• About Us
  • Services
    • List of Authors
    • For Authors
    • Editor-in-Chief
    • For Editor-in-Chief
    • reviewer
    • For Reviewers
  • List of Journals
  • Order
  • Contact Us
  • Home
  • About Us
  • Contact Us
  • Register
  • Log in
  • Order
Advanced
  • Home
  • attack
    • List of Articles attack

      • Open Access Article
        • Abstract Page
        • Full-Text

        1 - Timår's Invasion to Syria (803/1400-1): Backgrounds and Causes
        Shahrbanou Nazariyan Masoumali Panjeh Hadi Alemzadeh
        10.30495/jhcin.2023.22797
      • Open Access Article
        • Abstract Page
        • Full-Text

        2 - HF-Blocker: Detection of Distributed Denial of Service Attacks Based On Botnets
        Bita Amirshahi Ali Ahangari
      • Open Access Article
        • Abstract Page
        • Full-Text

        3 - IMNTV-Identifying Malicious Nodes using Trust Value in Wireless Sensor Networks
        Swathi B H Megha V Gururaj H L Hamsaveni M Janhavi V
      • Open Access Article
        • Abstract Page
        • Full-Text

        4 - Secure Bio-Cryptographic Authentication System for Cardless Automated Teller Machines
        Olayemi Olaniyi Ameh Ameh Lukman Ajao Omolara Lawal
      • Open Access Article
        • Abstract Page
        • Full-Text

        5 - Improving the security of wireless sensor networks using Game Theory
        Behzad Seif mohammad goodarzi
      • Open Access Article
        • Abstract Page
        • Full-Text

        6 - Development of the concept of self-defence in line with national interests against modern terrorism from the perspective of international law
        ehsan sadeghipoor Mahmoud Ganj Bakhsh Kourosh Jafarpour
        10.30495/jlap.2023.74582.1734
      • Open Access Article
        • Abstract Page
        • Full-Text

        7 - Comparison of Cognitive - Behavioral Therapy, Desensitization with Eye Movements and Biofeedback on Migraine Attacks, Anxiety Sensitivity, Quality of Sleep and Life
        Elahe Mehrmanesh fariba hafezi parvin ehteshamzadeh saeed bakhtiarpour
        10.30495/jhm.2023.73314.11136
      • Open Access Article
        • Abstract Page
        • Full-Text

        8 - Analyses the land use zoning based on provide passive defense approach (case study: district 11 of Tehran city)
        حسن حسینی امینی صالح اسدی مهدی برنافر طاها ربانی
      • Open Access Article
        • Abstract Page
        • Full-Text

        9 - Investigating the method of intelligent defense mechanism against DDOS attacks of IOT
        پریسا دانشجو reza ghaffari dizaji
        10.71623/joins.2024.846327
      • Open Access Article
        • Abstract Page
        • Full-Text

        10 - The Principle of Resorting to Force in International Relations
        Abbas   Foladi Maryam Moradi Mohsen   Dianat
      • Open Access Article
        • Abstract Page
        • Full-Text

        11 - an approach to detect DDoS attacks in the cloud computing environment using entropy and particle swarm optimization
        mehdi asayeshjoo Mehdi sadeghzadeh maziyar ganjoo
      • Open Access Article
        • Abstract Page
        • Full-Text

        12 - Detection of DDoS Attacks in SDN Switches with Deep Learning and Swarm Intelligence Approach
        Mohsen Eghbali Mohammadreza Mollkhalili Maybodi
        10.30495/jce.2023.1998267.1233
      • Open Access Article
        • Abstract Page
        • Full-Text

        13 - Distributed Denial of Service Attacks Detection in Internet of Things Using the Majority Voting Approach
        Habibollah Mazarei Marziye Dadvar MohammadHadi Atabakzadeh
        10.30495/jce.2023.1984927.1201
      • Open Access Article
        • Abstract Page
        • Full-Text

        14 - A Comparison between the effect of Acceptance and Commitment (ACT) individual and group Therapy on Panic Attack & Agoraphobia
        Peyman Dousti Golnaz Ghodrati Mohammad Esmaeil Ebrahimi
        10.30486/jsrp.2019.575274.1489
      • Open Access Article
        • Abstract Page
        • Full-Text

        15 - Analysis and Evaluation of Increasing the Throughput of Processors by Eliminating the Lobe’s Disorder
        Saeed Talati Seyed Morteza Ghazali MohammadReza Hassani Ahangar Seyed Mohammad Alavi
        10.52547/mjtd.10.3.119
      • Open Access Article
        • Abstract Page
        • Full-Text

        16 - Analysis and Investigation of Disturbance in Radar Systems Using New Techniques of Electronic Attack
        Pouria Etezadifar Saeed Talati
        10.52547/mjtd.10.2.55
      • Open Access Article
        • Abstract Page
        • Full-Text

        17 - A Honeypot-assisted Industrial Control System to Detect Replication Attacks on Wireless Sensor Networks
        Abbasgholi Pashaei Mohammad Esmaeil Akbari Mina Zolfy Lighvan Asghar Charmin
        10.30486/mjtd.2022.695925
      • Open Access Article
        • Abstract Page
        • Full-Text

        18 - Adversarial Attacks in a text sentiment Analysis model
        Sahar Mokarrami Sefidab Seyed Abolghasem Mirroshandel hamidreza Ahmadifar Mahdi Mokarrami
      • Open Access Article
        • Abstract Page
        • Full-Text

        19 - Using the Modified Colonial Competition Algorithm to Increase the Speed and Accuracy of the Intelligent Intrusion Detection System
        Mohammad Nazarpour Navid Nezafati Sajjad Shokouhyar
        10.71856/impcs.2023.903591
      • Open Access Article
        • Abstract Page
        • Full-Text

        20 - Sampled-Data Flocking of Multi-Agent Systems Under the Cyber-Attack Problem
        سحر یزدانی
        10.71856/impcs.2024.903618
      • Open Access Article
        • Abstract Page
        • Full-Text

        21 - The function of regional organizations in cyber wars
        Tajmohammad Sadeghi Leila raisi Alireza ansari mahyari
        10.30495/DPI.1403.928046
      • Open Access Article
        • Abstract Page
        • Full-Text

        22 - Security in the Internet of Things (IoT): A review of the status, challenges and future issues )
        Alireza Zamani
      • Open Access Article
        • Abstract Page
        • Full-Text

        23 - Investigation of the Hydrodynamic Analysis of a Ballistic Body Using Simulator Software
        مقومی مقومی علی کاهید باصری
      • Open Access Article
        • Abstract Page
        • Full-Text

        24 - Proposing an effective approach for Network security and multimedia documents classically using encryption and watermarking
        Reza Abbasgolizadeh Habib Izadkhah ramin meshkabadi
      • Open Access Article
        • Abstract Page
        • Full-Text

        25 - political issues of sammanid collaps in iran history
        javad horavi
      • Open Access Article
        • Abstract Page
        • Full-Text

        26 - The study of Mahmood Afghan attack to Kohkiloyeh & Behbahan to Badaye Akhbar manuscript
        reza shabani jamshid ghayemi
      • Open Access Article
        • Abstract Page
        • Full-Text

        27 - The relationship between economy and pohicy in to Jhataids Olos
        hashem sedgh amiz
      • Open Access Article
        • Abstract Page
        • Full-Text

        28 - Taxonomy of Threats and Attacks in IoT
        Maryam Shamsadini Ali Ghaffari
        10.22094/jcr.2022.1959116.1271
      • Open Access Article
        • Abstract Page
        • Full-Text

        29 - Fuzzy Clustering Algorithm to Identify Sybil Attacks in Vehicular ad Hoc Networks
        Mahdi Maleknasab Ardekani Mohammad Tabarzad Mohammad Amin Shayegan
        10.22094/jcr.2023.1979689.1295
      • Open Access Article
        • Abstract Page
        • Full-Text

        30 - A New Intrusion Detection System to deal with Black Hole Attacks in Mobile Ad Hoc Networks
        Maryam Fathi Ahmadsaraei Abolfazl Toroghi Haghighat
      • Open Access Article
        • Abstract Page
        • Full-Text

        31 - A Survey of Solutions to Protect Against All Types of Attacks in Mobile Ad Hoc Networks
        Maryam Fathi Ahmadsaraei Abolfazl Toroghi Haghighat
      • Open Access Article
        • Abstract Page
        • Full-Text

        32 - Turning P2P Networks into DDoS Engines: A Survey
        Hamid Farhadi Behzad Akbari Shahab Rajaee Mohammad Farahani
      • Open Access Article
        • Abstract Page
        • Full-Text

        33 - Economic Modeling of Restricting the cryptocurrency market on ransomware attacks
        Mehran Garmehi Sarah Rahimi Devin
        10.30495/eco.2021.1907003.2406
      • Open Access Article
        • Abstract Page
        • Full-Text

        34 - The strategy of international and regional organizations in facing cyber attacks
        Tajmohammad Sadeghi Leila raisi Alireza Ansari mahyari
        10.71488/cyberlaw.2024.997403
      • Open Access Article
        • Abstract Page
        • Full-Text

        35 - Foreign Intervention in the Internal Affairs of Governments through Cyber Operations According to Tallinn Manual 2
        Azar Givkey Mohammadreza Hakakzadeh
        10.30495/cyberlaw.2022.691988
      • Open Access Article
        • Abstract Page
        • Full-Text

        36 - Investigation of the Ways to Reduce Cyberattacks from the Perspective of the International Humanitarian Law
        hadi mahmoodi Alireza Ansari mahyari
        10.30495/cyberlaw.2022.696600
      • Open Access Article
        • Abstract Page
        • Full-Text

        37 - Possible Responses to Cyber Attacks from the perspective of International Law
        Azar Givkey
        10.30495/cyberlaw.2023.701823
      • Open Access Article
        • Abstract Page
        • Full-Text

        38 - Challenges of Applying the Principles of Armed Conflict to Cyber Attacks Case Study: Observance of the Principle of Prohibition of the Use of Force and the Principle of Distinction in Cyber Attacks
        Zohre Sadeghi MohammadJavad Arabian
        10.30495/cyberlaw.2022.693933
      • Open Access Article
        • Abstract Page
        • Full-Text

        39 - The Scope of the Principle of Non-Use of Force in Cyber Attacks in the Framework of the United Nations Charter
        Peyman Hakimzade Khoei Reyhane Derogari
        10.30495/cyberlaw.2023.701861
      • Open Access Article
        • Abstract Page
        • Full-Text

        40 - Right to “Self-Defense” against Cyber-attacks with an Emphasis on the Attacks of the United States of America
        Saeid Eid koshayesh Hossein Sorayaii Azar jahangir bagheri
        10.30495/cyberlaw.2023.701877
      • Open Access Article
        • Abstract Page
        • Full-Text

        41 - Robust Digital Image Watermarking against Cropping and Salt & Pepper Noise using two-step Sudoku
        Mohammad Shahab Goli Alireza Nsghsh
      • Open Access Article
        • Abstract Page
        • Full-Text

        42 - Reducing the impact of SYN flood attacks by improving the accuracy of the PSO algorithm by adaptive effective filters
        Mohammad Momeny Sorayya Gharravi Fateme Hourali
      • Open Access Article
        • Abstract Page
        • Full-Text

        43 - Combined Intrusion Detection System to deal with Cyber- Attacks in Industrial Control Systems with a Dedicated Network
        Mohammad Safari Elham Parvinnia Alireza Keshavarz Haddad
      • Open Access Article
        • Abstract Page
        • Full-Text

        44 - A Novel Image Watermarking Robustness Improving Algorithm Based on Combination of Wavelet and Singular Value Decomposition Transforms Against Noisy and Compression Attacks
        Mohsen Ghaemizadeh Hossein Pourghasem Homayoun Mahdavi-Nasab Ahmad Keshavarz
      • Open Access Article
        • Abstract Page
        • Full-Text

        45 - Improvement of Networked Control Systems Performance Using a New Encryption Algorithm
        Seyed Ali Mesbahifard Benyamin Hagh Niaz Jahrimi Pooya Hajebi Seyed Mohammad Taghi Almadrasi
      • Open Access Article
        • Abstract Page
        • Full-Text

        46 - SDN-based Defending Against ARP Poisoning Attack
        Zeynab Sasan Majid Salehi
      • Open Access Article
        • Abstract Page
        • Full-Text

        47 - Investigating the Effect of Black Hole Attack on AODV and DSR routing protocols in Wireless Ad Hoc network
        Iman Zangeneh Sedigheh Navaezadeh Abolfazl Jafari
      • Open Access Article
        • Abstract Page
        • Full-Text

        48 - Intrusion Response System for SIP based Applications with Engineered Feature Set
        Hassan Asgharian Ahmad Akbari Bijan Raahemi
      • Open Access Article
        • Abstract Page
        • Full-Text

        49 - Detecting Flooding Attacks on IMS Networks Using Kullback-Leibler Divergence and Triple EWMA
        Noorallah Hemmati Doust Mansour Nejati Jahromi
      • Open Access Article
        • Abstract Page
        • Full-Text

        50 - Detection of Attacks and Anomalies in The Internet of Things System Using Neural Networks Based on Training with PSO and TLBO Algorithms
        Mohammad Nazarpour Navid Nezafati Sajjad Shokuhyar
      • Open Access Article
        • Abstract Page
        • Full-Text

        51 - Cyber attacks and the need to respect the basic principles of humanitarian law in them
        Azar Givkey Mohammad Ali Kafaeifar Mohammad Taghi Rezaei
        10.30495/alr.2021.1872408.1562
      • Open Access Article
        • Abstract Page
        • Full-Text

        52 - Consequences of the policymaker's reaction to speculative attacks in the foreign exchange market: The role of the quality of political institutions
        Shahram Jafarzadeh Gollo Hossein Abbasinejhad Teymour rahmani Sajjad Barkhordari
        10.30495/fed.2023.698845
      • Open Access Article
        • Abstract Page
        • Full-Text

        53 - Trump's Middle East Policy; A Case Study: the Syrian crisis and American missile attack
        Amir sajedi
      • Open Access Article
        • Abstract Page
        • Full-Text

        54 - Comparing Study of Strategies of the EU and U.S. in relation to Combat with Terrorism
        Ardeshir Sanaie
      • Open Access Article
        • Abstract Page
        • Full-Text

        55 - Political Participation of Afghanistan Women in the New Structure of Power in Post 11 September Event
        Mojtaba Maghsudi Sahere Ghallehdar
      • Open Access Article
        • Abstract Page
        • Full-Text

        56 - Armed attack of Saudi Arabia to Yemen according to International Criminal Law
        Mohammad Javad Heidarian Dolatabadi Rasool Mazaheri Koohestani
      • Open Access Article
        • Abstract Page
        • Full-Text

        57 - Predicting systematic banking crisis in selected developed countries by multiple logit method
        Mohammad Reza Asgarian Saeed Daei Karimzadeh Hossein Sharifi Renani
      • Open Access Article
        • Abstract Page
        • Full-Text

        58 - A Mechanism for Detecting and Identifying DoS attack in VANET
        Keyvan Khajavi Navid Hajhassan
      • Open Access Article
        • Abstract Page
        • Full-Text

        59 - The evolution of the concept of self-defence and new terrorism (with an emphasis on cyber terrorism)
        ehsan sadeghipoor Mahmoud Ganj Bakhsh Kourosh Jafarpour
      • Open Access Article
        • Abstract Page
        • Full-Text

        60 - Presenting an Attack-Resistant Communication Model for Secure Routing in Underwater Sensor Networks
        Tayebeh Nourali Ahari Mehdi Sadeghzadeh
        10.30495/jce.2025.1993480.1336
      • Open Access Article
        • Abstract Page
        • Full-Text

        61 - Abutaleb Esfahani, a pioneer in the Epic Verses of Haydari attack
        Sayyed Mortaza Taheri Barzoki Mohsen Baghmirani
      • Open Access Article
        • Abstract Page
        • Full-Text

        62 - The study of fatalism in Shahnameh and religious epics
        Zahra farajnezhad Farhang Mohmmad Navid Bazargan
      • Open Access Article
        • Abstract Page
        • Full-Text

        63 - Legal analysis of the use of force in response to cyber threats in the international arena
        mohadeseh ghavamipoursereshkeh amirreza mahmoudi ali jamshidipour
      • Open Access Article
        • Abstract Page
        • Full-Text

        64 - Improving the performance of phishing attack detection systems based on synergy of neural network and Ali Baba and the forty thieves algorithm
        reza assareh younes mobasheri
        10.71623/joins.2024.1121454
      • Open Access Article
        • Abstract Page
        • Full-Text

        65 - The effect of eight weeks of resistance training in combination with nanoliposome BCAA supplement on the expression of HSP60 and HSP70 genes in mitochondrial cardiomyocytes of heart attack model rats
        Elham Farhadfar Makan Khajevandi
        https://doi.org/10.82586/jpmh.2024.1121955
      • Open Access Article
        • Abstract Page
        • Full-Text

        66 - Evaluating the Harris ,BRISK and SURF Feature Points in Watermarking Based on Histogram and Knapsack Problem
        Ali Amiri Sattar Mirzakuchaki
        10.71/jcr.2025.1123169
      • Open Access Article
        • Abstract Page
        • Full-Text

        67 - Improved hybrid algorithm for detection of intrusion into computer networks
        Safanaz Heidari Firozeh Razavi
        10.82195/ntds.2025.1123245
      • Open Access Article
        • Abstract Page
        • Full-Text

        68 - Novel Study of the Effect of Spexin Hormone on Heart Attack Disease
        Assim Yousif  Al- Farag Zena A.M.  AL-Jawadi
        10.60829/JCHR.2025.1123846
      • Open Access Article
        • Abstract Page
        • Full-Text

        69 - Presenting a method to deal with DDOS attack in multimedia broadband wireless network
        Mehdi Ghahremani Mohammad mehdi shirmohammadi
        10.71623/joins.2024.1126057
      • Open Access Article
        • Abstract Page
        • Full-Text

        70 - Side channel attack detection based on improved support vector machine
        Daniel Jafari علیرضا موحدیان
        10.71623/joins.2025.1143603
      • Open Access Article
        • Abstract Page
        • Full-Text

        71 - Multi-Objective Optimization of Locating the Pollution Detection Sensor in the Urban Water Distribution System Using the Multi-Objective Optimization Algorithm of Coordinated Search
        hamed mazandarani zadeh matin hendoopor
        10.30495/wej.2021.4588
      • Open Access Article
        • Abstract Page
        • Full-Text

        72 - The conflict of cyber attacks with the principle of non-intervention in international law, focusing on the actions of the United States of America
        Saeid Eid koshayesh Hossein Sorayyai Azar Jahangir Bagheri
      • Open Access Article
        • Abstract Page
        • Full-Text

        73 - Challenges and solutions to identify and prevent SYN attacks in the Internet of Things
        Vesal ّFiroozi Hassan Shakeri Hassan Raei Sani
        10.82195/ntds.2025.1190576
      • Open Access Article
        • Abstract Page
        • Full-Text

        74 - Intrusion Detection Using Deep Learning in Wireless Body Area Networks
        Elham Hajian Navid Asadi
        10.71856/impcs.2024.1195000
      • Open Access Article
        • Abstract Page
        • Full-Text

        75 - Legitimacy of the Use of Force in Self-Defense Against Non-State Actors and Its Impact on the Rights of the Host State
        safiye koohi peyman Bloori Malek Zolghadr
      • Open Access Article
        • Abstract Page
        • Full-Text

        76 - Cyber attacks of the Mojahedin Khalq Organization and the International Law on the Use of Force (with an emphasis on Albania's international responsibility)
        ehsan sadeghipoor Mahmoud Ganj Bakhsh Kourosh Jafarpour
        10.71488/cyberlaw.2025.1209302
      • Open Access Article
        • Abstract Page
        • Full-Text

        77 - Detecting Destructive Nodes with the Aim of Reducing Black Hole Attack Using Response Time Based on Machine Learning Model in Mobile Case Networks
        Fatimah Jasim Mohammed Azam Andalib Hossein Azgomi Seyed Ali Sharifi
        10.71856/IMPCS.2025.1210713
      • Open Access Article
        • Abstract Page
        • Full-Text

        78 - DART-Net: A Dual-Path Transformer Architecture Robust to Adversarial Attacks for Efficient and Flexible Spam Detection
        Amin  Hadi Mahdi Mosleh Keyvan  Mohebbi
        https://doi.org/10.82553/josc.2025.202509091217441

Sanad


Sanad is a platform for managing Azad University publications

Links


  • Islamic Azad University
  • Relevant Journals of the Ministry of Science, Research and Technology
  • Iranian Journals IndexedIn ISI

Related Centers


  • Office of the Supreme Leader
  • Presidential Institution
  • Ministry of Science, Research and Technology
  • Ministry of Health and Medical Education
  • Community Communication Center (SAMS)

Technical Support


  • Phone : +98 21 22222222
  • Email : journals@iau.ac.ir

Official pages



  • Home Page
  • Site Map
  • Islamic Azad University
  • Contact Us
  • Home
  • Site Map
  • Islamic Azad University
  • Contact Us

The rights to this website are owned by the Raimag Press Management System.
Copyright © 2021-2026

Home| Login| About Us| Contact Us|
[فارسی] [العربية] [fa] [ar]
  • IAU
  • Login