Join us an Editorial Board member/Reviewer Click Here

The Technoarete Transactions on Recent Advances in Cybersecurity and Digital Forensics journal is an open access, double-blind peer-reviewed journal that is devoted to publishing pioneering and groundbreaking research findings, outcomes, and studies being carried out by talented and gifted researchers, academics, scientists, scholars and other professionals engaged in the disciplines of Biomedical engineering.

TTRACDF is a leading interdisciplinary journal whose sole purpose is to facilitate the dissemination of theoretical, experimental and applied research outcomes being accrued by professionals carrying out exploratory and analytical studies across all specializations of Biomedical Engineering.

No Bars On Access & Author Rights

The fact that TTRACDF is an open-access journal means that anyone from any part of the world can gain access to entire issues at any time, by paying a visit to Not only is there no need for one to subscribe to get access, but additionally all authors also get to hold on to the copyrights of all their published work.

Paramount Importance To Research Of The Highest Quality

TTRACDF is highly sought after all across the globe, because of the fact that all research published herein, is carefully vetted by a dedicated reviewing committee for its accuracy, authenticity, relevance, up-to-dateness, and significance. That is why readers of TTRACDF rest assured that any and all research data, outcomes, and findings that are published here, are of the highest quality.

Facilitating Speedy Publication Of Groundbreaking Research

TTRACDF is a bi-annual journal, meaning that two issues are published yearly. When it comes to submission, reviewing and publication timelines, it takes on average eight weeks between the submission of an article/paper and acceptance (after reviewing), and subsequently, about four weeks between acceptance and publication of the article/paper.

Aim & Scope
  1. Technoarete Transactions on Recent Advances in Cyber Security and Digital Forensics (TTRACSDE) is a double-blinded peer-reviewed open access International Journal Published by Technoarete Publishing. The journal serves as a platform for researchers, security experts, academician and industry professional to disseminate their knowledge on information security over the internet, security attack and digital forensic authors will have an opportunity to publish their research on various aspects of cybersecurity-cryptography techniques, information hiding strategy, cyber security data analysis, IoT security, artificial intelligence based security mechanism, hardware security, cybercrime, Stenography, ethical hacking, cyber warfare, computer virology, digital document examination, digital crime detection and prevention strategies, Crime Scene imaging, intrusion detection strategy, Cyber law machine learning security, dark web and darknet,denial of service attack information, security traffic analysis, legal aspect of online security and privacy machine learning security, digital technology in big data security and privacy, authentication strategy, identity management technology, data anonymization technique, network security, security economics.
Subject Area

Related Topics:

  1. Cryptography
  2. Information hiding strategies
  3. Cyber security data analysis
  4. Iot security
  5. Artificial intelligence based security mechanisms
  6. Hardware security
  7. Cyber crime
  8. Phishing attack
  9. Digital image manipulation
  10. Stenography
  11. Ethical hacking
  12. Cyber warfare
  13. Digital crime detection and prevention strategies
  14. Computer virology
  15. Digital document examination
  16. Crime Scene imaging
  17. Intrusion detection strategies
  18. Cyber law
  19. Anti-forensics
  20. Secure mobile agents
  21. Machine learning security
  22. Botnets
  23. Dark web and darknet
  24. Digital forensic tools
  25. Attack pattern recognition
  26. Denial of service (DoS) attack
  27. Web traffic analysis
  28. Digital ledger Technology
  29. Big data security and privacy
  30. Authentication mechanism
  31. Identity management techniques
  32. Data anonymization techniques
  33. Network security
  34. Security economics