[COVID19-BANNER position="bottom" confirmed_title="Cases" deaths_title="Deaths" recovered_title="Recovered" active_title="Active"]

International Journal of Forensics & Cybersecurity | IJFCS

International Journal of Forensics & Cybersecurity

The International Journal of Forensics and Cybersecurity is a resource base for individuals and groups working in various fields of Cyber Security, Hacking, Privacy, Trust, Forensics, and Cyber Warfare. We are open to contributions as high-standard papers, describing unpublished results of any kind of research; be it theoretical, conceptual, experimental or empirical. All submitted works will be peer-reviewed by the editors and the next volume of the journal will have published in it, the designated reviewers and the accepted works.

OPEN ACCESS JOURNAL

All publications are completely is Open Access. Readers have free Access to Published Articles

ZERO-PLAGIARISM

Plagiarism is Intellectual Property Theft and our Policies are Strongly against such practices

PEER-REVIEW

All articles are Peer-Reviewed. At reception, all manuscripts pass through a blind peer-review

Good Indexing

Published Articles is very visible on search engines. Each article meets optimum SEO rules

About IJFCS

The International Journal of Forensics and Cybersecurity is a resource base for individuals and groups working in various fields of Cyber Security, Hacking, Privacy, Trust, Forensics, and Cyber Warfare. We are open to contributions as high-standard papers, describing unpublished results of any kind of research; be it theoretical, conceptual, experimental or empirical. All submitted works will be peer-reviewed by the editors and the next volume of the journal will have published in it, the designated reviewers and the accepted works.

One of the top priorities of this journal is to increase the dissemination and utilization of information in the aforementioned fields, as well as increasing the visibility and ease of use of scientific materials. Therefore, authors are not required to make any payment for the publishing of their materials in the journal online, and readers and institutions have free access to the materials published. It is completely FREE OF CHARGE.

This journal’s content scope covers the following areas:

  • wired and wireless network security and investigation
  • cyber security
  • hacking techniques
  • database security and forensics
  • cyber warfare
  • cryptography, cryptography
  • computer forensics, privacy
  • trust, formal methods application in security and forensics
  • data piracy
  • mobile network security and forensics
  • incident handling, malware forensics and steganography
  • cybercrime
  • cyber-terrorism.
PLAGIARISM POLICY
Plagiarism is an Academic Theft. Authors should carefully test their works to make sure it passes a general plagiarism test of at least 75% originality of which the 25% plagiarized content should be quoted statements or References. More so, no part (phrase, paragraph, page) of the submitted manuscript should be source weblinks without proper citation. This will also be considered as plagiarism. Such manuscript will be decided upon by our reviewers whether to reject absolutely or not.
REVIEW POLICY
Submitted manuscripts will be reviewed and decided upon within 5 working days of submission. Each manuscript will be reviewed by at least 2 (two) reviewers and decisions sent via email to the corresponding Author.
Carousel Post: No posts found