A
-
Abbasi, Hasan
Political function of virtual social networks [Volume 8, Issue 30, 2019, Pages 127-150]
-
Abdi, Ramezanali
Imam Khomeini's role in restoring softwar The Pathology of Beastat Software at the Age of Absence and the role of the Ulema in protecting it from the National Security Approach [Volume 8, Issue 28, 2018, Pages 71-104]
-
Ahmadi, Sadegh
Transitional security research and demographic policy of the Islamic Republic of Iran and possible scenarios [Volume 8, Issue 30, 2019, Pages 65-96]
-
Aliei, Mohammadvali
Transitional security research and demographic policy of the Islamic Republic of Iran and possible scenarios [Volume 8, Issue 30, 2019, Pages 65-96]
B
-
Babahadi, Mohammad
Investigating the concept of national identity and national interests and the relationship between them in the thought of the Supreme Leader [Volume 8, Issue 28, 2018, Pages 105-128]
-
Bagheri, masood
The cyber-power based on the fractal approach and its impact on national
security in cyberspace [Volume 8, Issue 29, 2018, Pages 173-200]
-
Bakhtiari, Taghi
The role of the police in strengthening the internal fabrication of the system [Volume 8, Issue 30, 2019, Pages 41-64]
-
Bayat, bahram
Explain the impact of terrorist threats on Public security [Volume 8, Issue 29, 2018, Pages 87-108]
-
Bigdello, mehdi
Strategies for the management of social degeneration in order to promote
the coherence of the internal construction of the Islamic Republic of Iran [Volume 8, Issue 29, 2018, Pages 109-140]
E
-
Eftekhari, asghar
Thematic analysis of security and freedom of thought from the perspective
of Imam Khamenei [Volume 8, Issue 29, 2018, Pages 33-58]
-
Enanloo, soleyman
Surveying the demographic component of the Islamic Republic of Iran in
order to consolidate national authority and national security [Volume 8, Issue 29, 2018, Pages 59-86]
-
Erfani, Sohrab
Strategic model of Islamic Republic of Iran's economic power in the framework of general policies of resistance economy [Volume 8, Issue 28, 2018, Pages 41-70]
-
Esmaeili, ali
The Strategies for the prevention of outbreak crimes against moral security in Iran [Volume 8, Issue 28, 2018, Pages 129-154]
-
Esmaeili, Ali
Explain the probable and desirable scenarios of cyber threats of the Islamic Republic of Iran [Volume 8, Issue 28, 2018, Pages 179-205]
-
Esmaeili, Ali
Designing a conceptual model of the cyber defense model of the Islamic Republic of Iran [Volume 8, Issue 30, 2019, Pages 181-202]
-
Esmaeili, keyvan
Strategic security strategy for the security of the cyberspace of the armed forces [Volume 8, Issue 30, 2019, Pages 203-237]
F
-
Fadayi, Gholamreza
The Strategies for the prevention of outbreak crimes against moral security in Iran [Volume 8, Issue 28, 2018, Pages 129-154]
-
Farsi, Mohammad
A Strategic Model in the Administration of the Supreme Council of the Cultural Revolution in terms of the Imam of the Islamic Revolution [Volume 8, Issue 28, 2018, Pages 155-178]
-
Feyzi, Reza
Investigating the concept of national identity and national interests and the relationship between them in the thought of the Supreme Leader [Volume 8, Issue 28, 2018, Pages 105-128]
G
-
Ghanbari, Mohammad
Explain the impact of terrorist threats on Public security [Volume 8, Issue 29, 2018, Pages 87-108]
-
Ghazizadeh, Alireza
Thematic analysis of security and freedom of thought from the perspective
of Imam Khamenei [Volume 8, Issue 29, 2018, Pages 33-58]
-
Govhari, Aboozar
Investigating the concept of national identity and national interests and the relationship between them in the thought of the Supreme Leader [Volume 8, Issue 28, 2018, Pages 105-128]
H
-
Habibi, hamid
Types of soft power from the point of view of the Holy Qur'an [Volume 8, Issue 28, 2018, Pages 11-40]
-
Halili, Khodadad
The cyber-power based on the fractal approach and its impact on national
security in cyberspace [Volume 8, Issue 29, 2018, Pages 173-200]
-
Hatami, Hamidreza
Imam Khomeini's role in restoring softwar The Pathology of Beastat Software at the Age of Absence and the role of the Ulema in protecting it from the National Security Approach [Volume 8, Issue 28, 2018, Pages 71-104]
K
-
Kahrari, Teymoor
Individual Security Pattern Based on Imam Khomeini's Discourse [Volume 8, Issue 29, 2018, Pages 9-32]
-
Karamzadeh, Esmaeil
Strategic model of Islamic Republic of Iran's economic power in the framework of general policies of resistance economy [Volume 8, Issue 28, 2018, Pages 41-70]
-
Kargari, Mehrdad
The The pattern of intrusion in cyberspace is based on the theory of games [Volume 8, Issue 29, 2018, Pages 141-172]
-
Khorashdizaeh, mohammadreza
The The pattern of intrusion in cyberspace is based on the theory of games [Volume 8, Issue 29, 2018, Pages 141-172]
L
-
Lakzayi, Najaf
Types of soft power from the point of view of the Holy Qur'an [Volume 8, Issue 28, 2018, Pages 11-40]
M
-
Mahmoodzadeh, Ebrahim
Strategic security strategy for the security of the cyberspace of the armed forces [Volume 8, Issue 30, 2019, Pages 203-237]
-
Mirhoseyni, vahid
Surveying the demographic component of the Islamic Republic of Iran in
order to consolidate national authority and national security [Volume 8, Issue 29, 2018, Pages 59-86]
-
Mokhber Dezeooli, Mohammad
A Strategic Model in the Administration of the Supreme Council of the Cultural Revolution in terms of the Imam of the Islamic Revolution [Volume 8, Issue 28, 2018, Pages 155-178]
-
Mollaei, Ali
The The pattern of intrusion in cyberspace is based on the theory of games [Volume 8, Issue 29, 2018, Pages 141-172]
-
Monzavi, Javad
Transitional security research and demographic policy of the Islamic Republic of Iran and possible scenarios [Volume 8, Issue 30, 2019, Pages 65-96]
-
Moradi, Azizmorad
Compilation and presentation of geopolitical control strategies for illegal immigration in the eastern border regions with an emphasis on order and security [Volume 8, Issue 30, 2019, Pages 151-180]
-
Moradian, Mohsen
Surveying the demographic component of the Islamic Republic of Iran in
order to consolidate national authority and national security [Volume 8, Issue 29, 2018, Pages 59-86]
-
Movahedisefat, Mohammad Reza
The cyber-power based on the fractal approach and its impact on national
security in cyberspace [Volume 8, Issue 29, 2018, Pages 173-200]
N
-
Nabavi, Seyyed Morteza
Strategic model of Islamic Republic of Iran's economic power in the framework of general policies of resistance economy [Volume 8, Issue 28, 2018, Pages 41-70]
R
-
Rezazadeh, Akbar
The role of the police in strengthening the internal fabrication of the system [Volume 8, Issue 30, 2019, Pages 41-64]
S
-
Samdaliri, kazem
Individual Security Pattern Based on Imam Khomeini's Discourse [Volume 8, Issue 29, 2018, Pages 9-32]
-
Sanaghorbani, Jalal
Explain the probable and desirable scenarios of cyber threats of the Islamic Republic of Iran [Volume 8, Issue 28, 2018, Pages 179-205]
-
Seydi, Mehdi
Strategic model of Islamic Republic of Iran's economic power in the framework of general policies of resistance economy [Volume 8, Issue 28, 2018, Pages 41-70]
-
Shariat, Jahangir
Political function of virtual social networks [Volume 8, Issue 30, 2019, Pages 127-150]
T
-
Taghipoor, Reza
Designing a conceptual model of the cyber defense model of the Islamic Republic of Iran [Volume 8, Issue 30, 2019, Pages 181-202]
-
Tavakkoli, Mehdi
Strategies for the management of social degeneration in order to promote
the coherence of the internal construction of the Islamic Republic of Iran [Volume 8, Issue 29, 2018, Pages 109-140]
Z
-
Zolfaghari, Hosein
Compilation and presentation of geopolitical control strategies for illegal immigration in the eastern border regions with an emphasis on order and security [Volume 8, Issue 30, 2019, Pages 151-180]
Your query does not match with any item