State-of-the-art data architectures allow tremendous amount of private data available anywhere, everywhere and anytime, which is a big concern for data privacy and data security. i-manager’s Journal on Digital Forensics aims to disseminate the critical knowledge in cryptography and various other public and private key generation to strengthen data security and protect the privacy of individuals and corporate identities. The outcome of current and continuous research by academicians, collaborative corporate researches, and individual research scholars, will be published and this Journal will also address researches on prevention of complex cybercrimes such as network disruptions that are caused by miscreants with intentional financial gains or controlling international political order.
Total Resolution :
Unique DOIs :
We follow stringent publication ethics, and plagiarized papers are not published, and are withdrawn at any stage of the publishing process. Plagiarism is not limited to the Results and Discussion sections; it can involve any part of the manuscript, including figures and tables, in which material is copied from another publication without attestation, reference, or permission.
i-manager Publications follow transparent policies right from paper submission to publication through various well defined and time tested processes.
Click HereThe Journal follows a double blind peer-review process. The submitted articles / research papers are reviewed by Professors/Educators in Engineering fields.
Click here to view the duties of Reviewers
For all copyright related queries contact info@imanagerpublications.com
Data and Network Vulnerability
Security Threats and Risks
Spyware
Social Engineering
Cryptocurrency
Virtual Private Network (VPN)
Bot/Botnet and Cyber Attacks
Malware Attack
Phishing Attack
Man-in-the-Middle Attack
SQL Injection Attack
Denial-of-Service Attack
Cryptojacking
Clickjacking
Deepfake
Ethical Hacking: White Hat / Black Hat
Database Forensics
The Sleuth Kit
Volatility
UFED (Universal Forensic Extraction Device)
Hashcat
Webinspect
Anti-Forensic Techniques
Email Crimes