International Journal of Cyber Threat Intelligence and Secure Networking (IJCTISN)
Welcome to the International Journal of Cyber Threat Intelligence and Secure Networking (IJCTISN). The journal publishes original research articles, review papers, technical reports, and case studies that advance knowledge in cybersecurity, cyber threat intelligence, network security, and secure digital infrastructures.
Authors are requested to carefully read and follow the instructions below to ensure a smooth submission, review, and publication process.
1. Manuscript Preparation
1.1 General Formatting
-
Manuscripts must be prepared in English.
-
Use 12-point Times New Roman font, double-spaced.
-
Margins should be 1 inch (2.54 cm) on all sides.
-
Paper size: A4.
-
Pages should be numbered consecutively.
1.2 Manuscript Length
-
Original Research Articles: up to 8,000 words, including references, tables, and figures.
-
Review Articles: up to 12,000 words.
-
Short Communications / Case Studies: up to 4,000 words.
2. Structure of the Manuscript
Manuscripts should be organized in the following order:
2.1 Title Page
-
Title of the manuscript (clear and concise)
-
Full names of all authors
-
Institutional affiliations
-
Corresponding author’s email address
2.2 Abstract
-
A structured abstract of up to 250 words summarizing objectives, methodology, key findings, and conclusions.
2.3 Keywords
-
Provide 4–6 keywords relevant to the manuscript.
2.4 Main Text
The main manuscript should include clearly defined sections such as:
-
Introduction
-
Related Work / Literature Review
-
Methodology
-
Results / Analysis
-
Discussion
-
Conclusion and Future Work
2.5 References
-
All references must be listed at the end of the manuscript.
-
Ensure all in-text citations appear in the reference list.
3. Figures and Tables
-
Figures and tables must be numbered consecutively (Figure 1, Table 1, etc.).
-
Each figure and table must have a descriptive caption.
-
Figures should be submitted in high resolution (minimum 300 dpi).
-
Acceptable formats: JPEG, PNG, TIFF.
4. Citation and Referencing Style
-
IJCTISN follows the APA citation style.
-
Authors are responsible for the accuracy and completeness of all references.
5. Ethical and Security Considerations
-
Manuscripts must comply with the journal’s Publication Ethics and Plagiarism Policy.
-
Research involving cyber threats, vulnerabilities, or exploits must follow responsible disclosure practices.
-
Sensitive information that may pose security, legal, or privacy risks should not be disclosed.
6. Submission Process
-
Manuscripts must be submitted electronically through the journal’s online submission system.
-
Authors may suggest potential reviewers; however, the final selection rests with the editorial board.
-
A confirmation email will be sent upon successful submission.
7. Peer Review Process
-
IJCTISN operates a double-blind peer review process.
-
Authors will be notified of one of the following decisions: acceptance, minor revision, major revision, or rejection.
-
Revised manuscripts must be submitted within the timeframe specified by the editor.
8. Plagiarism Screening
-
All submissions are screened using plagiarism detection software.
-
Manuscripts with significant similarity will be rejected or returned for clarification.
9. Open Access Policy
-
IJCTISN is an Open Access journal.
-
All accepted articles are freely available online immediately upon publication.
10. Article Processing Charges
-
An Article Processing Fee (APF) may apply to accepted manuscripts.
-
Detailed information on fees, discounts, and waivers is available on the journal’s APF page.
11. Manuscript Withdrawal
-
Manuscripts may not be withdrawn after submission without prior approval from the editorial board.