i-manager's Journal on Digital Forensics & Cyber Security aims to disseminate the critical knowledge in cryptography and various other public and private key generation to strengthen data security and protect the privacy of individuals and corporate identities. The outcome of current and continuous research by academicians, collaborative corporate researches, and individual research scholars, will be published and this Journal will also address researches on prevention of complex cybercrimes such as network disruptions that are caused by miscreants with intentional financial gains or controlling international political order.
Journal Particulars | |
---|---|
Title | i-manager's Journal on Digital Forensics & Cyber Security (JDF) |
Frequency | Bi-annual |
ISSN | Online:2583-911X |
Publisher | i-manager Publications |
Chief Editor | Dr. Rajesh S. Bansode Professor, Department of Information Technology, Thakur College of Engineering & Technology, Kandivali (E), Mumbai, India. E-mail: rajesh.bansode@thakureducation.org Profile: https://www.tcetmumbai.in/ITFaculty%20Professor.html |
Copyright | i-manager Publications |
Starting Year | 2023 |
Subject | Computer Science |
Language | English |
Publication Format | Online |
Phone No | 04652-231675 |
Email Id | jwinston@imanagerpublications.com |
Mobile No | 8589005850 |
Website | www.imanagerpublications.com |
Address | i-manager Publications, 3/343, Hill View, Town Railway Nagar, Nagercoil - 629001, TamilNadu. |
i-manager’s Journal on Digital Forensics & Cyber Security will focus on State-of-the-art data architectures that allow tremendous amount of private data available anywhere, everywhere and anytime, which is a big concern for data privacy and data security. The Journal aims to cover all recent research on Digital Forensics and Cyber Security domain with special focus on Spyware, Ransomware, Hijacking, Cryptocurrency, Ethical Hacking and Websites, Data and Network Vulnerability and Data Theft.
We follow stringent publication ethics, and plagiarized papers are not published, and are withdrawn at any stage of the publishing process. Plagiarism is not limited to the Results and Discussion sections; it can involve any part of the manuscript, including figures and tables, in which material is copied from another publication without attestation, reference, or permission.
i-manager Publications follow transparent policies right from paper submission to publication through various well defined and time tested processes.
The publisher follows a ‘No Publishing Fee’ policy.
Click HereThe Journal follows a double blind peer-review process. The submitted articles / research papers are reviewed by Professors/Educators in Engineering fields.
Click here to view the duties of Reviewers
For all copyright related queries contact info@imanagerpublications.com
Data and Network Vulnerability
Security Threats and Risks
Spyware
Social Engineering
Cryptocurrency
Virtual Private Network (VPN)
Bot/Botnet and Cyber Attacks
Malware Attack
Phishing Attack
Man-in-the-Middle Attack
SQL Injection Attack
Denial-of-Service Attack
Cryptojacking
Clickjacking
Deepfake
Ethical Hacking: White Hat / Black Hat
Database Forensics
The Sleuth Kit
Volatility
UFED (Universal Forensic Extraction Device)
Hashcat
Webinspect
Anti-Forensic Techniques
Email Crimes