International Journal of Forensics & Cybersecurity
The International Journal of Forensics and Cybersecurity is a resource base for individuals and groups working in various fields of Cyber Security, Hacking, Privacy, Trust, Forensics, and Cyber Warfare. We are open to contributions as high-standard papers, describing unpublished results of any kind of research; be it theoretical, conceptual, experimental or empirical. All submitted works will be peer-reviewed by the editors and the next volume of the journal will have published in it, the designated reviewers and the accepted works.
OPEN ACCESS JOURNAL
All publications are completely is Open Access. Readers have free Access to Published Articles
ZERO-PLAGIARISM
Plagiarism is Intellectual Property Theft and our Policies are Strongly against such practices
PEER-REVIEW
All articles are Peer-Reviewed. At reception, all manuscripts pass through a blind peer-review
Good Indexing
Published Articles is very visible on search engines. Each article meets optimum SEO rules
About IJFCS
The International Journal of Forensics and Cybersecurity is a resource base for individuals and groups working in various fields of Cyber Security, Hacking, Privacy, Trust, Forensics, and Cyber Warfare. We are open to contributions as high-standard papers, describing unpublished results of any kind of research; be it theoretical, conceptual, experimental or empirical. All submitted works will be peer-reviewed by the editors and the next volume of the journal will have published in it, the designated reviewers and the accepted works.
One of the top priorities of this journal is to increase the dissemination and utilization of information in the aforementioned fields, as well as increasing the visibility and ease of use of scientific materials. Therefore, authors are not required to make any payment for the publishing of their materials in the journal online, and readers and institutions have free access to the materials published. It is completely FREE OF CHARGE.
This journal’s content scope covers the following areas:
- wired and wireless network security and investigation
- cyber security
- hacking techniques
- database security and forensics
- cyber warfare
- cryptography, cryptography
- computer forensics, privacy
- trust, formal methods application in security and forensics
- data piracy
- mobile network security and forensics
- incident handling, malware forensics and steganography
- cybercrime
- cyber-terrorism.