Aim & Scope
  1. Technoarete Transactions on Recent Advances in Cyber Security and Digital Forensics (TTRACSDE) is a double-blinded peer-reviewed open access International Journal Published by Technoarete Publishing. The journal serves as a platform for researchers, security experts, academician and industry professional to disseminate their knowledge on information security over the internet, security attack and digital forensic authors will have an opportunity to publish their research on various aspects of cybersecurity-cryptography techniques, information hiding strategy, cyber security data analysis, IoT security, artificial intelligence based security mechanism, hardware security, cybercrime, Stenography, ethical hacking, cyber warfare, computer virology, digital document examination, digital crime detection and prevention strategies, Crime Scene imaging, intrusion detection strategy, Cyber law machine learning security, dark web and darknet,denial of service attack information, security traffic analysis, legal aspect of online security and privacy machine learning security, digital technology in big data security and privacy, authentication strategy, identity management technology, data anonymization technique, network security, security economics.
Subject Area

Related Topics:

  1. Cryptography
  2. Information hiding strategies
  3. Cyber security data analysis
  4. Iot security
  5. Artificial intelligence based security mechanisms
  6. Hardware security
  7. Cyber crime
  8. Phishing attack
  9. Digital image manipulation
  10. Stenography
  11. Ethical hacking
  12. Cyber warfare
  13. Digital crime detection and prevention strategies
  14. Computer virology
  15. Digital document examination
  16. Crime Scene imaging
  17. Intrusion detection strategies
  18. Cyber law
  19. Anti-forensics
  20. Secure mobile agents
  21. Machine learning security
  22. Botnets
  23. Dark web and darknet
  24. Digital forensic tools
  25. Attack pattern recognition
  26. Denial of service (DoS) attack
  27. Web traffic analysis
  28. Digital ledger Technology
  29. Big data security and privacy
  30. Authentication mechanism
  31. Identity management techniques
  32. Data anonymization techniques
  33. Network security
  34. Security economics