Submissions

Login or Register to make a submission.

Author Guidelines

Overview

IJCPDT publishes peer-reviewed research on cybersecurity, privacy engineering, secure systems, digital identity, trust frameworks, and cyber resilience.

Manuscript Requirements

  • Manuscripts must be written in English.
  • Provide a 50 to 150 word abstract and 4 to 6 keywords.
  • Use the journal manuscript template and keep the paper within a recommended maximum of 10 double-column pages.
  • Describe threat models, assumptions, tooling, datasets, and validation procedures clearly.
  • Submit the manuscript in Word, RTF, or PDF. The editorial office may request an editable source file after acceptance.

Submission and Review Flow

  1. Prepare the manuscript using the IJCPDT template.
  2. Ensure the file is anonymized if the selected section requires blind review.
  3. Submit through the journal submission workflow in OJS.
  4. Editorial screening checks scope, formatting, originality, and completeness.
  5. Eligible manuscripts are reviewed by at least two independent reviewers.
  6. Revisions, the signed copyright form, and publication fee processing are completed only after acceptance.

Required Downloads

Journal-Specific Expectations

  • Confirm that all testing, data collection, and experimentation were authorized and lawful.
  • Provide enough detail to assess technical validity without exposing unnecessary operational risk.
  • Include responsible disclosure context when vulnerabilities or exploitable findings are discussed.

Publication Fee

USD 100 is charged only for accepted papers. No submission fee is charged.

Submission Preparation Checklist

All submissions must meet the following requirements.

  • The manuscript is original, has not been published previously, and is not under review elsewhere.
  • The submission file is in Word, RTF, or PDF format and follows the journal template referenced in the Author Guidelines.
  • The manuscript includes title, abstract, keywords, main text, references, and any required statements on funding, conflicts of interest, and data or code availability.
  • Threat model, environment, tools, assumptions, and validation procedure are described clearly.
  • Any experiments, scans, penetration tests, or exploit development were conducted with lawful authorization and ethical safeguards.
  • Vulnerability details are handled responsibly and do not introduce unnecessary operational risk.
  • Blind-review instructions have been followed where required.

Privacy Statement

The names, affiliations, and email addresses entered in this journal site will be used only for editorial processing, peer review administration, publication, indexing, archiving, and communication related to this journal. They will not be used for unrelated purposes or shared with third parties except where required for publication, indexing, archiving, payment processing, or secure system administration.