Journal Navigation
International Journal of Digital Crime and Forensics (IJDCF)
Emerging Sources Citation Index

International Journal of Digital Crime and Forensics (IJDCF)

This journal was converted to full Gold Open Access on January 1, 2021
Editor-in-Chief: Feng Liu (Chinese Academy of Sciences, China)
Indexed In: Compendex (Elsevier Engineering Index), INSPEC, SCOPUS, Web of Science Emerging Sources Citation Index (ESCI) and 16 more indices
Published: Continuous Volume |Established: 2009
ISSN: 1941-6210|EISSN: 1941-6229|DOI: 10.4018/IJDCF
Journal Metrics
Submission to Acceptance: Approx. 14 - 18 Weeks
Acceptance to Publication: Approx. 8 - 12 Weeks
Acceptance Rate: 22%
Latest Published Articles
Published: Apr 25, 2022
DOI: 10.4018/IJDCF.302871
Volume 14
Role-based access control(RBAC) system has been widely used in data security because of its good flexibility and security, wherein RBAC dominates the field of access control. However, the process of... Show More
Download (PDF): Article
Add to Your Personal Library: Article
Cite Article

MLA

Chen, Wan,et al. "A Model Study on Hierarchical Assisted Exploration of RBAC." vol.14, no.2 2022: pp.1-13. http://doi.org/10.4018/IJDCF.302871

APA

Chen, W., Han, D., Zhang, L., Xiao, Q., Li, Q., & Xiang, H. (2022). A Model Study on Hierarchical Assisted Exploration of RBAC. , 14(2), 1-13. http://doi.org/10.4018/IJDCF.302871

Chicago

Chen, Wan and Daojun Han, Lei Zhang, Qi Xiao, Qiuyue Li, and Hongzhen Xiang. "A Model Study on Hierarchical Assisted Exploration of RBAC," 14, no.2: 1-13. http://doi.org/10.4018/IJDCF.302871

Export Reference

Mendeley
Published: Apr 25, 2022
DOI: 10.4018/IJDCF.302872
Volume 14
With the development of artificial intelligence, there are more and more applications related to face images. The recording of face information causes potential cyber security risks and personal... Show More
Download (PDF): Article
Add to Your Personal Library: Article
Cite Article

MLA

Wang, Jing,et al. "Face Anonymity Based on Facial Pose Consistency." vol.14, no.2 2022: pp.1-12. http://doi.org/10.4018/IJDCF.302872

APA

Wang, J., Gan, J., Wang, J., Zhou, J., & Lu, Z. (2022). Face Anonymity Based on Facial Pose Consistency. , 14(2), 1-12. http://doi.org/10.4018/IJDCF.302872

Chicago

Wang, Jing and Jianhou Gan, Jun Wang, Juxiang Zhou, and Zeguang Lu. "Face Anonymity Based on Facial Pose Consistency," 14, no.2: 1-12. http://doi.org/10.4018/IJDCF.302872

Export Reference

Mendeley
Published: Apr 25, 2022
DOI: 10.4018/IJDCF.302874
Volume 14
The Industrial Control System (ICS) has become the key concept in the modern industrial world, enabling process monitoring and system control for general industrial systems and critical... Show More
Download (PDF): Article
Add to Your Personal Library: Article
Cite Article

MLA

Zhang, Shaobo,et al. "A Novel IDS Securing Industrial Control System of Critical Infrastructure Using Deception Technology." vol.14, no.2 2022: pp.1-20. http://doi.org/10.4018/IJDCF.302874

APA

Zhang, S., Liu, Y., & Yang, D. (2022). A Novel IDS Securing Industrial Control System of Critical Infrastructure Using Deception Technology. , 14(2), 1-20. http://doi.org/10.4018/IJDCF.302874

Chicago

Zhang, Shaobo and Yuhang Liu, and Dequan Yang. "A Novel IDS Securing Industrial Control System of Critical Infrastructure Using Deception Technology," 14, no.2: 1-20. http://doi.org/10.4018/IJDCF.302874

Export Reference

Mendeley
Description, Mission, Scope & Coverage
Description:
The International Journal of Digital Crime and Forensics (IJDCF) provides state-of-the-art coverage in the development of legal evidence found in computers and electronic storage mediums including the use of electronic devices and software for crime prevention, investigation, and the application... Show More
Mission & Scope:
The mission of the International Journal of Digital Crime and Forensics (IJDCF) is to provide and foster a forum for advancing research and development of the theory and practice of digital crime prevention and forensics. IJDCF addresses a broad range of digital crimes and forensic disciplines that use electronic devices and software for crime prevention and investigation. This journal informs a... Show More
Coverage:
  • Computational Approaches to Digital Crime Preventions
  • Computer Virology
  • Crime Scene Imaging
  • Criminal Investigative Criteria and Standard of Procedure on Computer Crime
  • Cryptological Techniques and Tools for Crime Investigation
  • Data Carving and Recovery
  • Digital Document Examination
  • Digital Evidence
  • Digital Signal Processing Techniques for Crime Investigations
  • Identity Theft and Biometrics
  • Information Warfare
  • Machine Learning, Data Mining, and Information Retrieval for Crime Prevention and Forensics
  • Malicious Codes
  • Network Access Control and Intrusion Detection
  • Policy, Standards, Protocols, Accreditation, Certification, and Ethical Issues Related to Digital Crime and Forensics
  • Practical Case Studies and Reports, Legislative Developments, and Limitations, Law Enforcement
  • Small Digital Device Forensics (Cell Phones, Smartphone, PDAs, Audio/Video Devices, Cameras, Flash Drives, Gaming Devices, GPS Devices, etc.)
  • Steganography and Steganalysis
  • Terrorism Knowledge Portals and Databases
  • Terrorism-Related Analytical Methodologies and Software Tools
  • Terrorist Incident Chronology Databases
  • Watermarking for Digital Forensics
Editorial Board

Editorial Board

Editor in Chief
Feng Liu, Chinese Academy of Sciences, China
Associate Editors
Fangjun Huang, San Yat-sen University, China
Fei Peng, Hunan University, China
Ju Liu, Shandong University, China
Kam Pui Chow, The University of Hong Kong, China
Manoranjan Mohanty, The University of Auckland, New Zealand
Sang-Bing Tsai, Wuyi University, China; International Engineering and Technology Institute, Hong Kong, Taiwan ORCIDhttps://orcid.org/0000-0001-6988-5829
Vinayakumar Ravi, Prince Mohammad Bin Fahd University, United States ORCIDhttps://orcid.org/0000-0001-6873-6469
Wei Lu, Sun Yat-sen University, China ORCIDhttps://orcid.org/0000-0002-4068-1766
Xinguo Yu, Central China Normal University Wollongong Joint Institute, China
Xuehu Yan, National University of Defense Technology, China ORCIDhttps://orcid.org/0000-0001-6388-1720
Xuping Huang, Advanced Institute of Industrial Technology, Japan
Yassine Maleh, Sultan Moulay Slimane University, Morocco ORCIDhttps://orcid.org/0000-0003-4704-5364
Editorial Review Board
Abdelkrim Haqiq, Hassan 1st University, Faculty of Sciences and Techniques, Morocco ORCIDhttps://orcid.org/0000-0002-8857-6586
Abiola Ilori, Olusegun Agagu University of Science and Technology, Nigeria
Aditya Sahu, Vignan University, India ORCIDhttps://orcid.org/0000-0003-4257-0688
Agnivesh Pandey, DAV College, CSJM University, Kanpur, India
Amita Verma, Panjab University, India
Angelina Gokhale, None at present, India ORCIDhttps://orcid.org/0000-0002-5540-3793
Antonio Muñoz, University of Málaga, Spain ORCIDhttps://orcid.org/0000-0002-6751-0625
Bin He, Central China Normal University, China ORCIDhttps://orcid.org/0000-0003-2088-8193
Chiba Zouhair, Faculty of Sciences Ain Chock - Hassan II University of Casablanca Morocco, Morocco ORCIDhttps://orcid.org/0000-0002-6200-0087
Chuan Qin, University of Shanghai for Science and Technology, China
Dharmaraj Patil, R. C. Patel Institute of Technology, India ORCIDhttps://orcid.org/0000-0001-7634-2769
Diqun Yan, Ningbo University, China ORCIDhttps://orcid.org/0000-0002-5241-7276
Faouzi Kamoun, ESPRIT, Tunisia ORCIDhttps://orcid.org/0000-0002-3740-1452
Guanglu Sun, Harbin University of Science and Technology, China
Gulshan Shrivastava, Sharda University, India ORCIDhttps://orcid.org/0000-0003-3671-4921
Guozi Sun, Nanjing University of Posts and Telecommunications, China
Gyu-Sang Cho, Dongyang University, Korea, Republic Of
Hamad Naeem, Neijiang Normal University, China ORCIDhttps://orcid.org/0000-0003-1511-218X
Hanzhou Wu, Shanghai University, China
Hao Hu, Zhengzhou Information Science and Technology Institute, China
Hongxia Wang, Sichuan University, China
Hui Lu, Institute of Microelectronics (IME) of the Chinese Academy of Sciences (CAS), China
Irene Portela, Polytechnic Institute of Cávado and Ave, Portugal
Jiaxi Wu, Institute of Electrical and Electronics Engineers (IEEE), China
Jinwei Wang, School of Computer and Software, Nanjing University of Information Science and Technology, China
Jiwei Zhang, Beijing University of Posts and Telecommunications, China ORCIDhttps://orcid.org/0000-0002-8910-2382
Lidong Zhai, Chinese Academy of Sciences, China
Lin Gao, School of Computer and Information Engineering, Tianjin Chengjian University, China ORCIDhttps://orcid.org/0000-0001-9047-1567
Lingchen Gu, Shandong University, China
Manoj Kumar, University of Petroleum and Energy Studies (UPES), India ORCIDhttps://orcid.org/0000-0001-5113-0639
Melvin de la Cruz, University of Baltimore, United States
Nilay Mistry, Gujarat Forensic Sciences University, India ORCIDhttps://orcid.org/0000-0001-5683-3499
Nisha T N, Sybiosis International University, India ORCIDhttps://orcid.org/0000-0002-3197-6271
Paul Joseph, Vellore Institute of Technology, India ORCIDhttps://orcid.org/0000-0003-2897-212X
Peng Li, North China Electric Power University, China
Pengfei Xue, National University of Defense Technology, China
Pradeep Atrey, State University of New York, United States
Rahmani Mohamed Elhadi, GeCoDe Laboratory, Dr. Tahar Moulay University of Saida, Algeria ORCIDhttps://orcid.org/0000-0001-5924-9888
Salam Abdulnabi Thajeel, University of Technology: Baghdad, Iraq ORCIDhttps://orcid.org/0000-0003-0403-9175
Satya Prakash, National Law Institute University, India
Sharada Valiveti, Nirma University, India ORCIDhttps://orcid.org/0000-0003-4774-4624
Sunil Chawla, Chandigarh University, India ORCIDhttps://orcid.org/0000-0001-5316-3039
Tiegang Gao, Nankai University, China
Utkarsh Saxena, Amity University, India
Vijay Sinha, CGC, Landran, India ORCIDhttps://orcid.org/0000-0002-2384-9109
Weiming Zhang, University of Science and Technology of China, China
Wen Wang, Chinese Academy of Sciences, China
Xianjun Hu, Purple Mountain Laboratories, China ORCIDhttps://orcid.org/0000-0002-2784-2588
Yexia Cheng, China Mobile Research Institute, China
Yiming Xue, China Agricultural University, China
Yudi Prayudi, Islamic University of Indonesia, Indonesia ORCIDhttps://orcid.org/0000-0002-2526-8009
Zeguang Lu, Yunnan Normal University, China
Zuquan Liu, Shenzhen Institute of Advanced Technology, Chinese Academy of Sciences, China ORCIDhttps://orcid.org/0000-0002-5819-1298
International Advisory Board
Chang-Tsun Li, University of Warwick, United Kingdom
Kun Sun, George Mason University, United States
Nhien-An Le-Khac, University College Dublin, Ireland ORCIDhttps://orcid.org/0000-0003-4373-2212
Wei Qi Yan, Auckland University of Technology, New Zealand
Xianfeng Zhao, Chinese Academy of Sciences, China ORCIDhttps://orcid.org/0000-0002-5617-8399
International Ambassadors
Cheng Huang, Sichuan University, China
Chunhua Su, University of AIZU, Japan
Liping Ding, Digital Forensics Lab, Institute of Software Application Technology, Guangzhou & Chinese Academy of, China
Shouhuai Xu, University of Colorado Colorado Springs, United States
Editorial Policy
IGI Global holds its journals to the highest ethical practices. View Full Editorial Policy
IGI Global Open Access
As an academic publisher at the forefront of advancement for over 30 years, IGI Global OA provides quality, expediate OA publishing with a top-of-the-line production system backed by the international Committee on Publication Ethics (COPE). With a streamlined publishing process, flexible funding options, and more, researchers can freely and immediately share their peer-reviewed research with the world.
  • Rigorous and Expediate Publishing Process
  • Research Is Fully Free and Accessible to All (Creative Commons BY License)
  • Increased Discoverability of Published Content (89% Higher Download Rate)
  • Acceleration of Citation Impact & Increased Indexing Potential
  • Greater Visibility & Wider Professional Recognition
  • Opportunities for Networking & Collaboration
  • Supports Overall Career Advancement
  • Affordable Article/Chapter Processing Charges (APCs/CPCs) (Starting at US$ 500)
  • And More.
Article Processing Charges
Article Processing Charge (APC):

Payment of the APC fee (directly to the publisher) by the author or a funding body is not required until AFTER the manuscript has gone through the full double-blind peer review process and the Editor(s)-in-Chief at his/her/their full discretion has/have decided to accept the manuscript based on the results of the double-blind peer review process. 
Please note that IGI Global cannot schedule the article for publication or publish the article until payment has been received. It is also important to note that in scholarly publishing, utilizing an open access journal's resources and time with no intent to pay the open access Article Processing Charge (APC) if the article manuscript is accepted following the peer review process is considered to be unethical and exploitative.

What Does IGI Global's Open Access APC Cover?

In the traditional subscription-based model, the cost to the publisher to produce each article is covered by the revenue generated by journal subscriptions. Under OA, all the articles are published under a Creative Commons (CC BY) license; therefore, the authors or funding body will pay a one-time article processing charge (APC) to offset the costs of all of the activities associated with the publication of the article manuscript, including:

  • Digital tools used to support the manuscript management and review process
  • Typesetting, formatting and layout
  • Online hosting
  • Submission of the journal's content to numerous abstracts, directories, and indexes
  • Third-party software (e.g. plagiarism checks)
  • Editorial support which includes manuscript tracking, communications, submission guideline checks, and communications with authors and reviewers
  • All promotional support and activities which include metadata distribution, press releases, promotional communications, web content, ads, fliers, brochures, postcards, etc. for the journal and its published contents
  • The fact that all published articles will be freely accessible and able to be posted and disseminated widely by
    the authors
  • Professional line-by-line English language copy editing and proofreading*

*This service is only performed on article manuscripts with fully paid (not discounted or waived) APC fees.

APC Subsidizing and Funding

To assist researchers in covering the costs of the APC in OA publishing, there are various sources of OA funding. Additionally, unlike many other publishers, IGI Global offers flexible subsidies, 100% Open Access APC funding, discounts, and more. Learn More

Open Access Funding Resources
IGI Global recognizes that many researchers may not know where to begin when searching for OA funding opportunities. IGI Global recently launched an Open Access Funding Resources page for researchers to browse. This page provides a comprehensive list of OA funding sources available for researchers to secure funds for their various OA publications.
Submit to This Journal
This journal is currently actively seeking new submissions. Interested authors should ensure that their article manuscript adheres to the journal's submission guidelines and utilize the journal article template, which include originality of the manuscript, professional English language copy editing, APA formatting tips, and more. To submit an article for consideration, please begin the submission process below.
Contact
All inquiries regarding IJDCF should be directed to the attention of:

Feng Liu
Editors-in-Chief
International Journal of Digital Crime and Forensics
E-mails: liufeng@iie.ac.cn
Editorial Office
701 E. Chocolate Ave.
Hershey, PA 17033, USA
717-533-8845 x100
Archiving
All of IGI Global's content is archived via the CLOCKSS and LOCKSS initiative. Additionally, all IGI Global published content is available in IGI Global's InfoSci® platform.