about the journal
Plagiarism and borrowing
Main areas
JOURNAL POLICY
GOAL AND THEMATIC AREAS
1 Information Security and Data Protection
  • Information security
  • Cyber threats and malware
  • Information security tools (ISS)
  • Hardware security and system reliability
  • Cryptography
  • Digital forensics
2 Information and Communication Technologies and Telecommunications
  • ICT
  • Telecommunications
  • Internet of Things (IoT)
  • Hardware and embedded systems
3 IT Applications and Emerging Technologies
  • IT in education and management
  • Design automation and advanced manufacturing technologies
All articles are checked for plagiarism before publication using plagiarism detection systems. The originality level must be at least 80% .
If a significant amount of borrowed material is identified, the editorial board has the right to reject the article and notify the author.
The editorial board follows the principles of publication ethics as outlined in the COPE (Committee on Publication Ethics) guidelines and adheres to the best practices of international scientific journals.
The journal complies with the norms of responsible academic citation, prohibits falsification and fabrication of data, and promotes respect for intellectual property.
Publication ethics
All submitted manuscripts undergo a preliminary review by the editorial board to assess compliance with the subject area and academic standards. Upon approval, they are sent for double-blind peer review .
The review is carried out by two independent experts in the relevant field. The identities of the authors and reviewers remain anonymous at all stages.
The editorial board reserves the right to make the final decision on publication based on the reviews, considering the objectivity, professionalism, and reasoning provided by the reviewers.
Peer review
TSARKA REVIEW is an open access journal, which means the right to freely read, download, distribute, and use published materials under the terms of the Creative Commons license.
Published articles are distributed under the CC BY-NC-ND license (Attribution — NonCommercial — NoDerivatives).
Authors publishing in the journal agree to the following terms:
  • The author retains copyright and grants the journal the right of first publication.
  • Authors may enter into separate agreements for non-exclusive distribution, provided the original publication in the journal is cited.
  • The article may be placed in institutional repositories with a reference to the original source.
Copyright policy
The TSARKA REVIEW journal adheres to an open access policy. All articles published in the journal are freely available on its official website. Issue archives are also available free of charge and without restrictions.
The journal uses the LOCKSS system (Lots of Copies Keep Stuff Safe) to ensure long-term storage and recovery of published materials through a distributed archiving system.
Open access and archiving policy
The main goal of the journal is to promote the dissemination of scientific knowledge and innovations in the field of cybersecurity, as well as to support young researchers and specialists. We strive to foster professional dialogue between the scientific community, developers, and industry representatives.