List of Articles حمله Open Access Article Abstract Page Full-Text 1 - Design of An intrusion detection system with new architecture for malware attacks on flash disks Soheil Afraz Open Access Article Abstract Page Full-Text 2 - Cyber Threats Foresight Against Iran Based on Attack Vector mahdi omrani masoud shafiee siavash khorsandi Open Access Article Abstract Page Full-Text 3 - Analyzing Weighted Attack Graphs Using Genetic Algorithms M. Abadi Saeed Jalili Open Access Article Abstract Page Full-Text 4 - Fuzzy Voting for Anomaly Detection in Cluster-Based Mobile Ad Hoc Networks Mohammad Rahmanimanesh Saeed Jalili Open Access Article Abstract Page Full-Text 5 - SAHAR: An Architecture to Strengthen the Control Plane of the Software-Defined Network Against Denial of Service Attacks mehran shetabi Ahmad Akbari Open Access Article Abstract Page Full-Text 6 - Detection and Mitigation of a Combined Cyber Attack on Automatic Generation Control Tina Hajiabdollah H. Seifi Hamed Delkhosh Open Access Article Abstract Page Full-Text 7 - Robust Planning of False Data Injection Attack on Electricity Markets in Smart Grids Hamed Badrsimaei R. Hooshmand Soghra Nobakhtian Open Access Article Abstract Page Full-Text 8 - Proposing a Detection and Mitigation Approach for DDoS Attacks on SDN-Based IoT Networks fatemeh MotieShirazi Seyedakbar Mostafavi Open Access Article Abstract Page Full-Text 9 - Design of a Secondary Controller Based on Distributed Cooperative Control of Distributed Generators (DGs) with Multi-Agent Systems Approach Considering DoS Cyber Attacks Abdollah Mirzabeigi Ali Kazemy Mehdi Ramezani Seyed Mohammad Azimi Open Access Article Abstract Page Full-Text 10 - computer security models and proposing a new perspective: A review paper Hadi sadjadi Reza Kalantari Open Access Article Abstract Page Full-Text 11 - Stabilizing and Synchronizing the Islanded Microgrid with the Presence of Sensor and Actuator Fault and Cyber-Attack with Secondary Controller Design Abdollah Mirzabeigi Ali Kazemy Mehdi Ramezani Seyed Mohammad Azimi Open Access Article Abstract Page Full-Text 12 - Analysis of the Effects of Different Cyber Attacks on the Secondary Controller in Island Microgrids Abdollah Mirzabeigi ali kalantarnia Open Access Article Abstract Page Full-Text 13 - A Survey on Computer Security Patterns and Proposing a New Perspective Hadi sadjadi Reza Kalantari