Jalalian, M.;Mahboobi, H. (2014). Hijacked Journals and Predatory Publish-
ers: Is There a Need to Re-Think How to Assess the Quality of Academic
Research?Walailak J Sci& Tech. 11(5): 389-394.
Dadkhah, M.; Obeidat, M. M. Jazi, M. D.; Sutikno, T. & Riyadi, M. A. (2015).
How Can We Identify Hijacked Journals?.Bulletin of Electrical Engineering
and Informatics. 4(2): 83-87. DOI: 10.12928/eei.v4i2.449.
Maan, P. S.;Sharma, M.(2012). Social Engineering: A Partial Technical At-
tack. International Journal of Computer Science Issues. 9(2): 557-559
Mitnick, K. and Simon, W. (2002).THE ART OF DECEPTION, John Wiley
& Sons, New York.
Dadkhah, M.; DavarpanahJazi, M. (2014). Secure Payment in E-commerce:
Deal with Keyloggers and Phishings. International Journal of Electronics
Communication and Computer Engineering. 5(3): 656-660.
Jalalian, M. (2014). Hijacked Journals Are Attacking the Reliability and
Validity of Medical Research. Electronic Physician. 6(4): 925-926. DOI:
10.14661/2014.925-926.