ISSN Print: 0000-0000
ISSN Online: 0000-0000 Impact Factor 2022
(Based on Google scholar citation)

i-manager's Journal on Digital Forensics & Cyber Security (JDF)

Safeguarding Confidentiality and Digital Privacy

Aims and Scope

State-of-the-art data architectures allow tremendous amount of private data available anywhere, everywhere and anytime, which is a big concern for data privacy and data security. i-manager’s Journal on Digital Forensics aims to disseminate the critical knowledge in cryptography and various other public and private key generation to strengthen data security and protect the privacy of individuals and corporate identities. The outcome of current and continuous research by academicians, collaborative corporate researches, and individual research scholars, will be published and this Journal will also address researches on prevention of complex cybercrimes such as network disruptions that are caused by miscreants with intentional financial gains or controlling international political order.

Total Resolution :
Unique DOIs :

Publication Ethics and Malpractice Statement

We follow stringent publication ethics, and plagiarized papers are not published, and are withdrawn at any stage of the publishing process. Plagiarism is not limited to the Results and Discussion sections; it can involve any part of the manuscript, including figures and tables, in which material is copied from another publication without attestation, reference, or permission.

Publication Ethics & Peer Review Policy

i-manager Publications follow transparent policies right from paper submission to publication through various well defined and time tested processes.

Click Here

Top DOIs/Recent DOIs

Review Procedure

The Journal follows a double blind peer-review process. The submitted articles / research papers are reviewed by Professors/Educators in Engineering fields.

Click here to view the duties of Reviewers

For all copyright related queries contact


Overall Topics Covered

  • Data and Network Vulnerability

  • Security Threats and Risks

  • Spyware

  • Social Engineering

  • Cryptocurrency

  • Virtual Private Network (VPN)

  • Bot/Botnet and Cyber Attacks

  • Malware Attack

  • Phishing Attack

  • Man-in-the-Middle Attack

  • SQL Injection Attack

  • Denial-of-Service Attack

  • Cryptojacking

  • Clickjacking

  • Deepfake

  • Ethical Hacking: White Hat / Black Hat

  • Database Forensics

  • The Sleuth Kit

  • Volatility

  • UFED (Universal Forensic Extraction Device)

  • Hashcat

  • Webinspect

  • Anti-Forensic Techniques

  • Email Crimes