focusing on the actions of the United States of America Saeid Eid koshayesh Hossein Sorayyai Azar Jahangir Bagheri