Keyword Index

A

  • Ability Maturity assessment and analysis of vulnerabilities in resilience of defensive industrial control systems against cyber threats [Volume 2, Issue 2, 2022, Pages 133-152]
  • Accessibility Reviewing the requirements for exploiting the Internet of things technology in the command and control system [Volume 2, Issue 2, 2022, Pages 63-80]
  • Active cyber defense Provide a conceptual model for national cyber defense [Volume 2, Issue 3, 2022, Pages 69-88]

B

  • Big data analysis The mutual and synergistic role of big data analysis and strategic management at the national level [Volume 2, Issue 4, 2022, Pages 125-148]

C

  • Computer emergency response team Architectural dimensions of the computerized emergency response team of defense centers [Volume 2, Issue 4, 2022, Pages 149-179]
  • Cyber Defense Provide a conceptual model for national cyber defense [Volume 2, Issue 3, 2022, Pages 69-88]
  • Cyber Security Presenting the conceptual model of security-oriented cyber defense of the Islamic Republic of Iran [Volume 2, Issue 3, 2022, Pages 7-32]
  • Cyberspace Providing a conceptual anti-malware structure to increase national cyber security in the Islamic Republic of Iran [Volume 2, Issue 4, 2022, Pages 37-62]
  • Cyber Space islamic republic of iran participation pattern in the international system of cyberspace [Volume 2, Issue 3, 2022, Pages 147-174]
  • Cyber strategic document Compilation of the proposed axes of the cyber strategic document of the Islamic Republic of Iran by comparative study method [Volume 2, Issue 3, 2022, Pages 121-146]
  • Cyber Terrorism Takfiri terrorism in cyber space and solutions to deal with it [Volume 2, Issue 2, 2022, Pages 105-132]
  • Cyber Terrorism provides a conceptual model of threats arising from cyber – terrorism [Volume 2, Issue 2, 2022, Pages 7-44]

D

  • Decision making The mutual and synergistic role of big data analysis and strategic management at the national level [Volume 2, Issue 4, 2022, Pages 125-148]
  • Defense Industrial Control Systems assessment and analysis of vulnerabilities in resilience of defensive industrial control systems against cyber threats [Volume 2, Issue 2, 2022, Pages 133-152]
  • Digital Economy Cryptocurrency threats to economic Security and approach to counter it [Volume 2, Issue 4, 2022, Pages 97-124]
  • Dimensions Presenting the conceptual model of security-oriented cyber defense of the Islamic Republic of Iran [Volume 2, Issue 3, 2022, Pages 7-32]

E

  • Economic Security Cryptocurrency threats to economic Security and approach to counter it [Volume 2, Issue 4, 2022, Pages 97-124]

F

  • Flexibility review of cyber - resilience models [Volume 2, Issue 2, 2022, Pages 81-104]

G

  • Governance islamic republic of iran participation pattern in the international system of cyberspace [Volume 2, Issue 3, 2022, Pages 147-174]

I

  • Internet of Things Reviewing the requirements for exploiting the Internet of things technology in the command and control system [Volume 2, Issue 2, 2022, Pages 63-80]

M

  • Matching Protocols Reviewing the requirements for exploiting the Internet of things technology in the command and control system [Volume 2, Issue 2, 2022, Pages 63-80]

N

P

  • Partnership model islamic republic of iran participation pattern in the international system of cyberspace [Volume 2, Issue 3, 2022, Pages 147-174]
  • Passive cyber defense Provide a conceptual model for national cyber defense [Volume 2, Issue 3, 2022, Pages 69-88]
  • Pearson correlation coefficient DETECTING AND CONFRONTING DISTRIBUTED DENIAL OF SERVICE CYBER-ATTACKS USING PEARSON CORRELATION COEFFICIENT IN SOFTWARE DEFINED NETWORKS [Volume 2, Issue 2, 2022, Pages 45-62]

R

  • Resistance review of cyber - resilience models [Volume 2, Issue 2, 2022, Pages 81-104]

S

  • Security Analysis The strategic model of security analysis in the national information network of I.R. Iran [Volume 2, Issue 3, 2022, Pages 33-68]
  • Software defined networks DETECTING AND CONFRONTING DISTRIBUTED DENIAL OF SERVICE CYBER-ATTACKS USING PEARSON CORRELATION COEFFICIENT IN SOFTWARE DEFINED NETWORKS [Volume 2, Issue 2, 2022, Pages 45-62]
  • Soverinty islamic republic of iran participation pattern in the international system of cyberspace [Volume 2, Issue 3, 2022, Pages 147-174]

T

  • Terrorism Takfiri terrorism in cyber space and solutions to deal with it [Volume 2, Issue 2, 2022, Pages 105-132]
  • Terrorism provides a conceptual model of threats arising from cyber – terrorism [Volume 2, Issue 2, 2022, Pages 7-44]

V

  • Vulnerability Assessment and Analysis assessment and analysis of vulnerabilities in resilience of defensive industrial control systems against cyber threats [Volume 2, Issue 2, 2022, Pages 133-152]