ISSN Online: 2583-911X Impact Factor 2023
(Based on Google scholar citation)

i-manager's Journal on Digital Forensics & Cyber Security (JDF)

Safeguarding Confidentiality and Digital Privacy

About the Journal

i-manager's Journal on Digital Forensics & Cyber Security aims to disseminate the critical knowledge in cryptography and various other public and private key generation to strengthen data security and protect the privacy of individuals and corporate identities. The outcome of current and continuous research by academicians, collaborative corporate researches, and individual research scholars, will be published and this Journal will also address researches on prevention of complex cybercrimes such as network disruptions that are caused by miscreants with intentional financial gains or controlling international political order.

Journal Particulars
Title i-manager's Journal on Digital Forensics & Cyber Security (JDF)
Frequency Bi-annual
ISSN Online:2583-911X
Publisher i-manager Publications
Chief Editor Dr. Rajesh S. Bansode
Department of Information Technology,
Thakur College of Engineering & Technology,
Kandivali (E), Mumbai, India.
Copyright i-manager Publications
Starting Year 2023
Subject Computer Science
Language English
Publication Format Online
Phone No 04652-231675
Email Id
Mobile No 8589005850
Address i-manager Publications, 3/343, Hill View, Town Railway Nagar, Nagercoil - 629001, TamilNadu.

Aims and Scope

i-manager’s Journal on Digital Forensics & Cyber Security will focus on State-of-the-art data architectures that allow tremendous amount of private data available anywhere, everywhere and anytime, which is a big concern for data privacy and data security. The Journal aims to cover all recent research on Digital Forensics and Cyber Security domain with special focus on Spyware, Ransomware, Hijacking, Cryptocurrency, Ethical Hacking and Websites, Data and Network Vulnerability and Data Theft.

Publication Ethics and Malpractice Statement

We follow stringent publication ethics, and plagiarized papers are not published, and are withdrawn at any stage of the publishing process. Plagiarism is not limited to the Results and Discussion sections; it can involve any part of the manuscript, including figures and tables, in which material is copied from another publication without attestation, reference, or permission.

Publication Ethics & Peer Review Policy

i-manager Publications follow transparent policies right from paper submission to publication through various well defined and time tested processes.

The publisher follows a ‘No Publishing Fee’ policy.

Click Here

Review Procedure

The Journal follows a double blind peer-review process. The submitted articles / research papers are reviewed by Professors/Educators in Engineering fields.

Click here to view the duties of Reviewers

For all copyright related queries contact



Overall Topics Covered

  • Data and Network Vulnerability

  • Security Threats and Risks

  • Spyware

  • Social Engineering

  • Cryptocurrency

  • Virtual Private Network (VPN)

  • Bot/Botnet and Cyber Attacks

  • Malware Attack

  • Phishing Attack

  • Man-in-the-Middle Attack

  • SQL Injection Attack

  • Denial-of-Service Attack

  • Cryptojacking

  • Clickjacking

  • Deepfake

  • Ethical Hacking: White Hat / Black Hat

  • Database Forensics

  • The Sleuth Kit

  • Volatility

  • UFED (Universal Forensic Extraction Device)

  • Hashcat

  • Webinspect

  • Anti-Forensic Techniques

  • Email Crimes