Follow
Mehdi Dadkhah
Title
Cited by
Cited by
Year
Ranking predatory journals: solve the problem instead of removing it!
M Dadkhah, G Bianciardi
Advanced pharmaceutical bulletin 6 (1), 1, 2016
862016
Negative effects of “predatory” journals on global health research
DA Forero, MH Oermann, A Manca, F Deriu, H Mendieta-Zerón, ...
Annals of global health 84 (4), 584, 2018
802018
Hijacked journals, hijacked web-sites, journal phishing, misleading metrics, and predatory publishing: actual and potential threats to academic integrity and publishing ethics
M Dadkhah, T Maliszewski, JA Teixeira da Silva
Forensic Science, Medicine, and Pathology 12 (3), 353-362, 2016
752016
The full story of 90 hijacked journals from August 2011 to June 2015
M Jalalian, M Dadkhah
Geographica Pannonica 19 (2), 73-87, 2015
732015
Hijacked journals: an emerging challenge for scholarly publishing
M Dadkhah, G Borchardt
Aesthetic Surgery Journal 36 (6), 739-741, 2016
632016
Characteristics of hijacked journals and predatory publishers: our observations in the academic world
M Dadkhah, T Maliszewski, MD Jazi
Trends in Pharmacological Sciences 37 (6), 415-418, 2016
582016
Adaptive control algorithm of flexible robotic gripper by extreme learning machine
D Petković, AS Danesh, M Dadkhah, N Misaghian, S Shamshirband, ...
Robotics and Computer-Integrated Manufacturing 37, 170-178, 2016
542016
Methodology of wavelet analysis in research of dynamics of phishing attacks
M Dadkhah, VV Lyashenko, ZV Deineko, S Shamshirband, MD Jazi
International Journal of Advanced Intelligence Paradigms 12 (3-4), 220-238, 2019
532019
How can we identify hijacked journals?
M Dadkhah, MM Obeidat, MD Jazi, T Sutikno, MA Riyadi
Bulletin of Electrical Engineering and Informatics 4 (2), 83-87, 2015
512015
An introduction to journal phishings and their detection approach
M Dadkhah, T Sutikno, MD Jazi, D Stiawan
TELKOMNIKA (Telecommunication Computing Electronics and Control) 13 (2), 373-380, 2015
362015
Fake conferences for earning real money
M Dadkhah, MD Jazi, S Pacukaj
Mediterranean Journal of Social Sciences 6 (2), 11, 2015
332015
Phishing or hijacking? Forgers hijacked DU journal by copying content of another authenticate journal
M Dadkhah, T Sutikno
Indonesian Journal of Electrical Engineering and Informatics (IJEEI) 3 (3 …, 2015
322015
Questionable papers in citation databases as an issue for literature review
M Dadkhah, M Lagzian, G Borchardt
Journal of cell communication and signaling 11, 181-185, 2017
312017
Detecting hijacked journals by using classification algorithms
M Andoohgin Shahri, MD Jazi, G Borchardt, M Dadkhah
Science and engineering ethics 24, 655-668, 2018
302018
New types of fraud in the academic world by cyber criminals
M Dadkhah
Journal of advanced nursing 72 (12), 2951-2953, 2016
252016
Evaluating the opportunities, challenges and risks of applying the blockchain technology in tourism: A Delphi study approach
M Dadkhah, F Rahimnia, V Filimonau
Journal of Hospitality and Tourism Technology 13 (5), 922-954, 2022
222022
Identity theft in the academic world leads to junk science
M Dadkhah, M Lagzian, G Borchardt
Science and Engineering Ethics 24, 287-290, 2018
222018
Academic journals plagued by bogus impact factors
M Dadkhah, G Borchardt, M Lagzian, G Bianciardi
Publishing research quarterly 33, 183-187, 2017
222017
A method for improving the integrity of peer review
M Dadkhah, M Kahani, G Borchardt
Science and Engineering Ethics 24, 1603-1610, 2018
212018
Current and potential cyber attacks on medical journals; guidelines for improving security
M Dadkhah, SAH Seno, G Borchardt
European journal of internal medicine 38, 25-29, 2017
192017
The system can't perform the operation now. Try again later.
Articles 1–20