Author Index

A

  • Abbasi, Hasan Political function of virtual social networks [Volume 8, Issue 30, 2019, Pages 127-150]
  • Abdi, Ramezanali Imam Khomeini's role in restoring softwar The Pathology of Beastat Software at the Age of Absence and the role of the Ulema in protecting it from the National Security Approach [Volume 8, Issue 28, 2018, Pages 71-104]
  • Ahmadi, Sadegh Transitional security research and demographic policy of the Islamic Republic of Iran and possible scenarios [Volume 8, Issue 30, 2019, Pages 65-96]
  • Aliei, Mohammadvali Transitional security research and demographic policy of the Islamic Republic of Iran and possible scenarios [Volume 8, Issue 30, 2019, Pages 65-96]

B

  • Babahadi, Mohammad Investigating the concept of national identity and national interests and the relationship between them in the thought of the Supreme Leader [Volume 8, Issue 28, 2018, Pages 105-128]
  • Bagheri, masood The cyber-power based on the fractal approach and its impact on national security in cyberspace [Volume 8, Issue 29, 2018, Pages 173-200]
  • Bakhtiari, Taghi The role of the police in strengthening the internal fabrication of the system [Volume 8, Issue 30, 2019, Pages 41-64]
  • Bayat, bahram Explain the impact of terrorist threats on Public security [Volume 8, Issue 29, 2018, Pages 87-108]
  • Bigdello, mehdi Strategies for the management of social degeneration in order to promote the coherence of the internal construction of the Islamic Republic of Iran [Volume 8, Issue 29, 2018, Pages 109-140]

E

  • Eftekhari, asghar Thematic analysis of security and freedom of thought from the perspective of Imam Khamenei [Volume 8, Issue 29, 2018, Pages 33-58]
  • Enanloo, soleyman Surveying the demographic component of the Islamic Republic of Iran in order to consolidate national authority and national security [Volume 8, Issue 29, 2018, Pages 59-86]
  • Erfani, Sohrab Strategic model of Islamic Republic of Iran's economic power in the framework of general policies of resistance economy [Volume 8, Issue 28, 2018, Pages 41-70]
  • Esmaeili, ali The Strategies for the prevention of outbreak crimes against moral security in Iran [Volume 8, Issue 28, 2018, Pages 129-154]
  • Esmaeili, Ali Explain the probable and desirable scenarios of cyber threats of the Islamic Republic of Iran [Volume 8, Issue 28, 2018, Pages 179-205]
  • Esmaeili, Ali Designing a conceptual model of the cyber defense model of the Islamic Republic of Iran [Volume 8, Issue 30, 2019, Pages 181-202]
  • Esmaeili, keyvan Strategic security strategy for the security of the cyberspace of the armed forces [Volume 8, Issue 30, 2019, Pages 203-237]

F

  • Fadayi, Gholamreza The Strategies for the prevention of outbreak crimes against moral security in Iran [Volume 8, Issue 28, 2018, Pages 129-154]
  • Farsi, Mohammad A Strategic Model in the Administration of the Supreme Council of the Cultural Revolution in terms of the Imam of the Islamic Revolution [Volume 8, Issue 28, 2018, Pages 155-178]
  • Feyzi, Reza Investigating the concept of national identity and national interests and the relationship between them in the thought of the Supreme Leader [Volume 8, Issue 28, 2018, Pages 105-128]

G

  • Ghanbari, Mohammad Explain the impact of terrorist threats on Public security [Volume 8, Issue 29, 2018, Pages 87-108]
  • Ghazizadeh, Alireza Thematic analysis of security and freedom of thought from the perspective of Imam Khamenei [Volume 8, Issue 29, 2018, Pages 33-58]
  • Govhari, Aboozar Investigating the concept of national identity and national interests and the relationship between them in the thought of the Supreme Leader [Volume 8, Issue 28, 2018, Pages 105-128]

H

  • Habibi, hamid Types of soft power from the point of view of the Holy Qur'an [Volume 8, Issue 28, 2018, Pages 11-40]
  • Halili, Khodadad The cyber-power based on the fractal approach and its impact on national security in cyberspace [Volume 8, Issue 29, 2018, Pages 173-200]
  • Hatami, Hamidreza Imam Khomeini's role in restoring softwar The Pathology of Beastat Software at the Age of Absence and the role of the Ulema in protecting it from the National Security Approach [Volume 8, Issue 28, 2018, Pages 71-104]

K

  • Kahrari, Teymoor Individual Security Pattern Based on Imam Khomeini's Discourse [Volume 8, Issue 29, 2018, Pages 9-32]
  • Karamzadeh, Esmaeil Strategic model of Islamic Republic of Iran's economic power in the framework of general policies of resistance economy [Volume 8, Issue 28, 2018, Pages 41-70]
  • Kargari, Mehrdad The The pattern of intrusion in cyberspace is based on the theory of games [Volume 8, Issue 29, 2018, Pages 141-172]
  • Khorashdizaeh, mohammadreza The The pattern of intrusion in cyberspace is based on the theory of games [Volume 8, Issue 29, 2018, Pages 141-172]

L

  • Lakzayi, Najaf Types of soft power from the point of view of the Holy Qur'an [Volume 8, Issue 28, 2018, Pages 11-40]

M

  • Mahmoodzadeh, Ebrahim Strategic security strategy for the security of the cyberspace of the armed forces [Volume 8, Issue 30, 2019, Pages 203-237]
  • Mirhoseyni, vahid Surveying the demographic component of the Islamic Republic of Iran in order to consolidate national authority and national security [Volume 8, Issue 29, 2018, Pages 59-86]
  • Mokhber Dezeooli, Mohammad A Strategic Model in the Administration of the Supreme Council of the Cultural Revolution in terms of the Imam of the Islamic Revolution [Volume 8, Issue 28, 2018, Pages 155-178]
  • Mollaei, Ali The The pattern of intrusion in cyberspace is based on the theory of games [Volume 8, Issue 29, 2018, Pages 141-172]
  • Monzavi, Javad Transitional security research and demographic policy of the Islamic Republic of Iran and possible scenarios [Volume 8, Issue 30, 2019, Pages 65-96]
  • Moradi, Azizmorad Compilation and presentation of geopolitical control strategies for illegal immigration in the eastern border regions with an emphasis on order and security [Volume 8, Issue 30, 2019, Pages 151-180]
  • Moradian, Mohsen Surveying the demographic component of the Islamic Republic of Iran in order to consolidate national authority and national security [Volume 8, Issue 29, 2018, Pages 59-86]
  • Movahedisefat, Mohammad Reza The cyber-power based on the fractal approach and its impact on national security in cyberspace [Volume 8, Issue 29, 2018, Pages 173-200]

N

  • Nabavi, Seyyed Morteza Strategic model of Islamic Republic of Iran's economic power in the framework of general policies of resistance economy [Volume 8, Issue 28, 2018, Pages 41-70]

R

  • Rezazadeh, Akbar The role of the police in strengthening the internal fabrication of the system [Volume 8, Issue 30, 2019, Pages 41-64]

S

  • Samdaliri, kazem Individual Security Pattern Based on Imam Khomeini's Discourse [Volume 8, Issue 29, 2018, Pages 9-32]
  • Sanaghorbani, Jalal Explain the probable and desirable scenarios of cyber threats of the Islamic Republic of Iran [Volume 8, Issue 28, 2018, Pages 179-205]
  • Seydi, Mehdi Strategic model of Islamic Republic of Iran's economic power in the framework of general policies of resistance economy [Volume 8, Issue 28, 2018, Pages 41-70]
  • Shariat, Jahangir Political function of virtual social networks [Volume 8, Issue 30, 2019, Pages 127-150]

T

  • Taghipoor, Reza Designing a conceptual model of the cyber defense model of the Islamic Republic of Iran [Volume 8, Issue 30, 2019, Pages 181-202]
  • Tavakkoli, Mehdi Strategies for the management of social degeneration in order to promote the coherence of the internal construction of the Islamic Republic of Iran [Volume 8, Issue 29, 2018, Pages 109-140]

Z

  • Zolfaghari, Hosein Compilation and presentation of geopolitical control strategies for illegal immigration in the eastern border regions with an emphasis on order and security [Volume 8, Issue 30, 2019, Pages 151-180]