Journal Information
International Journal of Cyber-Security and Digital Forensics (IJCSDF)
http://sdiwc.net/security-journal/
Publisher:
SDIWC
ISSN:
2305-0012
Viewed:
18440
Tracked:
0
Call For Papers
The International Journal of Cyber-Security and Digital Forensics (IJCSDF) is a knowledge resource for practitioners, scientists, and researchers among others working in various fields of Cyber Security, Privacy, Trust, Digital Forensics, Hacking, and Cyber Warfare. We welcome original contributions as high quality technical papers (full and short) describing original unpublished results of theoretical, empirical, conceptual or experimental research. All submitted papers will be peer-reviewed by members of the editorial board and selected reviewers and those accepted will be published in the next volume of the journal.

As one of the most important aims of this journal is to increase the usage and impact of knowledge as well as increasing the visibility and ease of use of scientific materials, IJCSDF does NOT CHARGE authors for any publication fee for online publishing of their materials in the journal and does NOT CHARGE readers or their institutions for accessing to the published materials! 

The main objectives of this journal with regard to security, privacy, digital forensics, hacking, and cyber warfare are as follows:

    Encouraging the study, improve the practice, and advance the knowledge;
    Providing the intended audiences with the latest advancements;
    Transferring the knowledge;
    Closing the gap between academia and the industry;
    Providing trusted source of knowledge;
    Encouraging talents and innovations;
    Supporting collaboration and communication;
    Encouraging the applied research.

The IJCSDF scope is included but not limited to: cyber security, computer forensics, privacy, trust, hacking techniques, cyber warfare, cryptography, cybercrime, cyber-terrorism, cryptography, formal methods application in security and forensics, data piracy, database security and forensics, wired and wireless network security and investigation, mobile network security and forensics, incident handling, malware forensics, steganography.
Last updated by Dou Sun in 2013-10-05
Related Journals
CCFFull NameImpact FactorPublisherISSN
bIEEE Transactions on Cybernetics10.5IEEE2168-2267
cJournal of Information Security and Applications3.7Elsevier2214-2126
cJournal of Cybersecurity3.2Oxford University Press2057-2093
Computer Law & Security Review3.2Elsevier0267-3649
cComputer Law and Security Review3.2Elsevier0267-3649
IEEE Security & Privacy3.0IEEE1540-7993
Circuits, Systems, and Signal Processing2.0Springer0278-081X
International Journal on Digital Libraries1.7Springer1432-5012
Security and Privacy1.500John Wiley & Sons Ltd2475-6725
IET Computers and Digital Techniques0.484IET1751-8601
Related Conferences
CCFCOREQUALISShortFull NameSubmissionNotificationConference
baCSFIEEE Computer Security Foundations Symposium2026-01-292026-04-012026-07-26
aa*S&PIEEE Symposium on Security and Privacy2025-11-132026-03-192026-05-18
cIFIP WG 11.9IFIP WG 11.9 International Conference on Digital Forensics2025-09-302025-10-302026-01-05
a*a2JCDLJoint Conference on Digital Libraries2025-09-122025-10-312025-12-15
cICDF2CEAI International Conference on Digital Forensics & Cyber Crime2025-06-252025-07-252025-11-17
baa1ACSACAnnual Computer Security Applications Conference 2025-05-302025-09-032025-12-09
bTrustBusInternational Conference on Trust, Privacy, and Security in Digital Business2022-03-072022-05-102022-08-22
cDFRWSDigital Forensics Research Conference2017-10-152017-12-182018-03-21
b4IMFInternational Conference on IT Security Incident Management and IT Forensics2016-10-022016-12-182017-03-21
cb3ICIDSInternational Conference on Interactive Digital Storytelling2015-07-062015-08-212015-11-30