A
-
Ability Maturity
assessment and analysis of vulnerabilities in resilience of defensive industrial control systems against cyber threats [Volume 2, Issue 2, 2022, Pages 133-152]
-
Accessibility
Reviewing the requirements for exploiting the Internet of things technology in the command and control system [Volume 2, Issue 2, 2022, Pages 63-80]
-
Active cyber defense
Provide a conceptual model for national cyber defense [Volume 2, Issue 3, 2022, Pages 69-88]
B
-
Big data analysis
The mutual and synergistic role of big data analysis and strategic management at the national level [Volume 2, Issue 4, 2022, Pages 125-148]
C
-
Computer emergency response team
Architectural dimensions of the computerized emergency response team of defense centers [Volume 2, Issue 4, 2022, Pages 149-179]
-
Cyber Defense
Provide a conceptual model for national cyber defense [Volume 2, Issue 3, 2022, Pages 69-88]
-
Cyber Security
Presenting the conceptual model of security-oriented cyber defense of the Islamic Republic of Iran [Volume 2, Issue 3, 2022, Pages 7-32]
-
Cyberspace
Cyber Warfare: Challenges and Solutions in International Law [Volume 1, Issue 1, 2022, Pages 29-66]
-
Cyberspace
presents a model for intelligent cyber command and control of the country [Volume 1, Issue 1, 2022, Pages 103-128]
-
Cyberspace
Components of legislation in cyberspace with national and international approach [Volume 1, Issue 1, 2022, Pages 157-178]
-
Cyberspace
Providing a conceptual anti-malware structure to increase national cyber security in the Islamic Republic of Iran [Volume 2, Issue 4, 2022, Pages 37-62]
-
Cyber Space
Investigating the effects of threats and cyber attacks on the national security of the Islamic Republic of Iran [Volume 1, Issue 1, 2022, Pages 7-28]
-
Cyber Space
islamic republic of iran participation pattern in the international system of cyberspace [Volume 2, Issue 3, 2022, Pages 147-174]
-
Cyberspace Law
Components of legislation in cyberspace with national and international approach [Volume 1, Issue 1, 2022, Pages 157-178]
-
Cyber strategic document
Compilation of the proposed axes of the cyber strategic document of the Islamic Republic of Iran by comparative study method [Volume 2, Issue 3, 2022, Pages 121-146]
-
Cyber Terrorism
Takfiri terrorism in cyber space and solutions to deal with it [Volume 2, Issue 2, 2022, Pages 105-132]
-
Cyber Terrorism
provides a conceptual model of threats arising from cyber – terrorism [Volume 2, Issue 2, 2022, Pages 7-44]
D
-
Death Chain
Prioritization and ranking of recurring cyber threats with a focus on the death chain process [Volume 1, Issue 1, 2022, Pages 129-156]
-
Decision making
The mutual and synergistic role of big data analysis and strategic management at the national level [Volume 2, Issue 4, 2022, Pages 125-148]
-
Defense Industrial Control Systems
assessment and analysis of vulnerabilities in resilience of defensive industrial control systems against cyber threats [Volume 2, Issue 2, 2022, Pages 133-152]
-
Digital Economy
Cryptocurrency threats to economic Security and approach to counter it [Volume 2, Issue 4, 2022, Pages 97-124]
-
Dimensions
Presenting the conceptual model of security-oriented cyber defense of the Islamic Republic of Iran [Volume 2, Issue 3, 2022, Pages 7-32]
E
-
Economic Security
Cryptocurrency threats to economic Security and approach to counter it [Volume 2, Issue 4, 2022, Pages 97-124]
F
-
Flexibility
review of cyber - resilience models [Volume 2, Issue 2, 2022, Pages 81-104]
G
-
Governance
islamic republic of iran participation pattern in the international system of cyberspace [Volume 2, Issue 3, 2022, Pages 147-174]
-
Graph
Prioritization and ranking of recurring cyber threats with a focus on the death chain process [Volume 1, Issue 1, 2022, Pages 129-156]
I
-
Internet of Things
Reviewing the requirements for exploiting the Internet of things technology in the command and control system [Volume 2, Issue 2, 2022, Pages 63-80]
L
-
Laws
Components of legislation in cyberspace with national and international approach [Volume 1, Issue 1, 2022, Pages 157-178]
-
Legislation
Components of legislation in cyberspace with national and international approach [Volume 1, Issue 1, 2022, Pages 157-178]
M
-
Matching Protocols
Reviewing the requirements for exploiting the Internet of things technology in the command and control system [Volume 2, Issue 2, 2022, Pages 63-80]
-
Modeling
presents a model for intelligent cyber command and control of the country [Volume 1, Issue 1, 2022, Pages 103-128]
N
-
National cyber security document
Compilation of the proposed axes of the cyber strategic document of the Islamic Republic of Iran by comparative study method [Volume 2, Issue 3, 2022, Pages 121-146]
-
National Cyber Space
Research article: Presenting a conceptual model of security analysis in the national cyberspace of countries [Volume 1, Issue 1, 2022, Pages 67-102]
-
National cyber strategic document
Compilation of the proposed axes of the cyber strategic document of the Islamic Republic of Iran by comparative study method [Volume 2, Issue 3, 2022, Pages 121-146]
-
National Information Network of the Islamic Republic of Iran
The strategic model of security analysis in the national information network of I.R. Iran [Volume 2, Issue 3, 2022, Pages 33-68]
P
-
Partnership model
islamic republic of iran participation pattern in the international system of cyberspace [Volume 2, Issue 3, 2022, Pages 147-174]
-
Passive cyber defense
Provide a conceptual model for national cyber defense [Volume 2, Issue 3, 2022, Pages 69-88]
-
Pearson correlation coefficient
DETECTING AND CONFRONTING DISTRIBUTED DENIAL OF SERVICE CYBER-ATTACKS USING PEARSON CORRELATION COEFFICIENT IN SOFTWARE DEFINED NETWORKS [Volume 2, Issue 2, 2022, Pages 45-62]
R
-
Resistance
review of cyber - resilience models [Volume 2, Issue 2, 2022, Pages 81-104]
S
-
Security Analysis
Research article: Presenting a conceptual model of security analysis in the national cyberspace of countries [Volume 1, Issue 1, 2022, Pages 67-102]
-
Security Analysis
The strategic model of security analysis in the national information network of I.R. Iran [Volume 2, Issue 3, 2022, Pages 33-68]
-
Software defined networks
DETECTING AND CONFRONTING DISTRIBUTED DENIAL OF SERVICE CYBER-ATTACKS USING PEARSON CORRELATION COEFFICIENT IN SOFTWARE DEFINED NETWORKS [Volume 2, Issue 2, 2022, Pages 45-62]
-
Soverinty
islamic republic of iran participation pattern in the international system of cyberspace [Volume 2, Issue 3, 2022, Pages 147-174]
T
-
Terrorism
Takfiri terrorism in cyber space and solutions to deal with it [Volume 2, Issue 2, 2022, Pages 105-132]
-
Terrorism
provides a conceptual model of threats arising from cyber – terrorism [Volume 2, Issue 2, 2022, Pages 7-44]
V
-
Vulnerability Assessment and Analysis
assessment and analysis of vulnerabilities in resilience of defensive industrial control systems against cyber threats [Volume 2, Issue 2, 2022, Pages 133-152]
W
-
Weighting
Prioritization and ranking of recurring cyber threats with a focus on the death chain process [Volume 1, Issue 1, 2022, Pages 129-156]
Your query does not match with any item