Researchers, consultants, progressive circle of readers from premier education bodies, Academicians and leading corporate etc.
State-of-the-art data architectures allow tremendous amount of private data available anywhere, everywhere and anytime, which is a big concern for data privacy and data security. i-manager’s Journal on Digital Forensics aims to disseminate the critical knowledge in cryptography and various other public and private key generation to strengthen data security and protect the privacy of individuals and corporate identities. The outcome of current and continuous research by academicians, collaborative corporate researches, and individual research scholars, will be published and this Journal will also address researches on prevention of complex cybercrimes such as network disruptions that are caused by miscreants with intentional financial gains or controlling international political order.
Total Resolution :
Unique DOIs :
We follow stringent publication ethics, and plagiarized papers are not published, and are withdrawn at any stage of the publishing process. Plagiarism is not limited to the Results and Discussion sections; it can involve any part of the manuscript, including figures and tables, in which material is copied from another publication without attestation, reference, or permission.
i-manager Publications follow transparent policies right from paper submission to publication through various well defined and time tested processes.Click Here
The Journal follows a double blind peer-review process. The submitted articles / research papers are reviewed by Professors/Educators in Engineering fields.
Click here to view the duties of Reviewers
For all copyright related queries contact email@example.com
This Journal is owned and managed by i-manager’s Educational Society. The Journal is self-supported by academic subscriptions and royalty from academic databases.
Data and Network Vulnerability
Security Threats and Risks
Virtual Private Network (VPN)
Bot/Botnet and Cyber Attacks
SQL Injection Attack
Ethical Hacking: White Hat / Black Hat
The Sleuth Kit
UFED (Universal Forensic Extraction Device)