International Journal of Cyber Threat Intelligence and Secure Networking (IJCTISN)
The International Journal of Cyber Threat Intelligence and Secure Networking (IJCTISN) is committed to maintaining high academic standards and ensuring the quality, integrity, and credibility of published research. All submitted manuscripts undergo a rigorous and transparent peer review process in accordance with international best practices and the principles recommended by the Committee on Publication Ethics (COPE).
1. Type of Peer Review
IJCTISN follows a double-blind peer review process:
-
The identities of authors are concealed from reviewers.
-
The identities of reviewers are concealed from authors.
This approach ensures fairness, objectivity, and unbiased evaluation of manuscripts.
2. Initial Editorial Screening
Upon submission, each manuscript is first reviewed by the editorial office to assess:
-
Relevance to the journal’s scope
-
Compliance with submission guidelines
-
Originality and ethical standards
-
Plagiarism and ethical concerns
Manuscripts that do not meet the basic requirements may be rejected without external review.
3. Reviewer Selection
-
Manuscripts passing the initial screening are assigned to at least two independent expert reviewers.
-
Reviewers are selected based on their subject expertise, research experience, and absence of conflicts of interest.
-
Authors may suggest potential reviewers; however, the final selection is at the discretion of the editorial board.
4. Review Criteria
Reviewers are requested to evaluate manuscripts based on the following criteria:
-
Originality and significance of the research
-
Technical quality and methodological rigor
-
Relevance to cyber threat intelligence and secure networking
-
Clarity of presentation and organization
-
Validity of results and conclusions
-
Ethical and security considerations, including responsible disclosure
5. Reviewer Responsibilities
Reviewers are expected to:
-
Treat all manuscripts as confidential documents
-
Provide objective, constructive, and timely feedback
-
Declare any conflicts of interest and decline the review if impartiality cannot be ensured
-
Avoid using unpublished material for personal advantage
6. Editorial Decision
Based on the reviewers’ reports, the editor will make one of the following decisions:
-
Accept
-
Minor Revision
-
Major Revision
-
Reject
The corresponding author will receive the reviewers’ comments and the editorial decision.
7. Revision Process
-
Authors must address all reviewer comments clearly and submit a revised manuscript within the specified timeframe.
-
A detailed response-to-reviewers document may be required.
-
Revised manuscripts may be sent back to the original reviewers for further evaluation.
8. Timelines
IJCTISN strives to ensure a timely review process while maintaining quality:
-
Initial editorial screening: typically within 7–10 days
-
Peer review: typically 2–4 weeks
Delays may occur depending on reviewer availability and manuscript complexity.
9. Confidentiality and Data Protection
-
All manuscripts and review communications are treated as confidential.
-
Reviewer reports are stored securely and used solely for editorial decision-making.
10. Ethical Oversight and Misconduct
-
Editors will investigate any allegations of misconduct, bias, or unethical behavior during peer review.
-
If ethical concerns are identified, IJCTISN will follow COPE guidelines and take appropriate action.
Conclusion
The peer review process of the International Journal of Cyber Threat Intelligence and Secure Networking is designed to ensure the publication of high-quality, reliable, and ethically sound research that contributes meaningfully to the advancement of cybersecurity and secure networking.