Andoohgin, S. h., DavarpanahJazi, M. Borchardt, G. & Dadkhah, M. (2017). Detecting Hijacked Journals by Using Classification Algorithms. Science and engineering Ethics, 1-14.
Beall, J. (2016b). Retrieved 3 May 2016 from https://scholarlyoa.com/other-pages/hijacked-journals/.
Butler, D. (2013). Sham journals scam authors. Nature, 495, 421-422.
Dadkhah, M. & Borchardt, G. (2016). Hijacked Journals: An Emerging Challenge for Scholarly Publishing. Aesthetic Surgery Journal, 36(6), 739-741.
Dadkhah, M., Obeidat, M. M., Jazi, M. D., Sutikno, T. & Riyadi, M. A. (2015). How Can We Identify Hijacked Journals?. Bulletin of Electrical Engineering and Informatics, 4(2), 83-87.
Dadkhah, M., Sutikno, T., DavarpanahJazi, M. & Stiawan, D. (2015). An Introduction to Journal Phishings and Their Detection Approach. Telecommunication, Computing, Electronics and Control, 13(2), 656-660.
Han, J. & Kamber, M. (2006). Data Mining Concepts and Techniques. Second Edition, Diane Cerra, United States of America.
Jalalian, M. & Bimler, D. (2014). Retrieved 23 July from
http://www.cybernewsalerts.com/2014/07/the-scientific-journal-interciencia-has.html.
Jalalian, M. (2014a). Journal hijackers target science and open access. Research information. From
http://www.researchinformation.info/news/news_ story.php?news_id=1660
Jalalian, M. & Dadkhah, M. (2015). The full story of 90 hijacked journals. Geographica Pannonica, 19(2), 73-87.
Jalalian, M. & Mahboobi, H. (2014). Hijacked Journals and Predatory Publishers: Is There a Need to Re-Think How to Assess the Quality of Academic Research?. Walailak J. Sci & Tech, 11(5), 389-394.
Jalalian, M. (2015). Solutions for commandeered journals, debatable journals, and forged journals. Contemporary Clinical Dentistry, 6(3), 283-285.
Lukić, T., Blešić, I., Ivanović, B. L. Milošević, D. & Sakulski, D. (2014). Predatory and Fake Scientific Journals/Publishers – A Global Outbreak with Rising Trend. Geographica Pannonica, 18(3), 69-81.
Scammed. Weed Science, 64(4), 772-778.