These tools will no longer be maintained as of December 31, 2024. Archived website can be found here. PubMed4Hh GitHub repository can be found here. Contact NLM Customer Service if you have questions.


BIOMARKERS

Molecular Biopsy of Human Tumors

- a resource for Precision Medicine *

217 related articles for article (PubMed ID: 28397175)

  • 1. Detecting Hijacked Journals by Using Classification Algorithms.
    Andoohgin Shahri M; Jazi MD; Borchardt G; Dadkhah M
    Sci Eng Ethics; 2018 Apr; 24(2):655-668. PubMed ID: 28397175
    [TBL] [Abstract][Full Text] [Related]  

  • 2. Hijacked scientific journals: a warning to researchers.
    Martins TG; Costa AL; Moncada FJ; Martins RV
    Einstein (Sao Paulo); 2016; 14(1):113. PubMed ID: 27074242
    [No Abstract]   [Full Text] [Related]  

  • 3. Predatory Journals Spamming for Publications: What Should Researchers Do?
    Memon AR
    Sci Eng Ethics; 2018 Oct; 24(5):1617-1639. PubMed ID: 28815439
    [TBL] [Abstract][Full Text] [Related]  

  • 4. Identity Theft in the Academic World Leads to Junk Science.
    Dadkhah M; Lagzian M; Borchardt G
    Sci Eng Ethics; 2018 Feb; 24(1):287-290. PubMed ID: 28074375
    [TBL] [Abstract][Full Text] [Related]  

  • 5. Characteristics of Hijacked Journals and Predatory Publishers: Our Observations in the Academic World.
    Dadkhah M; Maliszewski T; Jazi MD
    Trends Pharmacol Sci; 2016 Jun; 37(6):415-418. PubMed ID: 27211004
    [TBL] [Abstract][Full Text] [Related]  

  • 6. Hijacked journals, hijacked web-sites, journal phishing, misleading metrics, and predatory publishing: actual and potential threats to academic integrity and publishing ethics.
    Dadkhah M; Maliszewski T; Teixeira da Silva JA
    Forensic Sci Med Pathol; 2016 Sep; 12(3):353-62. PubMed ID: 27342770
    [No Abstract]   [Full Text] [Related]  

  • 7. Online-Based Approaches to Identify Real Journals and Publishers from Hijacked Ones.
    Asadi A; Rahbar N; Asadi M; Asadi F; Khalili Paji K
    Sci Eng Ethics; 2017 Feb; 23(1):305-308. PubMed ID: 26724811
    [TBL] [Abstract][Full Text] [Related]  

  • 8. Hijacked journals: A challenge unaddressed to the developing world.
    Memon AR
    J Pak Med Assoc; 2019 Oct; 69(10):1413-1415. PubMed ID: 31622288
    [No Abstract]   [Full Text] [Related]  

  • 9. Illegitimate journals scam even senior scientists.
    Cobey K
    Nature; 2017 Sep; 549(7670):7. PubMed ID: 28880308
    [No Abstract]   [Full Text] [Related]  

  • 10. A Method for Improving the Integrity of Peer Review.
    Dadkhah M; Kahani M; Borchardt G
    Sci Eng Ethics; 2018 Oct; 24(5):1603-1610. PubMed ID: 28812275
    [TBL] [Abstract][Full Text] [Related]  

  • 11. How to Recognize and Avoid Potential, Possible, or Probable Predatory Open-Access Publishers, Standalone, and Hijacked Journals.
    Danevska L; Spiroski M; Donev D; Pop-Jordanova N; Polenakovic M
    Pril (Makedon Akad Nauk Umet Odd Med Nauki); 2016 Nov; 37(2-3):5-13. PubMed ID: 27883329
    [TBL] [Abstract][Full Text] [Related]  

  • 12. Masquerade of authority: hijacked journals are gaining more credibility than original ones.
    Hegedűs M; Dadkhah M; Dávid LD
    Diagnosis (Berl); 2024 Aug; 11(3):235-239. PubMed ID: 38953515
    [TBL] [Abstract][Full Text] [Related]  

  • 13. Ethical issues in publishing in predatory journals.
    Ferris LE; Winker MA
    Biochem Med (Zagreb); 2017 Jun; 27(2):279-284. PubMed ID: 28694719
    [TBL] [Abstract][Full Text] [Related]  

  • 14. Indexing by Bibliographic Databases of Journals Published in the Developing World.
    Memon AR; Waqas A
    Sci Eng Ethics; 2018 Aug; 24(4):1371-1375. PubMed ID: 28321686
    [TBL] [Abstract][Full Text] [Related]  

  • 15. Unveiling the Hidden Menace: A Topic Modeling Analysis of Hijacked Medical Journals.
    Dadkhah M; Hegedűs M; Nedungadi P; Raman R; Dávid LD
    Adv Pharm Bull; 2024 Jul; 14(2):255-261. PubMed ID: 39206400
    [TBL] [Abstract][Full Text] [Related]  

  • 16. Current and potential cyber attacks on medical journals; guidelines for improving security.
    Dadkhah M; Seno SAH; Borchardt G
    Eur J Intern Med; 2017 Mar; 38():25-29. PubMed ID: 27919525
    [TBL] [Abstract][Full Text] [Related]  

  • 17. Academic Information Security Researchers: Hackers or Specialists?
    Dadkhah M; Lagzian M; Borchardt G
    Sci Eng Ethics; 2018 Apr; 24(2):785-790. PubMed ID: 28397172
    [TBL] [Abstract][Full Text] [Related]  

  • 18. Predatory conferences: Addressing researchers from developing countries.
    Memon AR; Azim ME
    J Pak Med Assoc; 2018 Nov; 68(11):1691-1695. PubMed ID: 30410151
    [TBL] [Abstract][Full Text] [Related]  

  • 19. Unsolicited solicitations: identifying characteristics of unsolicited emails from potentially predatory journals and the role of librarians.
    Wilson P
    J Med Libr Assoc; 2022 Oct; 110(4):520-524. PubMed ID: 37101915
    [TBL] [Abstract][Full Text] [Related]  

  • 20. Sham journals scam authors.
    Butler D
    Nature; 2013 Mar; 495(7442):421-2. PubMed ID: 23538804
    [No Abstract]   [Full Text] [Related]  

    [Next]    [New Search]
    of 11.