Ranking predatory journals: solve the problem instead of removing it! M Dadkhah, G Bianciardi Advanced pharmaceutical bulletin 6 (1), 1, 2016 | 87 | 2016 |
Negative effects of “predatory” journals on global health research DA Forero, MH Oermann, A Manca, F Deriu, H Mendieta-Zerón, ... Annals of global health 84 (4), 584, 2018 | 82 | 2018 |
Hijacked journals, hijacked web-sites, journal phishing, misleading metrics, and predatory publishing: actual and potential threats to academic integrity and publishing ethics M Dadkhah, T Maliszewski, JA Teixeira da Silva Forensic Science, Medicine, and Pathology 12 (3), 353-362, 2016 | 75 | 2016 |
The full story of 90 hijacked journals from August 2011 to June 2015 M Jalalian, M Dadkhah Geographica Pannonica 19 (2), 73-87, 2015 | 75 | 2015 |
Hijacked journals: an emerging challenge for scholarly publishing M Dadkhah, G Borchardt Aesthetic Surgery Journal 36 (6), 739-741, 2016 | 63 | 2016 |
Methodology of wavelet analysis in research of dynamics of phishing attacks M Dadkhah, VV Lyashenko, ZV Deineko, S Shamshirband, MD Jazi International Journal of Advanced Intelligence Paradigms 12 (3-4), 220-238, 2019 | 59 | 2019 |
Characteristics of hijacked journals and predatory publishers: our observations in the academic world M Dadkhah, T Maliszewski, MD Jazi Trends in Pharmacological Sciences 37 (6), 415-418, 2016 | 58 | 2016 |
Adaptive control algorithm of flexible robotic gripper by extreme learning machine D Petković, AS Danesh, M Dadkhah, N Misaghian, S Shamshirband, ... Robotics and Computer-Integrated Manufacturing 37, 170-178, 2016 | 54 | 2016 |
How can we identify hijacked journals? M Dadkhah, MM Obeidat, MD Jazi, T Sutikno, MA Riyadi Bulletin of Electrical Engineering and Informatics 4 (2), 83-87, 2015 | 52 | 2015 |
An introduction to journal phishings and their detection approach M Dadkhah, T Sutikno, MD Jazi, D Stiawan TELKOMNIKA (Telecommunication Computing Electronics and Control) 13 (2), 373-380, 2015 | 36 | 2015 |
Fake conferences for earning real money M Dadkhah, MD Jazi, S Pacukaj Mediterranean Journal of Social Sciences 6 (2), 11, 2015 | 34 | 2015 |
Questionable papers in citation databases as an issue for literature review M Dadkhah, M Lagzian, G Borchardt Journal of cell communication and signaling 11, 181-185, 2017 | 32 | 2017 |
Phishing or hijacking? Forgers hijacked DU journal by copying content of another authenticate journal M Dadkhah, T Sutikno Indonesian Journal of Electrical Engineering and Informatics (IJEEI) 3 (3 …, 2015 | 32 | 2015 |
Detecting hijacked journals by using classification algorithms M Andoohgin Shahri, MD Jazi, G Borchardt, M Dadkhah Science and engineering ethics 24, 655-668, 2018 | 30 | 2018 |
New types of fraud in the academic world by cyber criminals M Dadkhah Journal of advanced nursing 72 (12), 2951-2953, 2016 | 26 | 2016 |
Evaluating the opportunities, challenges and risks of applying the blockchain technology in tourism: A Delphi study approach M Dadkhah, F Rahimnia, V Filimonau Journal of Hospitality and Tourism Technology 13 (5), 922-954, 2022 | 24 | 2022 |
Identity theft in the academic world leads to junk science M Dadkhah, M Lagzian, G Borchardt Science and Engineering Ethics 24, 287-290, 2018 | 23 | 2018 |
A method for improving the integrity of peer review M Dadkhah, M Kahani, G Borchardt Science and Engineering Ethics 24, 1603-1610, 2018 | 22 | 2018 |
Academic journals plagued by bogus impact factors M Dadkhah, G Borchardt, M Lagzian, G Bianciardi Publishing research quarterly 33, 183-187, 2017 | 22 | 2017 |
Use of internet of things for chronic disease management: An overview M Dadkhah, M Mehraeen, F Rahimnia, K Kimiafar Journal of Medical Signals and Sensors 11 (2), 138, 2021 | 21 | 2021 |