Azar, A., & Rajabzadeh, A. (2017).
Applied decision making (MADM approach). Negahe Danesh. (
In Persian).
https://www.gisoom.com
Ahmadi, A., & Vaezi, A. (2019). An approach to increase security and privacy on social media.
4th international conference on applied research in science and engineering, Tehran, Iran. Civilcia. (
In Persian).
https://civilica.com/doc/1000645/
Babaei, B (2018). Threats of cyberspace and social networks in NAJA internal security.
Journal of law enforcement and security studies,
13(47), 129-154. (
In Persian).
https://www.magiran.com/paper/1970526
Rasooli, M. R, & Bandegi Monfared, S. (2014). Content analysis of cultural and social themes in social networks (case study: Facebook and the youth of Tehran),
Culture studies - communication,
15(27), 67-85. (
In Persian).
https://www.sid.ir/paper/395229/fa
Haghighi, E., & Gholamali, M. (2015). Identifying the factors affecting trust building in online social networks using fuzzy ELECTRE method.
Information technology management, 7(4), 715-740. (
In Persian). DOI:
10.22059/jitm.2015.54750
Hosseinnejad, V., & Hajikazem, A. A. (2018). Bayesian network-based trust model in social networks,
Journal of electronic defense and cyber defense,
6(2), 29-38. (
In Persian).
https://www.magiran.com/paper/1902588
Rasouli, Y. S., & Jafari, M. (2020). Investigating and comparing how cryptographic algorithms work in network security.
The 4th international conference on new strategies in engineering, information science and technology in the next century. Alborz, Iran. Civilcia
. (
In Persian).
https://civilica.com/doc/1032523
Zare, M. H., Norouzi, E. (2019). Assessing the security of social networks of the particle cluster algorithm.
Conference on computer science, electrical and telecommunication Engineering, Mashhad, Iran. Civilcia. (
In Persian).
https://civilica.com/doc/988314/
Zarezadeh, r. (2021). disadvantages and security challenges of internal issues; a case study of virtual social networks.
Journal of strategic studies, 2(92), 7-32. (
In Persian).
http://ensani.ir
Doaguyan, D., & Kheirandish, M. R. (2021). The effect of mobile social networks under the social relations of families in the western regions of greater Tehran (telegram case study).
Journal of security and law enforcement studies, 14(53), 131-156. (
In Persian).
http://spaps.jrl.police.ir/article_93867.html?lang=en
Sahafizadeh, E., & Torkladani, B. (2020). Control of rumors on social networks using soft security mechanisms.
The 17th international conference of the iranian password association, Tehran, Iran. Civilcia. (
In Persian).
https://civilica.com/doc/1120274
Abdulrahmani, R., Mozafari, M. M., & Mohamadi, I. (2018). Analyzing the security content of Telegram social network messages.
Strategy,
27(89), 125-150. (
In Persian).
https://www.sid.ir/paper/405216/fa
Ghayuri-saleth, M., Bazdar, Gh. R., & Sarkardei, A. (2018). Influential factors in disseminating information on social networks based on entropy theory.
Electronic and cyber defense,
2(22), 1-10. (
In Persian).
https://www.sid.ir/paper/243160/fa
Kalantari, S. (2015). The role of security in cyberspace and social networks.
The first national conference on computer, information technology and Islamic communications in Iran, Qom, Iran. Civilcia. (
In Persian).
https://civilica.com/doc/408879
Mohamadrezae, M. R. (2021). Detection of fake users in social networks using principal component analysis and kernel density estimation algorithm (case study: on twitter social network).
Electronic and cyber defense,
9(3), 109-123. (
In Persian).
https://ecdj.ihu.ac.ir/article_205996.html
Mohamadi, Z., Delsooz, K., & Sayah, E. (2019). Filtering social networks and its role in protecting and securing civil rights in cyber defense in Iran.
The 2nd national conference on cyber defense, Maraqeh, Iran. Civilcia. (
In Persian).
https://civilica.com/doc/903767/
Mehregan, A., & Sedqivash, M. (2020). Study and review of security solutions in social networks
. The 4th national conference on computer science and technology of Iran, Tehran, Iran. Civilcia. (
In Persian).
https://civilica.com/doc/1116856/
Nadri, Gh. R., Bakhshayeshhi, A., Darabi, A., & Maghsudi, M. (2019). ). Investigating the political-security role of virtual social networks on national security of Iran.
Protection and security research,
8(29), 63-88. (
In Persian).
https://www.sid.ir/paper/265958/fa
Edosomwan, S., Prakasan, S. K., Kouame, D., Watson, J., & Seymour, T. (2011). The history of social media and its impact on business.
Journal of applied management and entrepreneurship,
16(3), 79-91.
https://www.proquest.com/openview/f828806820e0b99fcbda9c765788e137/1?pq-origsite=gscholar&cbl=25565
Hwang, C. L., & Yoon, K. (1981). Methods for multiple attribute decision making. In
Multiple attribute decision making (pp. 58-191). Springer, Berlin, Heidelberg. 58-191. DOI:
https://doi.org/10.1007/978-3-642-48318-9_3
McCarroll, N., & Curran, K. (2013). Social networking in education.
International journal of innovation in the digital economy (IJIDE),
4(1), 1-15. DOI:
10.4018/978-1-4666-6114-1.ch034
Liao, Y., Zhao, G., Wang, J., & Li, S. (2020). Network security situation assessment model based on extended hidden Markov.
Mathematical problems in engineering,
2020. DOI:
https://doi.org/10.1155/2020/1428056
Zeebaree, S., Ameen, S., & Sadeeq, M. (2020). Social media networks security threats, risks and recommendation: A case study in the kurdistan region. International journal of innovation, creativity and change, 13(7), 349-365.