List of Articles Threat Open Access Article Abstract Page Full-Text 1 - Content rating a nessissity for spam management in social networks Simin Ghesmati Open Access Article Abstract Page Full-Text 2 - Content rating for spam management in social networks a nessissity Simin Ghesmati Open Access Article Abstract Page Full-Text 3 - Cyber Threats Foresight Against Iran Based on Attack Vector mahdi omrani masoud shafiee siavash khorsandi Open Access Article Abstract Page Full-Text 4 - Responsibility of Governments and Mechanisms for Protecting Children's Rights in Cyberspace Mohammad Reza Hosseini Open Access Article Abstract Page Full-Text 5 - A Study of the Place of Cyberspace in Education: Opportunities and Threats Kobra Ahmadvand Zahra Taghyzade Ghavam Samane Dastforoshan Soheila Gholami Haredashti Open Access Article Abstract Page Full-Text 6 - Model Designing of Total Softpower Policy the Islamic Republic of Iran Mohammad Taqi Amini Mohammad MahmoodiMeymand MohamadMehdi Parhizgar محمد رضا مشایخ Open Access Article Abstract Page Full-Text 7 - Compilation of structural model, dimensions of organizational performance, opportunities, threats, weakness and strength, social security organization ommolbanin gilan bagher sarokhani seyedmohamad seyedmirzaei Open Access Article Abstract Page Full-Text 8 - A Hybrid Access Control Model for CIM-Based SCADA System P. Mahmoudi Nasr A. Yazdian Varjani Open Access Article Abstract Page Full-Text 9 - Provide an optimal model of crisis management to continue activities after the accident. (Case study: Industrial Defense Organizations). alireza jafarizad Reza i Hosnav ali towhidian Open Access Article Abstract Page Full-Text 10 - Opportunities and Threats of Iran’s Membership in the Organization for the Prohibition of Chemical Weapons (Legal, Political, Defensive and Security) Afifeh Abedi Open Access Article Abstract Page Full-Text 11 - NATO's Political and Military Strategy for 2030 and Global Implications Rahim Baizidi Asgar Safari Open Access Article Abstract Page Full-Text 12 - computer security models and proposing a new perspective: A review paper Hadi sadjadi Reza Kalantari Open Access Article Abstract Page Full-Text 13 - Domestic Violence Against Men )Case Study: The Flakei Marginal Region of Khorram Abad City) vali bahrami Sara salimi fatemeh vandabrahim Open Access Article Abstract Page Full-Text 14 - A Survey on Computer Security Patterns and Proposing a New Perspective Hadi sadjadi Reza Kalantari Open Access Article Abstract Page Full-Text 15 - Women's political participation: from obstacles to opportunities (Qualitative study of barriers and opportunities for women's political participation in women's political participation in Khorramabad city) karamollah javanmard Open Access Article Abstract Page Full-Text 16 - Provide an optimal model of crisis management to continue activities after the accident (Case study: Industrial Defense Organizations). Reza i Hosnav علیرضا جعفری زاد ali towhidian