• Home
  • About Rimag
  • Contact Us
  • Register
  • Log in
  • Order
Advanced
  • Home
  • تهدید
    • List of Articles تهدید

      • Open Access Article
        • Abstract Page
        • Full-Text

        1 - Content rating a nessissity for spam management in social networks
        Simin Ghesmati
      • Open Access Article
        • Abstract Page
        • Full-Text

        2 - Content rating for spam management in social networks a nessissity
        Simin Ghesmati
      • Open Access Article
        • Abstract Page
        • Full-Text

        3 - Cyber Threats Foresight Against Iran Based on Attack Vector
        mahdi omrani masoud shafiee siavash khorsandi
      • Open Access Article
        • Abstract Page
        • Full-Text

        4 - Responsibility of Governments and Mechanisms for Protecting Children's Rights in Cyberspace
        Mohammad Reza Hosseini
      • Open Access Article
        • Abstract Page
        • Full-Text

        5 - Compilation of structural model, dimensions of organizational performance, opportunities, threats, weakness and strength, social security organization
        ommolbanin gilan bagher sarokhani seyedmohamad seyedmirzaei
      • Open Access Article
        • Abstract Page
        • Full-Text

        6 - Provide an optimal model of crisis management to continue activities after the accident. (Case study: Industrial Defense Organizations).
        alireza jafarizad Reza i Hosnav ali towhidian
      • Open Access Article
        • Abstract Page
        • Full-Text

        7 - جایگاه سازمان همکاری شانگهای در راهبردهای موازنه‌جویانۀ منطقه‌ای و فرامنطقه‌ای چین (2020-2010)
        Mostafa Pakdel Majd Asghar Pirhadi
      • Open Access Article
        • Abstract Page
        • Full-Text

        8 - Opportunities and Threats of Iran’s Membership in the Organization for the Prohibition of Chemical Weapons (Legal, Political, Defensive and Security)
        Afifeh  Abedi
      • Open Access Article
        • Abstract Page
        • Full-Text

        9 - NATO's Political and Military Strategy for 2030 and Global Implications
        Rahim Baizidi Asgar Safari
      • Open Access Article
        • Abstract Page
        • Full-Text

        10 - computer security models and proposing a new perspective: A review paper
        Hadi sadjadi Reza Kalantari
      • Open Access Article
        • Abstract Page
        • Full-Text

        11 - Domestic Violence Against Men )Case Study: The Flakei Marginal Region of Khorram Abad City)
        vali bahrami Sara salimi fatemeh vandabrahim
      • Open Access Article
        • Abstract Page
        • Full-Text

        12 - Women's political participation: from obstacles to opportunities (Qualitative study of barriers and opportunities for women's political participation in women's political participation in Khorramabad city)
        karamollah javanmard
      • Open Access Article
        • Abstract Page
        • Full-Text

        13 - Provide an optimal model of crisis management to continue activities after the accident (Case study: Industrial Defense Organizations).
        Reza i Hosnav علیرضا جعفری زاد ali towhidian
  • Home Page
  • Site Map
  • Contact Us
  • Home
  • Site Map
  • Regional Science and Technology Information Center
  • Contact Us

The rights to this website are owned by the Raimag Press Management System.
Copyright © 2017-2025

Home| Login| About Rimag| Contact Us|
[فارسی] [العربية] [fa] [ar]
  • Ricest
  • Login
  • email