-
1
-
-
79959671252
-
Predatory open-access scholarly publishers
-
Beall J. (2010a) Predatory open-access scholarly publishers. The Charleston Advisor 11(4), 10–17. doi:10.5260/chara.12.1.50.
-
(2010)
The Charleston Advisor
, vol.11
, Issue.4
, pp. 10-17
-
-
Beall, J.1
-
2
-
-
79959671252
-
Update: predatory open-access scholarly publishers
-
Beall J. (2010b) Update: predatory open-access scholarly publishers. The Charleston Advisor 12(1), 50. doi:10.5260/chara.12.1.50.
-
(2010)
The Charleston Advisor
, vol.12
, Issue.1
, pp. 50
-
-
Beall, J.1
-
6
-
-
85007309753
-
Phishing or Hijacking? Forgers Hijacked DU Journal by Copying Content of Another Authenticate Journal
-
Dadkhah M. & Sutikno T. (2015) Phishing or Hijacking? Forgers Hijacked DU Journal by Copying Content of Another Authenticate Journal. Indonesian Journal of Electrical Engineering and Informatics 3(3), 119–120.
-
(2015)
Indonesian Journal of Electrical Engineering and Informatics
, vol.3
, Issue.3
, pp. 119-120
-
-
Dadkhah, M.1
Sutikno, T.2
-
8
-
-
84930584932
-
A new challenge in the academic world: earning real money and eminence by paper publishing
-
Dadkhah M., Elias N., Jazi M.D., Christova-Bagdassarian V. & Abu-Elteen K.H. (2015b) A new challenge in the academic world: earning real money and eminence by paper publishing. Jordan Journal of Biological Sciences 8(2), 73–75.
-
(2015)
Jordan Journal of Biological Sciences
, vol.8
, Issue.2
, pp. 73-75
-
-
Dadkhah, M.1
Elias, N.2
Jazi, M.D.3
Christova-Bagdassarian, V.4
Abu-Elteen, K.H.5
-
9
-
-
84929462179
-
How can we identify hijacked journals?
-
Dadkhah M., Obeidat M.M., Jazi M.D., Sutikno T. & Riyadi M.A. (2015c) How can we identify hijacked journals? Bulletin of Electrical Engineering and Informatics 4(2), 83–87. doi:10.12928/eei.v4i2.449.
-
(2015)
Bulletin of Electrical Engineering and Informatics
, vol.4
, Issue.2
, pp. 83-87
-
-
Dadkhah, M.1
Obeidat, M.M.2
Jazi, M.D.3
Sutikno, T.4
Riyadi, M.A.5
-
10
-
-
84924225218
-
Hijacked journals are attacking the reliability and validity of medical research
-
Jalalian M. (2014a) Hijacked journals are attacking the reliability and validity of medical research. Electronic Physician 6(4), 925–926. doi:10.14661/2014.925-926.
-
(2014)
Electronic Physician
, vol.6
, Issue.4
, pp. 925-926
-
-
Jalalian, M.1
-
12
-
-
84936763502
-
The story of fake impact factor companies and how we detected them
-
Jalalian M. (2015) The story of fake impact factor companies and how we detected them. Electronic Physician 7(2), 1069–1072. doi:10.14661/2015.1069-1072.
-
(2015)
Electronic Physician
, vol.7
, Issue.2
, pp. 1069-1072
-
-
Jalalian, M.1
-
13
-
-
84936761873
-
The full story of 90 hijacked journals from August 2011 to June 2015
-
Jalalian M. & Dadkhah M. (2015) The full story of 90 hijacked journals from August 2011 to June 2015. Geographica Pannonica 19(2), 73–87.
-
(2015)
Geographica Pannonica
, vol.19
, Issue.2
, pp. 73-87
-
-
Jalalian, M.1
Dadkhah, M.2
-
14
-
-
84896890666
-
Hijacked journals and predatory publishers: is there a need to re-think how to assess the quality of academic research?
-
Jalalian M. & Mahboobi H. (2014) Hijacked journals and predatory publishers: is there a need to re-think how to assess the quality of academic research? Walailak Journal of Science and Technology 11(5), 389–94. doi:10.14456/wjst.2014.16.
-
(2014)
Walailak Journal of Science and Technology
, vol.11
, Issue.5
, pp. 389-394
-
-
Jalalian, M.1
Mahboobi, H.2
-
15
-
-
84907819333
-
Predatory and fake scientific journals/publishers – a global outbreak with rising trend: a review
-
Lukiæ T., Blešiæ I., Basarin B., Ivanoviæ B.L., Miloševiæ D. & Sakulski D. (2014) Predatory and fake scientific journals/publishers – a global outbreak with rising trend: a review. Geographica Pannonica 18(3), 69–81.
-
(2014)
Geographica Pannonica
, vol.18
, Issue.3
, pp. 69-81
-
-
Lukiæ, T.1
Blešiæ, I.2
Basarin, B.3
Ivanoviæ, B.L.4
Miloševiæ, D.5
Sakulski, D.6
-
16
-
-
84870265063
-
Phishing secrets: history, effects, and countermeasures
-
Martino A.S. & Perramon X. (2010) Phishing secrets: history, effects, and countermeasures. International Journal of Network Security 11(3), 163–171.
-
(2010)
International Journal of Network Security
, vol.11
, Issue.3
, pp. 163-171
-
-
Martino, A.S.1
Perramon, X.2
|