These tools will no longer be maintained as of December 31, 2024. Archived website can be found here. PubMed4Hh GitHub repository can be found here. Contact NLM Customer Service if you have questions.
2. Predatory Invitations from Journals: More Than Just a Nuisance? Clemons M; de Costa E Silva M; Joy AA; Cobey KD; Mazzarello S; Stober C; Hutton B Oncologist; 2017 Feb; 22(2):236-240. PubMed ID: 28188258 [TBL] [Abstract][Full Text] [Related]
3. A Solution to Academic Radiology's Experience With Solicitation E-mails From Predatory Journals. VanDenBerg R; Nezami N; Nguyen V; Sicklick JK; Weiss CR AJR Am J Roentgenol; 2021 Jan; 216(1):233-240. PubMed ID: 33112665 [No Abstract] [Full Text] [Related]
4. We read spam a lot: prospective cohort study of unsolicited and unwanted academic invitations. Grey A; Bolland MJ; Dalbeth N; Gamble G; Sadler L BMJ; 2016 Dec; 355():i5383. PubMed ID: 27974354 [TBL] [Abstract][Full Text] [Related]
5. Burden and Characteristics of Unsolicited Emails from Medical/Scientific Journals, Conferences, and Webinars to Faculty and Trainees at an Academic Pathology Department. Krasowski MD; Lawrence JC; Briggs AS; Ford BA J Pathol Inform; 2019; 10():16. PubMed ID: 31149367 [TBL] [Abstract][Full Text] [Related]
6. Academic E-Mail Overload and the Burden of "Academic Spam". Wood KE; Krasowski MD Acad Pathol; 2020; 7():2374289519898858. PubMed ID: 32010761 [TBL] [Abstract][Full Text] [Related]
7. [Spams in doctors' mailbox: their threat to health education, to patient information and to scientific research]. Felkai P; Lengyel I Orv Hetil; 2019 Oct; 160(43):1706-1710. PubMed ID: 31630551 [TBL] [Abstract][Full Text] [Related]
8. The ASGLOS Study: A global survey on how predatory journals affect scientific practice. Martinino A; Puri O; Pereira JPS; Owen E; Chatterjee S; Abouelazayem M; Yang W; Mulita F; Graham Y; Parmar C; Ramnarain D; Isik A; Yadav S; Budihal BR; Kashyap S; Aloulou M; Kundu M; Ibrahimli A; Rajesh E; Silva RGD; Bhatt G; Malhotra K; Magnani R; Smeenk FWJM; Pouwels S Dev World Bioeth; 2024 Sep; 24(3):207-216. PubMed ID: 37584521 [TBL] [Abstract][Full Text] [Related]
9. One year of unsolicited e-mails: The modus operandi of predatory journals and publishers. Sousa FSO; Nadanovsky P; Dhyppolito IM; Santos APPD J Dent; 2021 Jun; 109():103618. PubMed ID: 33636240 [TBL] [Abstract][Full Text] [Related]
10. An Analysis of Solicitations From Predatory Journals in Ophthalmology. Justin GA; Huang C; Nguyen MK; Lee J; Seddon I; Wesley TA; Bakri SJ; Peter Campbell J; Cavuoto K; Collins M; Gedde SJ; Kossler AL; Milman T; Shukla A; Sridhar J; Syed ZA; Williams JBK; Woreta FA; Patel SN; Yonekawa Y Am J Ophthalmol; 2024 Aug; 264():216-223. PubMed ID: 38490339 [TBL] [Abstract][Full Text] [Related]
11. Efficient E-Mail Spam Detection Strategy Using Genetic Decision Tree Processing with NLP Features. Ismail SSI; Mansour RF; Abd El-Aziz RM; Taloba AI Comput Intell Neurosci; 2022; 2022():7710005. PubMed ID: 35371228 [TBL] [Abstract][Full Text] [Related]
12. Unsolicited scam invitations from predatory publications and fraudulent conferences: Radiology-in-training experience. Lakhani DA; Radmard M; Hesami M; Tafazolimoghadam A; Yousem DM Clin Imaging; 2024 Sep; 113():110230. PubMed ID: 38945061 [TBL] [Abstract][Full Text] [Related]
13. Characteristics of E-Mail Solicitations From Predatory Nursing Journals and Publishers. Lewinski AA; Oermann MH J Contin Educ Nurs; 2018 Apr; 49(4):171-177. PubMed ID: 29596704 [TBL] [Abstract][Full Text] [Related]
14. Efficient information theoretic strategies for classifier combination, feature extraction and performance evaluation in improving false positives and false negatives for spam e-mail filtering. Zorkadis V; Karras DA; Panayotou M Neural Netw; 2005; 18(5-6):799-807. PubMed ID: 16111865 [TBL] [Abstract][Full Text] [Related]
15. An analysis of invitations for article submission received via emails. Bavdekar SB; Saha S; Thatte UM; Gogtay NJ Indian J Med Ethics; 2022; VII(2):103-107. PubMed ID: 34730088 [TBL] [Abstract][Full Text] [Related]
16. Fraud in Academic Publishing: Researchers Under Cyber-Attacks. Dadkhah M; Borchardt G; Maliszewski T Am J Med; 2017 Jan; 130(1):27-30. PubMed ID: 27637600 [TBL] [Abstract][Full Text] [Related]
17. Weight problems and spam e-mail for weight loss products. Fogel J; Shlivko S South Med J; 2010 Jan; 103(1):31-6. PubMed ID: 19996861 [TBL] [Abstract][Full Text] [Related]
18. To Decline or Accept: A Guide for Determining the Legitimacy of Academic Conference Invitations. Warden AM; Soteropulos CE; Eftekari SC; Nicksic PJ; Dingle AM; Poore SO Ann Plast Surg; 2022 Jul; 89(1):8-16. PubMed ID: 35502938 [TBL] [Abstract][Full Text] [Related]
19. Invitation to Speak at a Conference: The Tempting Technique Adopted by Predatory Conferences' Organizers. Asadi A Sci Eng Ethics; 2019 Jun; 25(3):975-979. PubMed ID: 29520691 [TBL] [Abstract][Full Text] [Related]
20. Predatory Journals Spamming for Publications: What Should Researchers Do? Memon AR Sci Eng Ethics; 2018 Oct; 24(5):1617-1639. PubMed ID: 28815439 [TBL] [Abstract][Full Text] [Related] [Next] [New Search]