ARTICLE INFO

Article Type

Systematic Review

Authors

Moazamiyanfar   R. (1)
Rouhani Nejad   H. (*)






(*) Department of Nano Technology, Advance Sciences & Technology Faculty, Pharmaceutical Sciences Branch, Islamic Azad University, Tehran, Iran
(1) 1Department of Nano Technology, Advance Sciences & Technology Faculty, Pharmaceutical Sciences Branch, Islamic Azad University, Tehran, Iran

Correspondence

Address: Institute of Biotechnology & Bioscience, Malek-Ashtar University of Technology, Lavizan, Shahid Babaee Highway, Tehran, Iran. Post Code: 158751774
Phone: +98 (21) 26754457
Fax: +98 (21) 22974604
rohaninejhad@gmail.com

Article History

Received:  December  10, 2016
Accepted:  August 9, 2017
ePublished:  June 3, 2018

BRIEF TEXT



CITIATION LINKS

[1]Henderson DA. The looming threat of bioterrorism. Science. 1999:283(5406):1279-82.
[2]Bellamy RJ, Freedman AR. Bioterrorism. Int J Med. 2001;94(4):227-34.
[3]Christopher LG, Cieslak LT, Pavlin JA, Eitzen EM. Biological warfare: A historical perspective. Jama. 1997;278(5):412-7.
[4]Karwa M, Bronzert P, Kvetan V. Bioterrorism and critical care. Crit Care Clin. 2003;19(2):279-313.
[5]DaSilva EJ. Biological warfare, bioterrorism, biodefence and the biological and toxin weapons convention. Electron J Biotechnol. 1999;2(3):3-4.
[6]Barras V, Greub G. History of biological warfare and bioterrorism. Clin Microbiol Infect. 2014;20(6):497-502.
[7]Krallinger M, Leitner F, Valencia A. Analysis of biological processes and diseases using text mining approaches. Bioinform Methods Clin Res. 2010;593:341-82.
[8]Rodriguez-Esteban R. Biomedical text mining and its applications. PLoS Comput Biol. 2009;5(12):e1000597.
[9]Sirmakessis S, Mining for gems of information. In: Sirmakessis S, editor. Text mining and its applications: Results of the NEMIS Launch Conference. New York: Springer; 2004. pp. 1-6.
[10]Hu X, Zhang X, Wu D, Zhou X, Rumm P, Text mining the biomedical literature for identification of potential virus/bacterium as bio-terrorism weapons. In: Chen H, Reid E, Sinai J, Silke A, Ganor B, editors, Terrorism Informatics. Hamburg: Springer; 2008. pp. 385-406.
[11]Swanson DR. Undiscovered public knowledge. Libr Q. 1986;56(2):103-18.
[12]Jacobs MK. The history of biologic warfare and bioterrorism. Dermatol Clin. 2004;22(3):231-46.
[13]Subirana M, Solá I, Garcia JM, Gich I, Urrútia G. A nursing qualitative systematic review required MEDLINE and CINAHL for study identification. J Clin Epidemiol. 2005;58(1):20-5.
[14]Wheeler DL, Barrett T, Benson DA, Bryant SH, Canese K, Chetvernin V, et al. Database resources of the National Center for Biotechnology Information. Nucleic Acids Res. 2007;35:5-12.
[15]Falagas ME, Pitsouni EI, Malietzis GA, Pappas G. Comparison of PubMed, Scopus, web of science, and Google scholar: Strengths and weaknesses. The FASEB J. 2008;22(2):338-42.
[16]Lodhi H, Saunders C, Shawe-Taylor J, Cristianini N, Watkins C. Text classification using string kernels. J Mach Learn Res. 2002;2:419-44.
[17]Ponmuthuramalingam P, Devi T. Effective term based text clustering algorithms. Int J Comput Sci Eng. 2010;2(5):1665-73.
[18]Xiaojun Z, Michael W, Berry and Jacob Kogan, editors. Text mining: Applications and theory. Inf Retr. 2011;14(2):208-11.
[19]Chaurasia N, Dhakar M, Tiwari A, Gupta RK. A survey on terrorist network mining: Current trends and opportunities. Int J Comput Sci Eng Surv. 2012;3(4):59-66.
[20]Schmitt K, Zacchia NA. Total decontamination cost of the anthrax letter attacks. Biosecur Bioterror: Biodef Strategy Pract Sci. 2012;10(1):98-107.
[21]Kortepeter MG, Parker GW. Potential biological weapons threats. Emerg Infect Dis. 1999;5(4):523-7.
[22]Jernigan JA, Stephens DS, Ashford DA, Omenaca C, Topiel MS, Galbraith M, et al. Bioterrorism-related inhalational anthrax: The first 10 cases reported in the United States. Emerg Infect Dis. 2001;7(6):933-44.
[23]Grönvall GK. A new role for scientists in the Biological Weapons Convention. Nat Biotechnol. 2005;23(10):1213-6.
[24]Kulkarni Sh, Baban Pawar S, Satpute G. Terror Detection Using Text Mining. Imp J Interdiscip Res. 2016;2(5):1882-5.