1.Beall J. Predatory publishers are corrupting open access. Nature. 2012 Sep 1;489(7415):179–179.
2.Beall J. What I learned from predatory publishers. Biochemia medica. 2017;27(2):273–8.
3.Elmore SA, Weston EH. Predatory Journals: What They Are and How to Avoid Them. Toxicol Pathol. 2020 Jun 1;48(4):607–10.
4.Cukier S, Helal L, Rice DB, Pupkaite J, Ahmadzai N, Wilson M, et al. Checklists to detect potential predatory biomedical journals: a systematic review. BMC Medicine. 2020 May 18;18(1):104.
5.Dadkhah M, Bianciardi G. Hackers spy scientists. Indian Pediatrics. 2016;53(11):1027.
6.Jalalian M, Dadkhah M. The full story of 90 hijacked journals from August 2011 to June 2015. Geographica Pannonica. 2015;19(2):73–87.
7.Dadkhah M, Rahimnia F, Darbyshire P, Borchardt G. Ten (Bad) reasons researchers publish their papers in hijacked journals. Journal of Clinical Nursing. 2021 Oct 1;30(19–20):e60–3.
8.Dadkhah M, Seno SAH, Borchardt G. Current and potential cyber attacks on medical journals; guidelines for improving security. European Journal of Internal Medicine. 2017 Mar 1;38:25–9.
9.Bohannon J. How to hijack a journal. Science. 2015 Nov 20;350(6263):903–5.
10.Dadkhah M. New types of fraud in the academic world by cyber criminals. Journal of Advanced Nursing. 2016 Dec 1;72(12):2951–3.
11.Dadkhah M, Borchardt G, Lagzian M. Do You Ignore Information Security in Your Journal Website? Science and Engineering Ethics. 2017 Aug 1;23(4):1227–31.