BIOMARKERS

Molecular Biopsy of Human Tumors

- a resource for Precision Medicine *

162 related articles for article (PubMed ID: 32010761)

  • 21. Fraud in Academic Publishing: Researchers Under Cyber-Attacks.
    Dadkhah M; Borchardt G; Maliszewski T
    Am J Med; 2017 Jan; 130(1):27-30. PubMed ID: 27637600
    [TBL] [Abstract][Full Text] [Related]  

  • 22. [Predatory journals: A real threat for medical research. 1. Identify these journals and understand how they work].
    de La Blanchardière A; Barde F; Peiffer-Smadja N; Maisonneuve H
    Rev Med Interne; 2021 Jun; 42(6):421-426. PubMed ID: 33867197
    [TBL] [Abstract][Full Text] [Related]  

  • 23. WASP (Write a Scientific Paper): Open access unsolicited emails for scholarly work - Young and senior researchers perspectives.
    Cuschieri S; Grech V
    Early Hum Dev; 2018 Jul; 122():64-66. PubMed ID: 29685577
    [TBL] [Abstract][Full Text] [Related]  

  • 24. An analysis of invitations for article submission received via emails.
    Bavdekar SB; Saha S; Thatte UM; Gogtay NJ
    Indian J Med Ethics; 2022; VII(2):103-107. PubMed ID: 34730088
    [TBL] [Abstract][Full Text] [Related]  

  • 25. Predatory Journals Spamming for Publications: What Should Researchers Do?
    Memon AR
    Sci Eng Ethics; 2018 Oct; 24(5):1617-1639. PubMed ID: 28815439
    [TBL] [Abstract][Full Text] [Related]  

  • 26. A Toolkit for Detecting Fallacious Calls for Papers from Potential Predatory Journals.
    Dadkhah M; Raja AM; Memon AR; Borchardt G; Nedungadi P; Abu-Eteen K; Raman R
    Adv Pharm Bull; 2023 Nov; 13(4):627-634. PubMed ID: 38022802
    [TBL] [Abstract][Full Text] [Related]  

  • 27. Study of Predatory Open Access Nursing Journals.
    Oermann MH; Conklin JL; Nicoll LH; Chinn PL; Ashton KS; Edie AH; Amarasekara S; Budinger SC
    J Nurs Scholarsh; 2016 Nov; 48(6):624-632. PubMed ID: 27706886
    [TBL] [Abstract][Full Text] [Related]  

  • 28. Electronic communication between family physicians and patients: Findings from a multisite survey of academic family physicians in Ontario.
    Girdhari R; Krueger P; Wang R; Meaney C; Domb S; Larsen D; Kiran T
    Can Fam Physician; 2021 Jan; 67(1):39-46. PubMed ID: 33483396
    [TBL] [Abstract][Full Text] [Related]  

  • 29. To Decline or Accept: A Guide for Determining the Legitimacy of Academic Conference Invitations.
    Warden AM; Soteropulos CE; Eftekari SC; Nicksic PJ; Dingle AM; Poore SO
    Ann Plast Surg; 2022 Jul; 89(1):8-16. PubMed ID: 35502938
    [TBL] [Abstract][Full Text] [Related]  

  • 30. Ethical issues in publishing in predatory journals.
    Ferris LE; Winker MA
    Biochem Med (Zagreb); 2017 Jun; 27(2):279-284. PubMed ID: 28694719
    [TBL] [Abstract][Full Text] [Related]  

  • 31. Detecting Hijacked Journals by Using Classification Algorithms.
    Andoohgin Shahri M; Jazi MD; Borchardt G; Dadkhah M
    Sci Eng Ethics; 2018 Apr; 24(2):655-668. PubMed ID: 28397175
    [TBL] [Abstract][Full Text] [Related]  

  • 32. A cross-sectional study of predatory publishing emails received by career development grant awardees.
    Wilkinson TA; Russell CJ; Bennett WE; Cheng ER; Carroll AE
    BMJ Open; 2019 May; 9(5):e027928. PubMed ID: 31110104
    [TBL] [Abstract][Full Text] [Related]  

  • 33. A content analysis of e-mail communication between primary care providers and parents.
    Anand SG; Feldman MJ; Geller DS; Bisbee A; Bauchner H
    Pediatrics; 2005 May; 115(5):1283-8. PubMed ID: 15867036
    [TBL] [Abstract][Full Text] [Related]  

  • 34. A Qualitative Study Assessing the Management of Predatory Journals and Their Publishing Activities: Results From the ASGLOS Study.
    Martinino A; Owen E; Puri O; Scarano Pereira JP; Chatterjee S; Smeenk F; Pouwels S
    Cureus; 2024 Feb; 16(2):e54189. PubMed ID: 38496146
    [TBL] [Abstract][Full Text] [Related]  

  • 35. Best practices for scholarly authors in the age of predatory journals.
    Beall J
    Ann R Coll Surg Engl; 2016 Feb; 98(2):77-9. PubMed ID: 26829665
    [TBL] [Abstract][Full Text] [Related]  

  • 36. Analysis of e-Mail Spam Detection Using a Novel Machine Learning-Based Hybrid Bagging Technique.
    Rayan A
    Comput Intell Neurosci; 2022; 2022():2500772. PubMed ID: 35983156
    [TBL] [Abstract][Full Text] [Related]  

  • 37. Potential predatory and legitimate biomedical journals: can you tell the difference? A cross-sectional comparison.
    Shamseer L; Moher D; Maduekwe O; Turner L; Barbour V; Burch R; Clark J; Galipeau J; Roberts J; Shea BJ
    BMC Med; 2017 Mar; 15(1):28. PubMed ID: 28298236
    [TBL] [Abstract][Full Text] [Related]  

  • 38. 'Predatory' open access: a longitudinal study of article volumes and market characteristics.
    Shen C; Björk BC
    BMC Med; 2015 Oct; 13():230. PubMed ID: 26423063
    [TBL] [Abstract][Full Text] [Related]  

  • 39. Problems and risks of unsolicited e-mails in patient-physician encounters in travel medicine settings.
    Sing A; Salzman J; Sing D
    J Travel Med; 2001; 8(3):109-12. PubMed ID: 11468110
    [TBL] [Abstract][Full Text] [Related]  

  • 40. Blacklists and Whitelists To Tackle Predatory Publishing: a Cross-Sectional Comparison and Thematic Analysis.
    Strinzel M; Severin A; Milzow K; Egger M
    mBio; 2019 Jun; 10(3):. PubMed ID: 31164459
    [TBL] [Abstract][Full Text] [Related]  

    [Previous]   [Next]    [New Search]
    of 9.